Probably The Most Reliable Source Of Security Patch Info

toggle-button

Security patch databaseWhenever you read about a security patch for Windows or any application, it's a fair bet that there's a reference to CVE somewhere in the notification. It's the database of Common Vulnerabilities and Exposures, and documents just about every known security-related problem. So whether you're patching a product from Microsoft, Adobe, Apple, Oracle, Drupal or just about anyone else, the patch will be referenced in the CVE database.

To make sure that all of your important programs are up to date with critical security fixes, it's therefore a good idea to check the CVE database occasionally. The easiest way to do this is at the CVE Details site, at www.cvedetails.com. You can search by product, vendor, date, and just about anything else. For example, all of this year's important fixes from Microsoft are at http://www.cvedetails.com/microsoft-bulletins/2016/ along with a description of the problem and a link to the Microsoft patch installer.

It's a very useful resource if you want to check that your PC is as secure as it can be, or whether there are any patches for the products you use which you haven't yet installed.

Please rate this article: 

Your rating: None
3.916665
Average: 3.9 (12 votes)
toggle-button

Comments

Rob: Thank you for this article. I have been doing this on my own for all MS UPDATES... having been a beta-tester... and do NOT trust MS... so I have been running a G-Research on every update patch... updating most... and hiding some... especially Win 10 patches. I have noticed that HIDING is temporary... because several have reappeared ignoring the hiding opt-out. Thank you. ~ Alan

Comically:-

CVE security vulnerability database. Security vulnerabilities, exploits, references and more
https://www.cvedetails.com/

only "achieves" a C grade at:-

SSL Server Test: www.cvedetails.com (Powered by Qualys SSL Labs)
https://www.ssllabs.com/ssltest/analyze.html?d=www.cvedetails.com

because of an easily patched RC4 misconfiguration!

@rob.schifreen
Please use the secure HTTPS version of weblinks. In the case of this article:-

https://www.cvedetails.com/

instead of:-

http://www.cvedetails.com/

The browser addon:-

HTTPS Everywhere | Electronic Frontier Foundation
https://www.eff.org/https-everywhere

helps in redirecting users to a website's secure version.

Hope this helps!

Also... a thank you to you, Chris.