search menu icon-carat-right cmu-wordmark

CERT Coordination Center

CERT/CC Vulnerability Notes Database


Published Public Updated ID CVSS Title
2001-07-09 2001-07-09 2003-04-09 VU#310295 Check Point RDP Bypass Vulnerability
2001-07-30 2001-07-11 2003-04-09 VU#135531 Allaire ColdFusion Server contains vulnerability allowing unauthorized user read/delete access to files
2001-12-27 2001-09-26 2003-04-09 VU#500027 3Com HomeConnect Cable Modem vulnerable to DoS via long string of characters
2001-07-24 2001-02-10 2003-04-09 VU#249579 klogd does not adequately handle NULL byte when parsing text using LogLine( )
2002-03-12 2002-01-10 2003-04-09 VU#168795 Oracle 9iAS allows anonymous remote users to view sensitive Apache services by default
2002-11-04 2002-11-04 2003-04-09 VU#266817 Multiple Sun RPC-based libc implementations fails to provide time-out mechanism when reading data from TCP connections
2001-09-20 2001-06-14 2003-04-09 VU#516659 Cisco 6400 Access Concentrator Node Route Processor 2 (NRP2) module permits telnet access when no password has been set
2001-09-14 2001-05-24 2003-04-09 VU#574739 Beck GmbH IPC@Chip does not adequately validate user input thereby disclosing sensitive network data via crafted URL
2001-10-25 2001-10-18 2003-04-09 VU#649979 Oracle9iAS Web Cache vulnerable to buffer overflow
2002-05-29 2002-05-29 2003-04-09 VU#703835 Macromedia JRun ISAPI DLL filter vulnerable to buffer overflow via request for long Host header field
2003-04-07 2003-04-06 2003-04-09 VU#146785 SETI@home client vulnerable to buffer overflow
2003-01-31 2003-01-28 2003-04-04 VU#684563 MIT Kerberos V5 allows inter-realm user impersonation by malicious realm controllers with shared keys
2002-09-16 2002-09-16 2003-04-04 VU#661243 MIT Kerberos V5 KDC vulnerable to denial-of-service via null pointer dereference
2003-01-31 2003-01-28 2003-04-04 VU#587579 MIT Kerberos V5 ASN.1 decoder fails to perform bounds checking on data element length fields
2002-09-12 2002-09-03 2003-04-04 VU#886601 Internet Key Exchange (IKE) protocol discloses identity when Aggressive Mode shared secret authentication is used

Sponsored by CISA.