search
menu
icon-carat-right
cmu-wordmark
×
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Carnegie Mellon University
Software Engineering Institute
CERT Coordination Center
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Home
Current:
Notes
CERT/CC Vulnerability Notes Database
Published
Public
Updated
ID
CVSS
Title
2005-02-04
2005-01-31
2007-08-08
VU#625878
Single crafted HTTP request may result in multiple responses
2005-02-04
2005-01-31
2005-02-07
VU#823350
Squid fails to properly handle oversized reply headers
2005-02-04
2005-01-28
2005-02-08
VU#886006
Squid vulnerable to buffer overflow via an overly long WCCP message
2005-01-26
2005-01-26
2006-05-01
VU#409555
Juniper JunOS Routing Engine MPLS denial of service
2005-01-26
2005-01-26
2005-01-26
VU#689326
Cisco IOS vulnerable to DoS via malformed BGP packet
2005-01-26
2005-01-26
2005-02-01
VU#472582
Cisco IOS IPv6 denial-of-service vulnerability
2005-01-26
2005-01-26
2005-01-26
VU#583638
Cisco IOS contains DoS vulnerability in MPLS packet processing
2005-01-25
2005-01-25
2005-03-18
VU#327633
BIND 8.4.4 and 8.4.5 vulnerable to buffer overflow in q_usedns
2005-01-31
2005-01-25
2005-01-31
VU#464662
Apple Mac OS X vulnerable to information disclosure in "Message-ID" header
2005-02-04
2005-01-25
2007-03-05
VU#768702
Multiple devices process HTTP requests inconsistently
2005-01-27
2005-01-25
2005-01-27
VU#980078
Apple Mac OS X vulnerable to buffer overflow in ColorSync ICC color profile handling
2005-01-25
2005-01-25
2005-06-21
VU#938617
BIND 9.3.0 vulnerable to denial of service in validator code
2005-02-21
2005-01-25
2005-02-21
VU#972598
SCO OpenServer vulnerable to privilege escalation in 'scosession' argument handling
2005-02-25
2005-01-22
2005-02-25
VU#620862
Golden FTP server contains a buffer overflow
2005-01-21
2005-01-19
2005-01-21
VU#613384
Cisco IOS embedded call processing solutions contain unspecified DoS vulnerability
Previous
1
147
148
149
You're on page
150
151
152
153
241
Next
Sponsored by
CISA.
Download PGP Key
Read CERT/CC Blog
Learn about Vulnerability Analysis