search menu icon-carat-right cmu-wordmark

CERT Coordination Center

CERT/CC Vulnerability Notes Database


Published Public Updated ID CVSS Title
2024-03-19 2024-03-19 2024-10-03 VU#417980 Implementations of UDP-based application protocols are vulnerable to network loops
2024-04-03 2024-04-03 2024-07-19 VU#421644 HTTP/2 CONTINUATION frames can be utilized for DoS attacks
2024-04-09 2024-04-09 2024-10-02 VU#155143 Linux kernel on Intel systems is susceptible to Spectre v2 attacks
2024-04-10 2024-04-10 2024-05-13 VU#123335 Multiple programming languages fail to escape arguments properly in Microsoft Windows
2024-04-16 2024-02-23 2024-04-18 VU#253266 Keras 2 Lambda Layers Allow Arbitrary Code Injection in TensorFlow Models
2024-04-29 2024-04-29 2024-05-03 VU#238194 R Programming Language implementations are vulnerable to arbitrary code execution during deserialization of .rds and .rdx files
2024-04-30 2024-04-30 2024-08-23 VU#163057 BMC software fails to validate IPMI session.
2024-07-09 2024-07-09 2024-10-15 VU#456537 RADIUS protocol susceptible to forgery attacks.
2024-07-09 2024-07-09 2024-07-10 VU#312260 Use-after-free vulnerability in lighttpd version 1.4.50 and earlier
2024-07-30 2024-07-30 2024-08-06 VU#244112 Multiple SMTP services are susceptible to spoofing attacks due to insufficient enforcement
2024-08-30 2024-07-25 2024-08-30 VU#455367 Insecure Platform Key (PK) used in UEFI system firmware signature
2024-09-19 2024-09-19 2024-09-19 VU#138043 A stack-based overflow vulnerability exists in the Microchip Advanced Software Framework (ASF) implementation of the tinydhcp server
2024-10-23 2024-08-19 2024-10-23 VU#123336 Vulnerable WiFi Alliance example code found in Arcadyan FMIMG51AX000J

Sponsored by CISA.