search
menu
icon-carat-right
cmu-wordmark
×
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Carnegie Mellon University
Software Engineering Institute
CERT Coordination Center
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Home
Current:
Notes
CERT/CC Vulnerability Notes Database
Published
Public
Updated
ID
CVSS
Title
2013-02-14
2013-02-13
2014-07-30
VU#422807
8.3
Adobe Reader and Acrobat memory corruption vulnerabilities
2013-10-17
2013-10-15
2014-04-28
VU#959313
8.3
Oracle Outside In OS/2 Metafile parser stack buffer overflow
2017-09-06
2017-09-05
2017-09-06
VU#112992
8.3
Apache Struts 2 framework REST plugin insecurely deserializes untrusted XML data
2014-05-21
2014-05-21
2014-05-23
VU#239151
8.2
Microsoft Internet Explorer 8 CMarkup use-after-free vulnerability
2019-10-16
2019-04-28
2019-10-23
VU#927237
8.2
Pulse Secure VPN contains multiple vulnerabilities
2012-07-11
2012-07-11
2012-07-11
VU#377915
8.1
SMC SMC8024L2 switch web interface authentication bypass
2016-02-17
2016-02-16
2016-03-14
VU#457759
8.1
glibc vulnerable to stack buffer overflow in DNS resolver
2014-06-05
2014-06-05
2015-10-27
VU#978508
8.1
OpenSSL is vulnerable to a man-in-the-middle attack
2015-02-23
2015-02-22
2015-02-26
VU#366544
8.0
Adtrustmedia PrivDog fails to validate SSL certificates
2011-10-05
2011-08-05
2012-11-30
VU#357851
8
UPnP requests accepted over router WAN interfaces
2012-07-24
2012-07-20
2018-03-21
VU#108471
7.9
Symantec Web Gateway contains multiple vulnerabilities
2012-10-10
2012-10-08
2012-10-23
VU#265532
7.9
Multi-vendor IP camera web interface authentication bypass
2018-08-14
2018-08-14
2024-07-15
VU#857035
7.9
IKEv1 Main Mode vulnerable to brute force attacks
2020-03-11
2020-03-10
2020-06-04
VU#872016
7.8
Microsoft SMBv3 compression remote code execution vulnerability
2020-05-14
2020-01-28
2020-05-15
VU#366027
7.8
Samsung Qmage codec for Android Skia library does not properly validate image files
Previous
1
2
You're on page
3
4
5
6
232
Next
Sponsored by
CISA.
Download PGP Key
Read CERT/CC Blog
Learn about Vulnerability Analysis