search menu icon-carat-right cmu-wordmark

CERT Coordination Center

CERT/CC Vulnerability Notes Database


Published Public Updated ID CVSS Title
2024-01-16 2024-01-16 2024-01-17 VU#446598 GPU kernel implementations susceptible to memory leak
2024-01-16 2024-01-16 2024-01-31 VU#302671 SMTP end-of-data uncertainty can be abused to spoof emails and bypass policies
2024-01-16 2024-01-16 2024-10-09 VU#132380 Vulnerabilities in EDK2 NetworkPkg IP stack implementation.
2023-12-06 2023-12-06 2024-03-04 VU#811862 Image files in UEFI can be abused to modify boot behavior
2023-09-12 2023-09-12 2023-11-16 VU#347067 Multiple BGP implementations are vulnerable to improperly formatted BGP updates
2023-09-06 2023-09-06 2023-09-06 VU#304455 Authentication Bypass in Tenda N300 Wireless N VDSL2 Modem Router
2023-08-28 2023-08-28 2023-08-28 VU#757109 Groupnotes Inc. Videostream Mac client allows for privilege escalation to root account
2023-08-16 2023-08-16 2023-08-16 VU#287122 Parsec Remote Desktop App is prone to a local elevation of privilege due to a logical flaw in its code integrity verification process
2023-08-07 2023-08-07 2023-08-07 VU#947701 Freewill Solutions IFIS new trading web application vulnerable to unauthenticated remote code execution
2023-07-27 2023-07-27 2023-08-03 VU#813349 Software driver for D-Link Wi-Fi USB Adapter vulnerable to service path privilege escalation
2023-07-20 2023-07-20 2023-07-31 VU#653767 Perimeter81 macOS Application Multiple Vulnerabilities
2023-07-11 2023-07-11 2023-07-12 VU#913565 Hard-coded credentials in Technicolor TG670 DSL gateway router
2023-02-28 2023-02-28 2024-07-09 VU#782720 TCG TPM2.0 implementations vulnerable to memory corruption
2023-08-11 2023-02-17 2023-08-11 VU#127587 Python Parsing Error Enabling Bypass CVE-2023-24329
2023-01-17 2023-01-17 2023-01-23 VU#572615 Vulnerabilities in TP-Link routers, WR710N-V1-151022 and Archer C5 V2

Sponsored by CISA.