ironmansoftware CVE Vulnerabilities & Metrics

Focus on ironmansoftware vulnerabilities and metrics.

Last updated: 15 Feb 2026, 23:25 UTC

About ironmansoftware Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with ironmansoftware. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total ironmansoftware CVEs: 4
Earliest CVE date: 14 Nov 2022, 08:15 UTC
Latest CVE date: 07 Jan 2026, 17:16 UTC

Latest CVE reference: CVE-2026-0618

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -100.0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): -100.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical ironmansoftware CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 0.0

Max CVSS: 0

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 4
4.0-6.9 0
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS ironmansoftware CVEs

These are the five CVEs with the highest CVSS scores for ironmansoftware, sorted by severity first and recency.

All CVEs for ironmansoftware

CVE-2026-0618 ironmansoftware vulnerability CVSS: 0 07 Jan 2026, 17:16 UTC

Cross-site Scripting vulnerability in Devolutions PowerShell Universal.This issue affects Powershell Universal: before 4.5.6, before 5.6.13.

CVE-2023-49213 ironmansoftware vulnerability CVSS: 0 23 Nov 2023, 22:15 UTC

The API endpoints in Ironman PowerShell Universal 3.0.0 through 4.2.0 allow remote attackers to execute arbitrary commands via crafted HTTP requests if a param block is used, due to invalid sanitization of input strings. The fixed versions are 3.10.2, 4.1.10, and 4.2.1.

CVE-2022-45184 ironmansoftware vulnerability CVSS: 0 14 Nov 2022, 08:15 UTC

The Web Server in Ironman Software PowerShell Universal v3.x and v2.x allows for directory traversal outside of the configuration directory, which allows a remote attacker with administrator privilege to create, delete, update, and display files outside of the configuration directory via a crafted HTTP request to particular endpoints in the web server. Patched Versions are 3.5.3 and 3.4.7.

CVE-2022-45183 ironmansoftware vulnerability CVSS: 0 14 Nov 2022, 08:15 UTC

Escalation of privileges in the Web Server in Ironman Software PowerShell Universal 2.x and 3.x allows an attacker with a valid app token to retrieve other app tokens by ID via an HTTP web request. Patched Versions are 3.5.3, 3.4.7, and 2.12.6.