search menu icon-carat-right cmu-wordmark

CERT Coordination Center

CERT/CC Vulnerability Notes Database


Published Public Updated ID CVSS Title
2001-11-21 2001-11-20 2001-12-06 VU#638011 HP-UX Line Printer Daemon Vulnerable to Directory Traversal
2001-11-21 2001-11-20 2002-12-06 VU#913704 MandrakeSoft Mandrake Linux Apache default configuration enables directory indexing
2001-11-21 2001-11-20 2002-05-28 VU#927256 MandrakeSoft Mandrake Linux Apache default configuration enables Perl ProxyPass server on 8200/tcp
2001-11-27 2000-08-10 2002-06-20 VU#635463 Microsoft SQL Server and Microsoft Data Engine (MSDE) ship with a null default password
2001-11-28 2001-04-30 2002-03-28 VU#886083 WU-FTPD does not properly handle file name globbing
2001-11-28 2001-11-28 2004-03-30 VU#362483 Cisco IOS Firewall Feature Set fails to check IP protocol type thereby allowing packets to bypass dynamic access control lists
2001-11-29 2001-10-10 2001-11-29 VU#952611 Microsoft Internet Explorer (IE) calls telnet.exe with unsafe command-line arguments ("Telnet Invocation")
2001-11-29 2001-01-23 2001-12-17 VU#639760 WU-FTPD configured to use RFC 931 authentication running in debug mode contains format string vulnerability
2001-12-04 2001-11-30 2001-12-04 VU#332299 Lotus Domino R5 Server vulnerable to DoS via nmap RPC scan on port 443/tcp
2001-12-04 2001-12-04 2002-01-02 VU#157447 OpenSSH UseLogin directive permits privilege escalation
2001-12-07 2001-09-27 2001-12-10 VU#905795 OpenSSH fails to properly apply source IP based access control restrictions
2001-12-07 2001-06-19 2001-12-12 VU#797027 OpenSSH does not initialize PAM session thereby allowing PAM restrictions to be bypassed
2001-12-08 2001-06-19 2004-01-14 VU#105259 Oracle Database Server vulnerable to DoS via repeated requests to Oracle listener without connecting to redirected port
2001-12-10 2001-05-29 2003-11-05 VU#403051 GnuPG format string vulnerability in do_get() in ttyio.c while prompting for a new filename
2001-12-12 2001-11-13 2002-01-31 VU#880624 Compaq Tru64 Unix inetd vulnerable to DoS

Sponsored by CISA.