search
menu
icon-carat-right
cmu-wordmark
×
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Carnegie Mellon University
Software Engineering Institute
CERT Coordination Center
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Home
Current:
Notes
CERT/CC Vulnerability Notes Database
Published
Public
Updated
ID
CVSS
Title
2011-09-13
2011-09-13
2012-03-28
VU#909022
7
Microsoft Office uninitialized object pointer vulnerability
2011-10-11
2011-10-11
2012-03-28
VU#619281
7
Windows font library file buffer overflow
2011-11-08
2011-11-08
2012-03-28
VU#675073
6.2
Microsoft Windows TrueType font array indexing vulnerability
2011-12-13
2011-12-13
2012-03-28
VU#361441
7
Microsoft Office Publisher contains multiple exploitable vulnerabilities
2012-02-02
2012-02-02
2012-03-28
VU#410281
7
Apple Mac OS X CoreText embedded font vulnerability
2012-02-02
2012-02-02
2012-03-28
VU#403593
7
Apple Mac OS X ATS data-font memory corruption vulnerability
2009-06-09
2009-06-09
2012-03-28
VU#568153
7
Adobe Reader contains multiple vulnerabilities in the processing of JPX data
2009-06-19
2009-06-19
2012-03-28
VU#251793
7
Foxit Reader contains multiple vulnerabilities in the processing of JPX data
2009-09-05
2009-09-04
2012-03-28
VU#444513
7
VMware VMnc AVI video codec image height heap overflow
2009-12-14
2009-12-08
2012-03-28
VU#228561
7.7
Microsoft Indeo video codecs contain multiple vulnerabilities
2010-06-07
2010-06-04
2012-03-28
VU#486225
7
Adobe Flash ActionScript AVM2 newfunction vulnerability
2010-08-10
2010-08-10
2012-03-28
VU#660993
7
Adobe Flash 10.1 ActionScript AVM1 ActionPush vulnerability
2009-04-16
2009-04-16
2012-03-28
VU#196617
7
Xpdf and poppler contain multiple vulnerabilities in the processing of JBIG2 data
2012-03-08
2012-03-02
2012-03-28
VU#504019
3
AjaXplorer contains multiple vulnerabilities
2012-03-22
2012-03-22
2012-03-28
VU#743555
4.7
@Mail Open webmail client contains multiple vulnerabilities
Previous
1
53
54
55
You're on page
56
57
58
59
240
Next
Sponsored by
CISA.
Download PGP Key
Read CERT/CC Blog
Learn about Vulnerability Analysis