search
menu
icon-carat-right
cmu-wordmark
×
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Carnegie Mellon University
Please be aware that VINCE will be down for maintenance from 12 noon EST until 4 PM EST on November 19, 2025.
Software Engineering Institute
CERT Coordination Center
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Home
Current:
Notes
CERT/CC Vulnerability Notes Database
Published
Public
Updated
ID
CVSS
Title
2011-01-13
2011-01-12
2012-03-28
VU#258423
7
Google Chrome multiple vulnerabilities
2011-02-10
2011-02-08
2012-03-28
VU#812969
7
Adobe Flash memory corruption vulnerability
2011-02-11
2011-02-08
2012-03-28
VU#189929
7
Adobe Shockwave 11.5.9.615 contains multiple memory corruption vulnerabilities
2011-06-15
2011-06-14
2012-03-28
VU#264729
7
Adobe Reader and Acrobat font memory corruption vulnerability
2011-06-22
2011-06-16
2012-03-28
VU#953183
7
LibreOffice 3.3 'Lotus Word Pro' document import filter contains multiple vulnerabilities
2011-09-13
2011-09-13
2012-03-28
VU#909022
7
Microsoft Office uninitialized object pointer vulnerability
2011-10-11
2011-10-11
2012-03-28
VU#619281
7
Windows font library file buffer overflow
2011-11-08
2011-11-08
2012-03-28
VU#675073
6.2
Microsoft Windows TrueType font array indexing vulnerability
2011-12-13
2011-12-13
2012-03-28
VU#361441
7
Microsoft Office Publisher contains multiple exploitable vulnerabilities
2012-02-02
2012-02-02
2012-03-28
VU#410281
7
Apple Mac OS X CoreText embedded font vulnerability
2012-02-02
2012-02-02
2012-03-28
VU#403593
7
Apple Mac OS X ATS data-font memory corruption vulnerability
2009-06-09
2009-06-09
2012-03-28
VU#568153
7
Adobe Reader contains multiple vulnerabilities in the processing of JPX data
2009-06-19
2009-06-19
2012-03-28
VU#251793
7
Foxit Reader contains multiple vulnerabilities in the processing of JPX data
2009-09-05
2009-09-04
2012-03-28
VU#444513
7
VMware VMnc AVI video codec image height heap overflow
2009-12-14
2009-12-08
2012-03-28
VU#228561
7.7
Microsoft Indeo video codecs contain multiple vulnerabilities
Previous
1
55
56
57
You're on page
58
59
60
61
243
Next
Sponsored by
CISA.
Download PGP Key
Read CERT/CC Blog
Learn about Vulnerability Analysis