SeoMCP is currently in public beta. Some results may be incomplete or delayed.

lists.cert.at

Backlink analytics and domain authority

Backlinks
All Dofollow Nofollow UGC DR ▾ Ref. domains ▾
+ Add filter
13 backlinks All New Lost
Referring page DR Ref. domains Linked domains Anchor and target URL
CVE-2023-39459
https://feedly.com/cve/CVE-2023-39459
feedly.com
88 41,958 1,201
[CERT-daily] Tageszusammenfassung - 07.08.2023Daily August 2023 Archive / 30mo∗∗∗ VU#947701: Freewill Solutions IFIS new trading web application vulnerable to unauthenticated remote code execution ∗∗∗ Freewill Solutions IFIS new trading web application version 20.01.01.04 is vulnerable to unauthenticated remote code execution.
https://lists.cert.at/pipermail/daily/2023-August/004169.html?utm_source=feedly
DOFOLLOW
CVE-2023-40516
https://feedly.com/cve/CVE-2023-40516
feedly.com
88 41,958 1,201
[CERT-daily] Tageszusammenfassung - 25.08.2023Daily August 2023 Archive / 29mohttps://www.bleepingcomputer.com/news/security/jupiter-x-core-wordpress-plugin-could-let-hackers-hijack-sites/ https://www.pentestpartners.com/security-blog/a-broken-marriage-abusing-mixed-vendor-kerberos-stacks/
https://lists.cert.at/pipermail/daily/2023-August/004182.html?utm_source=feedly
DOFOLLOW
CVE-2014-1492
https://feedly.com/cve/CVE-2014-1492
feedly.com
88 41,958 1,201
[CERT-daily] Tageszusammenfassung - 21.02.2023Daily February 2023 Archive / 36moAuf der Suche nach Pellets für die Beheizung des Eigenheims stoßen aktuell zahlreiche Personen auf ferberpainting.de bzw. ∗∗∗ Keine Pellets auf ferberpainting.de bestellen!
https://lists.cert.at/pipermail/daily/2023-February/004055.html?utm_source=feedly
DOFOLLOW
CVE-2021-38951
https://feedly.com/cve/CVE-2021-38951
feedly.com
88 41,958 1,201
[CERT-daily] Tageszusammenfassung - 23.05.2023Daily May 2023 Archive / 33mohttps://www.bleepingcomputer.com/news/security/malicious-windows-kernel-drivers-used-in-blackcat-ransomware-attacks/ Eine Sicherheitslücke in Samsung-Smartphones, die das Unternehmen mit den Mai-Updates schließt, wird von Angreifern missbraucht.
https://lists.cert.at/pipermail/daily/2023-May/004117.html?utm_source=feedly
DOFOLLOW
CVE-2023-23554
https://feedly.com/cve/CVE-2023-23554
feedly.com
88 41,958 1,201
[CERT-daily] Tageszusammenfassung - 07.03.2023Daily March 2023 Archive / 35mohttps://www.securityweek.com/exploitation-of-critical-vulnerability-in-end-of-life-vmware-product-ongoing/ https://www.bleepingcomputer.com/news/security/proof-of-concept-released-for-critical-microsoft-word-rce-bug/
https://lists.cert.at/pipermail/daily/2023-March/004065.html?utm_source=feedly
DOFOLLOW
CVE-2023-3718
https://feedly.com/cve/CVE-2023-3718
feedly.com
88 41,958 1,201
[CERT-daily] Tageszusammenfassung - 03.08.2023Daily August 2023 Archive / 30mohttps://www.bleepingcomputer.com/news/security/hackers-can-abuse-microsoft-office-executables-to-download-malware/ Marcin has graciously provided this detailed write-up of the vulnerability, examines how it could be exploited, and a look at the patch Microsoft released to address the bug.
https://lists.cert.at/pipermail/daily/2023-August/004167.html?utm_source=feedly
DOFOLLOW
CVE-2023-36671
https://feedly.com/cve/CVE-2023-36671
feedly.com
88 41,958 1,201
[CERT-daily] Tageszusammenfassung - 24.11.2023Daily November 2023 Archive / 26moThis post outlines the process I followed to transform the authenticated Remote Code Execution (RCE) vulnerability in PRTG, identified as CVE-2023-32781, into a Metasploit exploit. Intel hat ein Update seiner Intel Arc und Iris Xe Grafiktreiber auf die Version 31.0.101.4972 veröffentlich.
https://lists.cert.at/pipermail/daily/2023-November/004245.html?utm_source=feedly
DOFOLLOW
CVE-2021-44678
https://feedly.com/cve/CVE-2021-44678
feedly.com
88 41,958 1,201
