search menu icon-carat-right cmu-wordmark

CERT Coordination Center

CERT/CC Vulnerability Notes Database


Published Public Updated VU# CVSS Title
2018-10-06 2018-10-06 2018-10-16 VU#176301 0 Auto-Maskin DCU 210E RP 210E and Marine Pro Observer App
2018-09-26 2018-09-18 2018-11-08 VU#581311 5.9 TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks
2018-09-05 2018-09-05 2018-10-23 VU#598349 0 Automatic DNS registration and proxy autodiscovery allow spoofing of network services
2018-08-28 2018-08-27 2018-09-13 VU#906424 6.4 Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the ALPC interface
2018-08-21 2018-02-21 2019-03-13 VU#332928 6.8 Ghostscript contains multiple -dSAFER sandbox bypass vulnerabilities
2018-08-15 2018-04-14 2018-09-10 VU#982149 5.6 Intel processors are vulnerable to a speculative execution side-channel attack called L1 Terminal Fault (L1TF)
2018-08-14 2018-08-10 2018-09-14 VU#787952 6.0 Android and iOS apps contain multiple vulnerabilities
2018-08-14 2018-08-14 2018-08-17 VU#857035 7.9 IKEv1 Main Mode vulnerable to brute force attacks
2018-08-14 2018-08-14 2018-10-12 VU#641765 6.6 Linux kernel IP fragment re-assembly vulnerable to denial of service
2018-08-06 2018-07-23 2018-09-14 VU#962459 6.4 TCP implementations vulnerable to Denial of Service
2018-08-03 2013-06-09 2018-08-03 VU#307144 0 mingw-w64 by default produces executables that opt in to ASLR, but are not compatible with ASLR
2018-07-23 2018-07-23 2018-08-17 VU#304725 5.7 Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange
2018-05-23 2018-05-22 2018-06-13 VU#338343 3.9 strongSwan VPN charon server vulnerable to buffer underflow
2018-05-21 2018-05-21 2018-06-19 VU#180049 3.4 CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks
2018-05-14 2018-05-14 2018-05-15 VU#122919 0 OpenPGP and S/MIME mail client vulnerabilities

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.