search
menu
icon-carat-right
cmu-wordmark
×
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Carnegie Mellon University
Software Engineering Institute
CERT Coordination Center
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Home
Current:
Notes
CERT/CC Vulnerability Notes Database
Published
Public
Updated
ID
CVSS
Title
2006-04-03
1999-04-19
2006-05-02
VU#808921
eBay contains a cross-site scripting vulnerability
2006-04-20
2006-04-18
2006-05-03
VU#452681
Oracle Export component SQL injection vulnerability
2006-04-20
2006-04-18
2006-05-03
VU#940729
Oracle Diagnostics Interfaces vulnerability
2006-04-19
2006-04-18
2006-05-03
VU#443265
Oracle Reporting Framework vulnerability
2006-02-09
2006-02-07
2006-05-03
VU#759996
Sun Java Reflection API security bypass vulnerabilities
2006-05-04
2006-04-26
2006-05-04
VU#477604
Juniper Networks IVE client ActiveX control buffer overflow
2006-04-19
2006-04-19
2006-05-05
VU#621566
Linksys RT31P2 VoIP router denial of service vulnerabilities
2002-07-26
2002-07-24
2006-05-08
VU#484891
Microsoft SQL Server 2000 contains stack buffer overflow in SQL Server Resolution Service
2001-07-18
2001-07-20
2006-05-09
VU#814187
Symantec LiveUpdate stores proxy server passwords in plaintext in registry
2005-11-11
2005-11-07
2006-05-09
VU#146284
0
Macromedia Flash Player fails to properly validate the frame type identifier read from a "SWF" file
2006-05-12
2006-05-11
2006-05-12
VU#519473
Apple Safari fails to properly handle archive files containing symbolic links
2002-08-01
2002-07-31
2006-05-15
VU#192995
Integer overflow in xdr_array() function when deserializing the XDR stream
2006-04-11
2006-04-11
2006-05-15
VU#641460
Microsoft Windows fails to properly handle COM objects
2006-05-16
2006-05-11
2006-05-16
VU#186944
EMC Retrospect Client buffer overflow vulnerability
2006-02-09
2005-09-28
2006-05-17
VU#693909
PAM-MySQL contains a double-free vulnerability
Previous
1
106
107
108
You're on page
109
110
111
112
240
Next
Sponsored by
CISA.
Download PGP Key
Read CERT/CC Blog
Learn about Vulnerability Analysis