Vulnerability Analysis
Vulnerability Reporting
We accept reports of security vulnerabilities and serve as a coordinating body that works with affected vendors to resolve vulnerabilities.
Vulnerability Analysis
Vulnerability Notes
Our Vulnerability Notes provide timely information about software vulnerabilities we have discovered or have learned about from other sources.
Vulnerability Analysis
CERT/CC Blog
Get timely information about vulnerability discovery, coordination, and disclosure.
Vulnerability Analysis
Secure Coding in Java Course
This four-day course teaches secure coding in Java, based on the CERT Oracle Coding Standard for Java.
Vulnerability Analysis
Vulnerability Coordination
Using a comprehensive four-step process, we accept reported vulnerabilities, coordinate with vendors to eliminate them, and disclose them to protect users.
Vulnerability Analysis
Open Source Tools
Our discovery tools help you find vulnerabilities in your software so that you can remove them before your software is released.
Vulnerability Analysis
CERT Is Hiring
Your top-notch skills and knowledge can help us make a difference in our nation’s cybersecurity. Explore our career opportunities today.
Vulnerability Analysis
SEI Book Series in Software Engineering
Our SEI researchers write books covering software engineering topics for this series of books published by Addison-Wesley Professional.
Our Mission: We collect, analyze, and validate emerging vulnerabilities to common computing platforms; we broadly notify operators of vulnerabilities as well as provide mitigation and remediation guidance.
The Vulnerability Analysis team helps to reduce security risks posed by software vulnerabilities by addressing the number of vulnerabilities in software that is being developed and in software that has already been deployed.
We help vendors learn how vulnerabilities are created and discovered.
We collaborate with software vendors and the researchers who discover defects in their products to support releasing vendor supported mitigations when vulnerabilities are disclosed publicly.We provide guidance on improving the security of software.
We help organizations and individuals mitigate the impact of threats to their computing environments by providing timely guidance about the secure configuration of common operating platforms.We publish information about vulnerabilities.
We publish Vulnerability Notes, which describe vulnerabilities we have discovered or have received from other sources.We blog about software security.
We publish timely information about vulnerabilities and mitigation efforts on our CERT/CC blog.Engage with Us
We can show you how to reduce security risks that result from software vulnerabilities.
Use our vulnerability reporting form to tell us if you have discovered an unresolved security vulnerability.
What Is a Vulnerability?
A vulnerability is a software defect that allows an attacker to violate an explicit (or implicit) security policy to achieve some impact (or consequence).
Publications & Media
- 03/23/2017 Using Malware Analysis to Identify Overlooked Security Requirements This presentation describes initial research conducted by CERT and Carnegie Mellon to determine if malware report databases were amenable to automated processing to identify flaws
- 03/23/2017 Building Secure Software for Mission Critical Systems This presentation explores the expanding landscape of vulnerabilities that accompanies the increasing reliance on software and then examines some key steps to help mitigate the increased risk.
- 08/25/2016 Security and the Internet of Things In this podcast, CERT researcher Art Manion discusses work that his team is doing with the Department of Homeland Security to examine and secure IoT devices.
- 07/08/2016 Coordinated Vulnerability Disclosure Learn how to develop a vulnerability coordination capability, which helps you respond to vulnerabilities and demonstrates that you are serious about fixing them.
- 06/09/2016 CERT BFF: From Start to PoC This presentation describes the CERT Basic Fuzzing Framework (BFF) from start to PoC.
Most Recent Blog Posts
- 10/05/2016 Announcing CERT Basic Fuzzing Framework Version 2.8
- 08/02/2016 The Risks of Google Sign-In on iOS Devices
- 06/06/2016 Visualizing CERT BFF String Minimization
Vulnerability Notes Database
Our Vulnerability Notes provide timely information about software vulnerabilities. Vulnerability notes include summaries, technical details, remediation information, and lists of affected vendors.
Download CERT Tapioca
CERT Tapioca is a virtual machine appliance (OVA) for performing man-in-the-middle network traffic analysis of software and devices.
Finding Android SSL Vulnerabilities with CERT Tapioca
CERT Tapioca can be used for automated discovery of SSL vulnerabilities in Android applications.
Updated CERT Fuzzing Tools
We have updated BFF V2.7 and FOE V2.1, the CERT Division's fuzzing tools, to include virtual machine changes.

- Legal
- Terms of Use
- Privacy Statement
- Intellectual Property
Contact Us