search menu icon-carat-right cmu-wordmark

CERT Coordination Center

CERT/CC Vulnerability Notes Database


Published Public Updated ID CVSS Title
2023-01-17 2023-01-17 2023-01-23 VU#572615 Vulnerabilities in TP-Link routers, WR710N-V1-151022 and Archer C5 V2
2022-02-22 2022-02-22 2023-02-24 VU#229438 Mobile device monitoring services do not authenticate API requests
2022-05-09 2022-05-02 2023-04-04 VU#473698 uClibc, uClibc-ng libraries have monotonically increasing DNS transaction ID
2022-11-16 2022-01-10 2023-04-04 VU#709991 Netatalk contains multiple error and memory management vulnerabilities
2022-09-27 2022-09-27 2023-06-14 VU#855201 L2 network security controls can be bypassed using VLAN 0 stacking and/or 802.3 headers
2023-07-11 2023-07-11 2023-07-12 VU#913565 Hard-coded credentials in Technicolor TG670 DSL gateway router
2021-05-24 2021-05-24 2023-07-13 VU#799380 Devices supporting Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure
2022-10-07 2022-10-07 2023-07-13 VU#730793 Heimdal Kerberos vulnerable to remotely triggered NULL pointer dereference
2022-02-01 2022-02-01 2023-07-17 VU#796611 InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM
2023-07-20 2023-07-20 2023-07-31 VU#653767 Perimeter81 macOS Application Multiple Vulnerabilities
2023-07-27 2023-07-27 2023-08-03 VU#813349 Software driver for D-Link Wi-Fi USB Adapter vulnerable to service path privilege escalation
2023-08-07 2023-08-07 2023-08-07 VU#947701 Freewill Solutions IFIS new trading web application vulnerable to unauthenticated remote code execution
2023-08-11 2023-02-17 2023-08-11 VU#127587 Python Parsing Error Enabling Bypass CVE-2023-24329
2023-08-16 2023-08-16 2023-08-16 VU#287122 Parsec Remote Desktop App is prone to a local elevation of privilege due to a logical flaw in its code integrity verification process
2023-08-28 2023-08-28 2023-08-28 VU#757109 Groupnotes Inc. Videostream Mac client allows for privilege escalation to root account

Sponsored by CISA.