Browse all 9 CVE security advisories affecting CERT/CC. AI-powered Chinese analysis, POCs, and references for each vulnerability.
CERT/CC serves as a national computer security response center, analyzing vulnerabilities and coordinating incident response across critical infrastructure. Historically, common vulnerability classes include remote code execution, cross-site scripting, and privilege escalation, reflecting persistent threats in software development. The organization maintains a CVE record of 9, documenting security flaws in various systems. Notable characteristics include its role in vulnerability disclosure coordination and providing actionable security advisories. While CERT/CC has handled numerous incidents, its primary focus remains on proactive vulnerability analysis and mitigation strategies to enhance overall cybersecurity posture across government and private sectors.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-8142 | CVE-2026-8142 — VINCE | 6.5AI | MediumAI | 2026-05-07 |
| CVE-2024-10469 | CERT/CC VINCE versions before 3.0.9 allows authenticated user to access User Management view. — VINCECWE-276 | 6.5AI | MediumAI | 2024-10-28 |
This page lists every published CVE security advisory associated with CERT/CC. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.