zzinc CVE Vulnerabilities & Metrics

Focus on zzinc vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About zzinc Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with zzinc. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total zzinc CVEs: 14
Earliest CVE date: 07 Feb 2016, 11:59 UTC
Latest CVE date: 10 Mar 2022, 17:46 UTC

Latest CVE reference: CVE-2022-24644

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical zzinc CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 7.39

Max CVSS: 10.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 0
4.0-6.9 4
7.0-8.9 8
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS zzinc CVEs

These are the five CVEs with the highest CVSS scores for zzinc, sorted by severity first and recency.

All CVEs for zzinc

CVE-2022-24644 zzinc vulnerability CVSS: 6.8 10 Mar 2022, 17:46 UTC

ZZ Inc. KeyMouse Windows 3.08 and prior is affected by a remote code execution vulnerability during an unauthenticated update. To exploit this vulnerability, a user must trigger an update of an affected installation of KeyMouse.

CVE-2016-1346 zzinc vulnerability CVSS: 7.1 06 Apr 2016, 23:59 UTC

The kernel in Cisco TelePresence Server 3.0 through 4.2(4.18) on Mobility Services Engine (MSE) 8710 devices allows remote attackers to cause a denial of service (panic and reboot) via a crafted sequence of IPv6 packets, aka Bug ID CSCuu46673.

CVE-2015-6313 zzinc vulnerability CVSS: 7.8 06 Apr 2016, 23:59 UTC

Cisco TelePresence Server 4.1(2.29) through 4.2(4.17) on 7010; Mobility Services Engine (MSE) 8710; Multiparty Media 310, 320, and 820; and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted HTTP requests that are not followed by an unspecified negotiation, aka Bug ID CSCuv47565.

CVE-2015-6312 zzinc vulnerability CVSS: 7.8 06 Apr 2016, 23:59 UTC

Cisco TelePresence Server 3.1 on 7010, Mobility Services Engine (MSE) 8710, Multiparty Media 310 and 320, and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (device reload) via malformed STUN packets, aka Bug ID CSCuv01348.

CVE-2016-1350 zzinc vulnerability CVSS: 7.8 26 Mar 2016, 01:59 UTC

Cisco IOS 15.3 and 15.4, Cisco IOS XE 3.8 through 3.11, and Cisco Unified Communications Manager allow remote attackers to cause a denial of service (device reload) via malformed SIP messages, aka Bug ID CSCuj23293.

CVE-2016-1349 zzinc vulnerability CVSS: 7.8 26 Mar 2016, 01:59 UTC

The Smart Install client implementation in Cisco IOS 12.2, 15.0, and 15.2 and IOS XE 3.2 through 3.7 allows remote attackers to cause a denial of service (device reload) via crafted image list parameters in a Smart Install packet, aka Bug ID CSCuv45410.

CVE-2016-1348 zzinc vulnerability CVSS: 7.8 26 Mar 2016, 01:59 UTC

Cisco IOS 15.0 through 15.5 and IOS XE 3.3 through 3.16 allow remote attackers to cause a denial of service (device reload) via a crafted DHCPv6 Relay message, aka Bug ID CSCus55821.

CVE-2016-1344 zzinc vulnerability CVSS: 7.1 26 Mar 2016, 01:59 UTC

The IKEv2 implementation in Cisco IOS 15.0 through 15.6 and IOS XE 3.3 through 3.17 allows remote attackers to cause a denial of service (device reload) via fragmented packets, aka Bug ID CSCux38417.

CVE-2015-0718 zzinc vulnerability CVSS: 7.8 03 Mar 2016, 22:59 UTC

Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579.

CVE-2016-1329 zzinc vulnerability CVSS: 10.0 03 Mar 2016, 11:59 UTC

Cisco NX-OS 6.0(2)U6(1) through 6.0(2)U6(5) on Nexus 3000 devices and 6.0(2)A6(1) through 6.0(2)A6(5) and 6.0(2)A7(1) on Nexus 3500 devices has hardcoded credentials, which allows remote attackers to obtain root privileges via a (1) TELNET or (2) SSH session, aka Bug ID CSCuy25800.

CVE-2016-1330 zzinc vulnerability CVSS: 6.1 15 Feb 2016, 23:59 UTC

Cisco IOS 15.2(4)E on Industrial Ethernet 2000 devices allows remote attackers to cause a denial of service (device reload) via crafted Cisco Discovery Protocol (CDP) packets, aka Bug ID CSCuy27746.

CVE-2016-1319 zzinc vulnerability CVSS: 5.0 09 Feb 2016, 03:59 UTC

Cisco Unified Communications Manager (aka CallManager) 9.1(2.10000.28), 10.5(2.10000.5), 10.5(2.12901.1), and 11.0(1.10000.10); Unified Communications Manager IM & Presence Service 10.5(2); Unified Contact Center Express 11.0(1); and Unity Connection 10.5(2) store a cleartext encryption key, which allows local users to obtain sensitive information via unspecified vectors, aka Bug ID CSCuv85958.

CVE-2016-1307 zzinc vulnerability CVSS: 5.5 07 Feb 2016, 11:59 UTC

The Openfire server in Cisco Finesse Desktop 10.5(1) and 11.0(1) and Unified Contact Center Express 10.6(1) has a hardcoded account, which makes it easier for remote attackers to obtain access via an XMPP session, aka Bug ID CSCuw79085.

CVE-2016-1302 zzinc vulnerability CVSS: 9.0 07 Feb 2016, 11:59 UTC

Cisco Application Policy Infrastructure Controller (APIC) devices with software before 1.0(3h) and 1.1 before 1.1(1j) and Nexus 9000 ACI Mode switches with software before 11.0(3h) and 11.1 before 11.1(1j) allow remote authenticated users to bypass intended RBAC restrictions via crafted REST requests, aka Bug ID CSCut12998.