Browse all 9 CVE security advisories affecting CERT/CC. AI-powered Chinese analysis, POCs, and references for each vulnerability.
CERT/CC serves as a national computer security response center, analyzing vulnerabilities and coordinating incident response across critical infrastructure. Historically, common vulnerability classes include remote code execution, cross-site scripting, and privilege escalation, reflecting persistent threats in software development. The organization maintains a CVE record of 9, documenting security flaws in various systems. Notable characteristics include its role in vulnerability disclosure coordination and providing actionable security advisories. While CERT/CC has handled numerous incidents, its primary focus remains on proactive vulnerability analysis and mitigation strategies to enhance overall cybersecurity posture across government and private sectors.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-40238 | A Remote Code Injection vulnerability exists in CERT software prior to version 1.50.5 — VINCE - The Vulnerability Information and Coordination EnvironmentCWE-502 | 8.0 | - | 2022-10-26 |
| CVE-2022-40248 | An HTML injection vulnerability exists in CERT/CC VINCE software prior to version 1.50.4 — VINCE - The Vulnerability Information and Coordination EnvironmentCWE-74 | 5.4 | - | 2022-10-10 |
| CVE-2022-40257 | An HTML injection vulnerability exists in CERT/CC VINCE software prior to version 1.50.4 — VINCE - The Vulnerability Information and Coordination EnvironmentCWE-74 | 5.4 | - | 2022-10-10 |
| CVE-2022-25799 | An open redirect vulnerability exists in CERT/CC VINCE software prior to version 1.50.0 — VINCE - The Vulnerability Information and Coordination EnvironmentCWE-601 | 6.1 | - | 2022-08-16 |
This page lists every published CVE security advisory associated with CERT/CC. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.