Backlinks
| Referring page | DR | Ref. domains | Linked domains | Anchor and target URL |
|---|---|---|---|---|
|
CVE-2023-39459
https://feedly.com/cve/CVE-2023-39459
feedly.com
|
88 | 41,958 | 1,201 |
[CERT-daily] Tageszusammenfassung - 07.08.2023Daily August 2023 Archive / 30moâââ VU#947701: Freewill Solutions IFIS new trading web application vulnerable to unauthenticated remote code execution âââ Freewill Solutions IFIS new trading web application version 20.01.01.04 is vulnerable to unauthenticated remote code execution.
https://lists.cert.at/pipermail/daily/2023-August/004169.html?utm_source=feedly
DOFOLLOW
|
|
CVE-2023-40516
https://feedly.com/cve/CVE-2023-40516
feedly.com
|
88 | 41,958 | 1,201 |
[CERT-daily] Tageszusammenfassung - 25.08.2023Daily August 2023 Archive / 29mohttps://www.bleepingcomputer.com/news/security/jupiter-x-core-wordpress-plugin-could-let-hackers-hijack-sites/ https://www.pentestpartners.com/security-blog/a-broken-marriage-abusing-mixed-vendor-kerberos-stacks/
https://lists.cert.at/pipermail/daily/2023-August/004182.html?utm_source=feedly
DOFOLLOW
|
|
CVE-2014-1492
https://feedly.com/cve/CVE-2014-1492
feedly.com
|
88 | 41,958 | 1,201 |
[CERT-daily] Tageszusammenfassung - 21.02.2023Daily February 2023 Archive / 36moAuf der Suche nach Pellets für die Beheizung des Eigenheims stoÃen aktuell zahlreiche Personen auf ferberpainting.de bzw. âââ Keine Pellets auf ferberpainting.de bestellen!
https://lists.cert.at/pipermail/daily/2023-February/004055.html?utm_source=feedly
DOFOLLOW
|
|
CVE-2021-38951
https://feedly.com/cve/CVE-2021-38951
feedly.com
|
88 | 41,958 | 1,201 |
[CERT-daily] Tageszusammenfassung - 23.05.2023Daily May 2023 Archive / 33mohttps://www.bleepingcomputer.com/news/security/malicious-windows-kernel-drivers-used-in-blackcat-ransomware-attacks/ Eine Sicherheitslücke in Samsung-Smartphones, die das Unternehmen mit den Mai-Updates schlieÃt, wird von Angreifern missbraucht.
https://lists.cert.at/pipermail/daily/2023-May/004117.html?utm_source=feedly
DOFOLLOW
|
|
CVE-2023-23554
https://feedly.com/cve/CVE-2023-23554
feedly.com
|
88 | 41,958 | 1,201 |
[CERT-daily] Tageszusammenfassung - 07.03.2023Daily March 2023 Archive / 35mohttps://www.securityweek.com/exploitation-of-critical-vulnerability-in-end-of-life-vmware-product-ongoing/ https://www.bleepingcomputer.com/news/security/proof-of-concept-released-for-critical-microsoft-word-rce-bug/
https://lists.cert.at/pipermail/daily/2023-March/004065.html?utm_source=feedly
DOFOLLOW
|
|
CVE-2023-3718
https://feedly.com/cve/CVE-2023-3718
feedly.com
|
88 | 41,958 | 1,201 |
[CERT-daily] Tageszusammenfassung - 03.08.2023Daily August 2023 Archive / 30mohttps://www.bleepingcomputer.com/news/security/hackers-can-abuse-microsoft-office-executables-to-download-malware/ Marcin has graciously provided this detailed write-up of the vulnerability, examines how it could be exploited, and a look at the patch Microsoft released to address the bug.
https://lists.cert.at/pipermail/daily/2023-August/004167.html?utm_source=feedly
DOFOLLOW
|
|
CVE-2023-36671
https://feedly.com/cve/CVE-2023-36671
feedly.com
|
88 | 41,958 | 1,201 |
[CERT-daily] Tageszusammenfassung - 24.11.2023Daily November 2023 Archive / 26moThis post outlines the process I followed to transform the authenticated Remote Code Execution (RCE) vulnerability in PRTG, identified as CVE-2023-32781, into a Metasploit exploit. Intel hat ein Update seiner Intel Arc und Iris Xe Grafiktreiber auf die Version 31.0.101.4972 veröffentlich.