[CERT-daily] Tageszusammenfassung - 27.12.2021Daily December 2021 Archive / 50moA number of security flaws have been uncovered in a networking component in Garrett Metal Detectors that could allow remote attackers to bypass authentication requirements, tamper with metal detector configurations, and even execute arbitrary code on the devices. ∗∗∗ Security Advisory - Apache log4j2 remote code execution vulnerabilities in some Huawei products ∗∗∗
https://lists.cert.at/pipermail/daily/2021-December/003766.html?utm_source=feedly
DOFOLLOW
CVE-2022-42436
https://feedly.com/cve/CVE-2022-42436
feedly.com
88 41,958 1,201
[CERT-daily] Tageszusammenfassung - 16.03.2023Daily March 2023 Archive / 35mohttps://www.bleepingcomputer.com/news/security/winter-vivern-apt-hackers-use-fake-antivirus-scans-to-install-malware/ ∗∗∗ Multiple Hacker Groups Exploit 3-Year-Old Vulnerability to Breach U.S. Federal Agency ∗∗∗
https://lists.cert.at/pipermail/daily/2023-March/004072.html?utm_source=feedly
DOFOLLOW
CVE-2015-1796
https://feedly.com/cve/CVE-2015-1796
feedly.com
88 41,958 1,201
[CERT-daily] Tageszusammenfassung - 26.02.2021Daily February 2021 Archive / 60mohttps://www.watchlist-internet.at/news/kettenbrief-alarm-angebliches-amazon-gewinnspiel-macht-auf-whatsapp-die-runde/ ∗∗∗ Kettenbrief-Alarm: Angebliches Amazon-Gewinnspiel macht auf WhatsApp die Runde!
https://lists.cert.at/pipermail/daily/2021-February/003557.html?utm_source=feedly
DOFOLLOW
latest
http://docs.intelmq.org/latest
docs.intelmq.org
10 2 7
IntelMQ Developers mailing list
https://lists.cert.at/mailman3/hyperkitty/list/[email protected]
DOFOLLOW
CVE-2023-5950
https://feedly.com/cve/CVE-2023-5950
feedly.com
88 41,958 1,201
[CERT-daily] Tageszusammenfassung - 13.11.2023Daily November 2023 Archive / 27mohttps://www.bleepingcomputer.com/news/security/hackers-breach-healthcare-orgs-via-screenconnect-remote-access/ Security researchers are warning that hackers are targeting multiple healthcare organizations in the U.S. by abusing the ScreenConnect remote access tool.
https://lists.cert.at/pipermail/daily/2023-November/004236.html?utm_source=feedly
DOFOLLOW
CVE-2022-41064
https://feedly.com/cve/CVE-2022-41064
feedly.com
88 41,958 1,201
[CERT-daily] Tageszusammenfassung - 11.09.2023Daily September 2023 Archive / 29mohttps://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-attack-pushes-darkgate-malware/ ∗∗∗ A vulnerability in Microsoft .NET Core may affect IBM Robotic Process Automation and result in a remote attacker obtaining sensitive information (CVE-2018-8292).
https://lists.cert.at/pipermail/daily/2023-September/004193.html?utm_source=feedly
DOFOLLOW
Frequently Asked Questions
How many backlinks does lists.cert.at have?
The backlinks page for lists.cert.at shows all individual inbound links discovered in our crawl of the web. Each backlink represents a hyperlink on another website that points to a page on lists.cert.at. Use the filters to narrow results by dofollow/nofollow status, domain rating, or anchor text.
What is a backlink?
A backlink is a hyperlink on one website that points to a page on a different website. Backlinks are one of the most important ranking factors in search engine algorithms because they act as votes of confidence from other sites. The more high-quality backlinks a domain has, the more authority search engines assign to it.
Are the backlinks to lists.cert.at dofollow or nofollow?
Backlinks to lists.cert.at include both dofollow and nofollow links. Dofollow links pass link equity (ranking power) to the target site, while nofollow links include a rel="nofollow" attribute that tells search engines not to pass authority. Both types contribute to a natural backlink profile, but dofollow links carry more SEO weight. You can filter by link type using the rel filter above the table.
How often is backlink data updated?
Backlink data is updated monthly when our web crawler completes a new cycle. Our pipeline processes billions of web pages to discover new backlinks, track lost links, and update domain authority scores. The freshness of data depends on when our crawler last visited the referring pages.