search
menu
icon-carat-right
cmu-wordmark
×
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Carnegie Mellon University
Software Engineering Institute
CERT Coordination Center
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Home
Current:
Notes
CERT/CC Vulnerability Notes Database
Published
Public
Updated
ID
CVSS
Title
2010-12-08
2010-11-10
2012-03-28
VU#309873
7
Apple QuickTime JPEG2000 heap buffer overflow
2011-01-13
2011-01-12
2012-03-28
VU#258423
7
Google Chrome multiple vulnerabilities
2011-02-10
2011-02-08
2012-03-28
VU#812969
7
Adobe Flash memory corruption vulnerability
2011-02-11
2011-02-08
2012-03-28
VU#189929
7
Adobe Shockwave 11.5.9.615 contains multiple memory corruption vulnerabilities
2011-06-15
2011-06-14
2012-03-28
VU#264729
7
Adobe Reader and Acrobat font memory corruption vulnerability
2011-06-22
2011-06-16
2012-03-28
VU#953183
7
LibreOffice 3.3 'Lotus Word Pro' document import filter contains multiple vulnerabilities
2011-09-13
2011-09-13
2012-03-28
VU#909022
7
Microsoft Office uninitialized object pointer vulnerability
2011-10-11
2011-10-11
2012-03-28
VU#619281
7
Windows font library file buffer overflow
2011-11-08
2011-11-08
2012-03-28
VU#675073
6.2
Microsoft Windows TrueType font array indexing vulnerability
2011-12-13
2011-12-13
2012-03-28
VU#361441
7
Microsoft Office Publisher contains multiple exploitable vulnerabilities
2012-02-02
2012-02-02
2012-03-28
VU#410281
7
Apple Mac OS X CoreText embedded font vulnerability
2012-02-02
2012-02-02
2012-03-28
VU#403593
7
Apple Mac OS X ATS data-font memory corruption vulnerability
2009-06-09
2009-06-09
2012-03-28
VU#568153
7
Adobe Reader contains multiple vulnerabilities in the processing of JPX data
2009-06-19
2009-06-19
2012-03-28
VU#251793
7
Foxit Reader contains multiple vulnerabilities in the processing of JPX data
2009-09-05
2009-09-04
2012-03-28
VU#444513
7
VMware VMnc AVI video codec image height heap overflow
Previous
1
53
54
55
You're on page
56
57
58
59
241
Next
Sponsored by
CISA.
Download PGP Key
Read CERT/CC Blog
Learn about Vulnerability Analysis