https://lists.cert.at/pipermail/daily/2023-November/004245.html?utm_source=feedly
DOFOLLOW
|
|
CVE-2021-44678
https://feedly.com/cve/CVE-2021-44678
feedly.com
|
88 | 41,958 | 1,201 |
[CERT-daily] Tageszusammenfassung - 27.12.2021Daily December 2021 Archive / 50moA number of security flaws have been uncovered in a networking component in Garrett Metal Detectors that could allow remote attackers to bypass authentication requirements, tamper with metal detector configurations, and even execute arbitrary code on the devices. âââ Security Advisory - Apache log4j2 remote code execution vulnerabilities in some Huawei products âââ
https://lists.cert.at/pipermail/daily/2021-December/003766.html?utm_source=feedly
DOFOLLOW
|
|
CVE-2022-42436
https://feedly.com/cve/CVE-2022-42436
feedly.com
|
88 | 41,958 | 1,201 |
[CERT-daily] Tageszusammenfassung - 16.03.2023Daily March 2023 Archive / 35mohttps://www.bleepingcomputer.com/news/security/winter-vivern-apt-hackers-use-fake-antivirus-scans-to-install-malware/ âââ Multiple Hacker Groups Exploit 3-Year-Old Vulnerability to Breach U.S. Federal Agency âââ
https://lists.cert.at/pipermail/daily/2023-March/004072.html?utm_source=feedly
DOFOLLOW
|
|
CVE-2015-1796
https://feedly.com/cve/CVE-2015-1796
feedly.com
|
88 | 41,958 | 1,201 |
[CERT-daily] Tageszusammenfassung - 26.02.2021Daily February 2021 Archive / 60mohttps://www.watchlist-internet.at/news/kettenbrief-alarm-angebliches-amazon-gewinnspiel-macht-auf-whatsapp-die-runde/ âââ Kettenbrief-Alarm: Angebliches Amazon-Gewinnspiel macht auf WhatsApp die Runde!
https://lists.cert.at/pipermail/daily/2021-February/003557.html?utm_source=feedly
DOFOLLOW
|
|
latest
http://docs.intelmq.org/latest
docs.intelmq.org
|
10 | 2 | 7 |
IntelMQ Developers mailing list
https://lists.cert.at/mailman3/hyperkitty/list/[email protected]
DOFOLLOW
|
|
CVE-2023-5950
https://feedly.com/cve/CVE-2023-5950
feedly.com
|
88 | 41,958 | 1,201 |
[CERT-daily] Tageszusammenfassung - 13.11.2023Daily November 2023 Archive / 27mohttps://www.bleepingcomputer.com/news/security/hackers-breach-healthcare-orgs-via-screenconnect-remote-access/ Security researchers are warning that hackers are targeting multiple healthcare organizations in the U.S. by abusing the ScreenConnect remote access tool.
https://lists.cert.at/pipermail/daily/2023-November/004236.html?utm_source=feedly
DOFOLLOW
|
|
CVE-2022-41064
https://feedly.com/cve/CVE-2022-41064
feedly.com
|
88 | 41,958 | 1,201 |
[CERT-daily] Tageszusammenfassung - 11.09.2023Daily September 2023 Archive / 29mohttps://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-attack-pushes-darkgate-malware/ âââ A vulnerability in Microsoft .NET Core may affect IBM Robotic Process Automation and result in a remote attacker obtaining sensitive information (CVE-2018-8292).
https://lists.cert.at/pipermail/daily/2023-September/004193.html?utm_source=feedly
DOFOLLOW
|
▾
Frequently Asked Questions
How many backlinks does lists.cert.at have?
The backlinks page for lists.cert.at shows all individual inbound links discovered in our crawl of the web. Each backlink represents a hyperlink on another website that points to a page on lists.cert.at. Use the filters to narrow results by dofollow/nofollow status, domain rating, or anchor text.
What is a backlink?
A backlink is a hyperlink on one website that points to a page on a different website. Backlinks are one of the most important ranking factors in search engine algorithms because they act as votes of confidence from other sites. The more high-quality backlinks a domain has, the more authority search engines assign to it.
Are the backlinks to lists.cert.at dofollow or nofollow?
Backlinks to lists.cert.at include both dofollow and nofollow links. Dofollow links pass link equity (ranking power) to the target site, while nofollow links include a rel="nofollow" attribute that tells search engines not to pass authority. Both types contribute to a natural backlink profile, but dofollow links carry more SEO weight. You can filter by link type using the rel filter above the table.
How often is backlink data updated?
Backlink data is updated monthly when our web crawler completes a new cycle. Our pipeline processes billions of web pages to discover new backlinks, track lost links, and update domain authority scores. The freshness of data depends on when our crawler last visited the referring pages.