search menu icon-carat-right cmu-wordmark

CERT Coordination Center

CERT/CC Vulnerability Notes Database


Published Public Updated VU# CVSS Title
2002-02-12 2002-02-12 2007-11-07 VU#854306 Multiple vulnerabilities in SNMPv1 request handling
2018-09-05 2018-09-05 2018-10-23 VU#598349 0 Automatic DNS registration and proxy autodiscovery allow spoofing of network services
2018-10-06 2018-10-06 2018-10-16 VU#176301 0 Auto-Maskin DCU 210E RP 210E and Marine Pro Observer App
2010-08-25 1998-03-18 2016-10-13 VU#707943 0 Microsoft Windows based applications may insecurely load dynamic libraries
2003-03-06 1970-01-01 2017-07-10 VU#789985 0 Physical access to a computer system can be used to bypass software-based access control mechanisms
2017-11-17 2017-11-16 2017-11-20 VU#817544 0 Windows 8 and later fail to properly randomize every application if system-wide mandatory ASLR is enabled via EMET or Windows Defender Exploit Guard
2008-07-08 2008-07-08 2014-04-14 VU#800113 0 Multiple DNS implementations vulnerable to cache poisoning
2005-12-06 2005-12-01 2012-08-30 VU#948385 0 Perl contains an integer sign error in format string processing
2017-07-20 2017-07-20 2017-10-30 VU#586501 0 Inmarsat AmosConnect8 Mail Client Vulnerable to SQL Injection and Backdoor Account
2006-04-17 2006-04-13 2017-01-20 VU#488774 0 Mozilla XBL binding vulnerability
2005-01-07 2004-12-23 2014-04-23 VU#177584 0 Microsoft Windows kernel vulnerable to a denial-of-service condition via animated cursor (.ani) frame number
2009-11-23 2006-07-20 2013-02-13 VU#723308 0 TCP may keep its offered receive window closed indefinitely (RFC 1122)
2014-12-19 2014-12-12 2015-01-07 VU#1680209 0 AppsGeyser generates Android applications that fail to properly validate SSL certificates
2011-11-08 2011-11-03 2015-09-30 VU#702169 0 Dell KACE K2000 Appliance read-only database account allows account information disclosure
2009-04-06 1997-06-07 2016-08-12 VU#908801 0 Particle Software IntraLaunch Application Launcher ActiveX control fails to restrict access to dangerous methods

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.