search
menu
icon-carat-right
cmu-wordmark
×
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Carnegie Mellon University
Software Engineering Institute
CERT Coordination Center
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Home
Current:
Notes
CERT/CC Vulnerability Notes Database
Published
Public
Updated
ID
CVSS
Title
2008-01-31
2008-01-10
2008-01-31
VU#326065
Liferay Portal Enterprise Admin User-Agent HTTP header XSS
2008-01-31
2008-01-10
2008-01-31
VU#767825
Liferay Portal fails to protect against CSRF
2008-01-15
2008-01-15
2008-07-22
VU#347812
UPnP enabled by default in multiple devices
2008-01-22
2008-01-17
2008-04-29
VU#248184
Skype does not properly filter input from external websites
2008-01-22
2008-01-17
2008-01-23
VU#412228
Citrix Presentation Server heap based buffer overflow
2008-03-19
2008-01-17
2008-03-19
VU#203220
X.Org PCF font parser buffer overflow
2008-01-25
2008-01-24
2008-01-25
VU#308556
GE Fanuc CIMPLICITY HMI heap buffer overflow
2008-03-06
2008-01-24
2008-03-06
VU#158609
IBM Tivoli Provisioning Manager for OS Deployment (TPMfOSD) allows buffer overflow via HTTP request
2008-01-25
2008-01-24
2008-11-13
VU#180876
0
GE Fanuc Proficy Information Portal transmits authentication credentials in plain text
2008-01-25
2008-01-24
2008-12-18
VU#339345
GE Fanuc Proficy Information Portal allows arbitrary file upload and execution
2008-01-30
2008-01-30
2008-01-30
VU#639169
SwiftView ActiveX control and plug-in stack buffer overflow
2008-02-13
2008-01-31
2008-02-13
VU#794236
SkypeFind fails to properly sanitize user-supplied input
2008-03-15
2008-02-01
2008-03-17
VU#721460
UltraVNC buffer overflow vulnerability
2008-02-05
2008-02-02
2008-02-13
VU#101676
Yahoo! Music Jukebox YMP Datagrid ActiveX control stack buffer overflows
2008-02-05
2008-02-03
2008-02-13
VU#340860
Yahoo! Music Jukebox Yahoo! MediaGrid ActiveX control stack buffer overflow
Previous
1
159
160
161
You're on page
162
163
164
165
240
Next
Sponsored by
CISA.
Download PGP Key
Read CERT/CC Blog
Learn about Vulnerability Analysis