Known vulnerabilities in EmbedThis GoAhead

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › EmbedThis › GoAhead

Known vulnerabilities in EmbedThis GoAhead

Vendor: EmbedThis
Website: https://www.embedthis.com/
Total Security Bulletins: 9
5.1.1 5.1.0 5.0.1 5.0.0 4.1.2 4.1.1 4.1.0 4.0.2 4.0.1 4.0.0 3.6.5 3.6.4 3.6.3 3.6.2 3.6.1 3.6.0 3.5.0 3.4.12 3.4.11 3.4.10 3.4.9 3.4.8 3.4.7 3.4.6 3.4.5 3.4.4 3.4.3 3.4.2 3.4.1 3.4.0 3.3.6 3.3.5 3.3.4 3.3.3 3.3.2 3.3.1 3.3.0 3.1.3 3.1.2 3.1.1 3.1.0 3.0.0 2.5.0 2.1.8 2.1.5

Security bulletins (9)

Secuity bulletin Severity Status Published
SB2019120306: Multiple vulnerabilities in EmbedThis GoAhead High
Patched Public exploit
03.12.2019
SB2019112220: Buffer Over-read in EmbedThis GoAhead Medium
Patched
22.11.2019
SB2019092019: Improper Neutralization of Special Elements in Output Used by a Downstream Component in EmbedThis GoAhead High
Patched
20.09.2019
SB2019061901: Denial of service in Embedthis GoAhead Low
Patched
19.06.2019
SB2018081801: NULL pointer dereference in EmbedThis GoAhead Medium
Patched
18.08.2018
SB2018081802: NULL pointer dereference in EmbedThis GoAhead Medium
Patched
18.08.2018
SB2018010311: NULL pointer dereference in EmbedThis GoAhead High
Not patched
03.01.2018
SB2017090518: NULL pointer dereference in EmbedThis GoAhead Medium
Not patched
05.09.2017
SB2015033105: Heap-based buffer overflow in EmbedThis GoAhead Medium
Not patched Public exploit
31.03.2015


Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or