search
menu
icon-carat-right
cmu-wordmark
×
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Carnegie Mellon University
Software Engineering Institute
CERT Coordination Center
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Home
Current:
Notes
CERT/CC Vulnerability Notes Database
Published
Public
Updated
ID
CVSS
Title
2011-12-13
2011-12-13
2012-03-28
VU#361441
7
Microsoft Office Publisher contains multiple exploitable vulnerabilities
2012-02-02
2012-02-02
2012-03-28
VU#410281
7
Apple Mac OS X CoreText embedded font vulnerability
2012-02-02
2012-02-02
2012-03-28
VU#403593
7
Apple Mac OS X ATS data-font memory corruption vulnerability
2009-06-09
2009-06-09
2012-03-28
VU#568153
7
Adobe Reader contains multiple vulnerabilities in the processing of JPX data
2009-06-19
2009-06-19
2012-03-28
VU#251793
7
Foxit Reader contains multiple vulnerabilities in the processing of JPX data
2009-09-05
2009-09-04
2012-03-28
VU#444513
7
VMware VMnc AVI video codec image height heap overflow
2009-12-14
2009-12-08
2012-03-28
VU#228561
7.7
Microsoft Indeo video codecs contain multiple vulnerabilities
2010-06-07
2010-06-04
2012-03-28
VU#486225
7
Adobe Flash ActionScript AVM2 newfunction vulnerability
2010-08-10
2010-08-10
2012-03-28
VU#660993
7
Adobe Flash 10.1 ActionScript AVM1 ActionPush vulnerability
2009-04-16
2009-04-16
2012-03-28
VU#196617
7
Xpdf and poppler contain multiple vulnerabilities in the processing of JBIG2 data
2012-03-08
2012-03-02
2012-03-28
VU#504019
3
AjaXplorer contains multiple vulnerabilities
2012-03-22
2012-03-22
2012-03-28
VU#743555
4.7
@Mail Open webmail client contains multiple vulnerabilities
2012-03-21
2012-03-21
2012-03-28
VU#523027
7.5
LG-Nortel ELO GS24M Switch contains multiple vulnerabilities
2012-03-23
2012-03-23
2012-03-28
VU#551715
4.8
Quagga contains multiple vulnerabilities
2012-03-20
2012-03-20
2012-03-27
VU#364363
4.3
WebGlimpse command injection vulnerability
Previous
1
55
56
57
You're on page
58
59
60
61
242
Next
Sponsored by
CISA.
Download PGP Key
Read CERT/CC Blog
Learn about Vulnerability Analysis