search menu icon-carat-right cmu-wordmark
* [×](# "Close menu")
* [Home](/vuls/)
* [Notes](/vuls/bypublished/desc/)
* [Search](/vuls/search/)
* [Report a Vulnerability](/vuls/report/)
* [Disclosure Guidance](/vuls/guidance/)
* [VINCE](/vince/)
[](https://www.cmu.edu/)[Carnegie Mellon University](https://www.cmu.edu)
[Software Engineering Institute](https://www.sei.cmu.edu/)
==========================================================
CERT Coordination Center
------------------------
* [Home](/vuls/)
* [Notes](/vuls/bypublished/desc/)
* [Search](/vuls/search/)
* [Report a Vulnerability](/vuls/report/)
* [Disclosure Guidance](/vuls/guidance/)
* [VINCE](/vince/)
Vulnerability Notes Database
----------------------------
The Vulnerability Notes Database provides information about software vulnerabilities. Vulnerability notes include summaries, technical details, remediation information, and lists of affected vendors. Most vulnerability notes are the result of private coordination and disclosure efforts. For more comprehensive coverage of public vulnerability reports, consider the [National Vulnerability Database (NVD)](https://nvd.nist.gov). CERT/CC also publishes the [Vulnerability Notes Data Archive](https://github.com/CERTCC/Vulnerability-Data-Archive) on GitHub.
### Recently Published Vulnerabilities
#### [VU#726882: Paragon Partition Manager contains five memory vulnerabilities within its BioNTdrv.sys driver that allow for privilege escalation and denial-of-service (DoS) attacks](/vuls/id/726882)
###### February 28, 2025
#### [VU#148244: PandasAI interactive prompt function can be exploited to run arbitrary Python code through prompt injection, which can lead to remote code execution (RCE)](/vuls/id/148244)
###### February 11, 2025
#### [VU#733789: ChatGPT-4o contains security bypass vulnerability through time and search functions called "Time Bandit"](/vuls/id/733789)
###### January 30, 2025
#### [VU#199397: Insecure Implementation of Tunneling Protocols (GRE/IPIP/4in6/6in4)](/vuls/id/199397)
###### January 17, 2025
#### [VU#952657: Rsync contains six vulnerabilities](/vuls/id/952657)
###### January 14, 2025
[View More](/vuls/bypublished/desc/)
[Subscribe to our feed](/vuls/atomfeed/)
CERT
The CERT/CC Vulnerability Notes Database is run by the CERT Division, which is part of the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University. Together, we are leaders in cybersecurity, software innovation, and computer science.
[CERT division](https://www.cert.org)
### Search
Search over 3,500 vulnerability notes affecting over 2,300 vendors.
### Want to report a vulnerability?
The CERT Coordination Center (CERT/CC) prioritizes coordination efforts on vulnerabilities that affect multiple vendors or that impact safety, critical or internet infrastructure, or national security. We also prioritize reports that affect sectors that are new to vulnerability disclosure. We may be able to provide assistance for reports when the coordination process breaks down.
Before reporting a vulnerability to us, we recommend reading our [vulnerability disclosure policy](https://vuls.cert.org/confluence/display/Wiki/Vulnerability+Disclosure+Policy) and [guidance.](/vuls/guidance/)
[Report a Vulnerability](/vuls/report/)
Sponsored by [CISA.](https://www.cisa.gov/cybersecurity)
[Download PGP Key](https://vuls.cert.org/confluence/pages/viewpage.action?pageId=25985026)
[Read CERT/CC Blog](https://insights.sei.cmu.edu/cert/)
[Learn about Vulnerability Analysis](https://www.sei.cmu.edu/research-capabilities/all-work/display.cfm?customel_datapageid_4050=21304)
Carnegie Mellon University
Software Engineering Institute
4500 Fifth Avenue
Pittsburgh, PA 15213-2612
[412-268-5800](tel:+14122685800)
* [](https://www.facebook.com/SEICMU/)
* [](https://twitter.com/sei_cmu)
* [](https://www.linkedin.com/company/software-engineering-institute)
* [](https://www.youtube.com/user/TheSEICMU)
* [](https://itunes.apple.com/us/podcast/software-engineering-institute-sei-podcast-series/id566573552?mt=2)
[Office Locations](http://www.sei.cmu.edu/locations/index.cfm) | [Additional Sites Directory](http://www.sei.cmu.edu/additional-sites-directory/index.cfm) | [Legal](https://vuls.cert.org/confluence/display/VIN/VINCE+Code+of+Conduct#VINCECodeofConduct-TermsofUse) | [Privacy Notice](https://www.sei.cmu.edu/legal/privacy-notice/index.cfm) | [CMU Ethics Hotline](https://www.cmu.edu/hr/ethics-hotline/) | [www.sei.cmu.edu](http://www.sei.cmu.edu)
©2025 Carnegie Mellon University
[Contact SEI](https://www.sei.cmu.edu/contact-us/)
#### Contact CERT/CC
[412-268-5800](tel:+14122685800)
[[email protected]](mailto:[email protected])