search menu icon-carat-right cmu-wordmark

CERT Coordination Center

CERT/CC Vulnerability Notes Database


Published Public Updated ID CVSS Title
2001-09-17 2001-04-23 2001-09-17 VU#670568 Samba creates temporary files insecurely
2001-09-17 2001-05-24 2003-04-14 VU#756019 Beck IPC@Chip TelnetD vulnerable to account lockout via idle telnet connection
2001-09-17 2001-08-03 2001-09-17 VU#314347 phpBB does not adequately validate user input thereby allowing user to gain escalated privileges via manipulated SQL query
2001-09-14 2001-05-24 2003-04-09 VU#574739 Beck GmbH IPC@Chip does not adequately validate user input thereby disclosing sensitive network data via crafted URL
2001-09-14 2001-07-10 2002-12-12 VU#943633 FreeBSD can be compromised locally via signal handlers
2001-09-13 2001-09-12 2001-09-13 VU#167739 Trend Micro InterScan eManager vulnerable to remotely exploitable buffer overflow
2001-09-12 2001-09-06 2001-09-12 VU#111947 Microsoft Exchange Outlook Web Access fails to authenticate users when searching the Global Address List
2001-09-10 2001-08-03 2001-09-13 VU#920931 phpBB does not adequately validate user input for language selection thereby allowing user to execute arbitrary php code
2001-09-10 2001-05-24 2001-09-10 VU#718971 Beck GmbH IPC@CHIP HTTPD vulernable to arbitrary file disclosure
2001-09-10 2001-08-28 2001-11-30 VU#274043 BSD Line Printer Daemon vulnerable to buffer overflow via crafted print request
2001-09-07 2001-09-05 2003-10-30 VU#548515 Multiple intrusion detection systems may be circumvented via %u encoding
2001-09-06 2001-09-04 2001-09-06 VU#206723 Network Associates CSMAP and smap/smapd vulnerable to buffer overflow thereby allowing arbitrary command execution
2001-09-05 2001-04-18 2001-09-05 VU#943536 ISC InterNetNews (INN) innfeed contains buffer overflow
2001-09-05 2001-04-03 2001-09-05 VU#123651 IBM AIX lsfs utility invokes grep and lslv with relative pathnames
2001-08-29 2001-06-06 2001-08-30 VU#149424 Outlook Web Access (OWA) executes scripts contained in email attachment opened via Microsoft Internet Explorer (IE)

Sponsored by CISA.