search menu icon-carat-right cmu-wordmark

CERT Coordination Center

CERT/CC Vulnerability Notes Database


Published Public Updated ID CVSS Title
2002-06-18 2002-06-17 2002-06-18 VU#664323 webMathematica discloses the contents of arbitrary files when file is requested using the absolute path
2002-06-18 2002-06-17 2007-11-02 VU#944335 Apache web servers fail to handle chunks with a negative size
2002-06-25 2002-06-17 2002-06-25 VU#455323 Mandrake Security may make unexpected system modifications
2002-08-08 2002-06-18 2008-07-21 VU#195371 SGI IRIX rpc.xfsmd does not filter shell metacharacters from user input before invoking popen() function
2002-08-08 2002-06-20 2002-08-08 VU#521147 SGI IRIX rpc.xfsmd uses weak authentication mechanism for RPC authentication
2003-04-17 2002-06-24 2003-06-17 VU#104555 Buffer Overflow in mod_ssl
2002-06-26 2002-06-24 2002-12-06 VU#369347 OpenSSH vulnerabilities in challenge response handling
2002-06-28 2002-06-25 2004-12-20 VU#814627 Sendmail vulnerable to buffer overflow when DNS map is specified using TXT records
2002-06-27 2002-06-26 2003-04-16 VU#803539 Multiple vendors' Domain Name System (DNS) stub resolvers vulnerable to buffer overflows
2002-08-01 2002-06-26 2002-08-28 VU#542971 Multiple vendors' Domain Name System (DNS) stub resolvers vulnerable to buffer overflow via network name and address lookups
2002-06-27 2002-06-27 2002-12-12 VU#290140 Multiple Cisco products consume excessive CPU resources in response to large SSH packets
2002-07-11 2002-07-10 2002-07-20 VU#975403 Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) does not adequately validate file descriptor arguement to _TT_ISCLOSE()
2002-07-11 2002-07-10 2002-07-11 VU#821139 Network Associates PGP Outlook Plug-in contains buffer overflow in decoding mechanism
2002-07-11 2002-07-10 2002-08-15 VU#299816 Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) does not adequately validate file operations
2002-07-16 2002-07-10 2002-07-22 VU#888547 Real Networks RealONE Player vulnerable to arbitrary command execution via crafted html in the skin file

Sponsored by CISA.