search
menu
icon-carat-right
cmu-wordmark
×
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Carnegie Mellon University
Software Engineering Institute
CERT Coordination Center
Home
Notes
Search
Report a Vulnerability
Disclosure Guidance
VINCE
Home
Current:
Notes
CERT/CC Vulnerability Notes Database
Published
Public
Updated
ID
CVSS
Title
2000-12-14
2000-09-26
2001-01-17
VU#800893
Microsoft Internet Explorer vulnerable to file disclosure via code containing GetObject() function
2000-11-16
2000-05-13
2001-01-11
VU#31994
MS ActiveMovieControl Object downloads arbitrary files
2001-01-10
2001-01-09
2001-01-11
VU#247371
Borland/Inprise Interbase SQL database server contains backdoor superuser account with known password
2000-12-19
2000-12-09
2001-01-11
VU#602625
KTH Kerberos environment variables krb4proxy and KRBCONFDIR may be used insecurely
2000-12-19
2000-12-09
2001-01-11
VU#759265
Kerberos client code buffer overflow in kdc_reply_cipher()
2000-12-19
2000-12-09
2001-01-11
VU#426273
KTH Kerberos filesystem race condition on tickets stored in /tmp
2001-01-10
2001-01-11
2001-01-10
VU#403307
Seagate Crystal Reports exposes cleartext username/password pairs when embedded in URL or HTTP request
2001-01-10
2001-01-05
2001-01-10
VU#590487
Lotus Domino vulnerable to directory traversal, aka "Domino Server Directory Transversal Vulnerability"
2000-12-21
2000-12-04
2000-12-22
VU#593299
BSD-derived ftpd replydirname() in ftpd.c contains one-byte overflow
2000-12-15
1997-05-24
2000-12-15
VU#20851
SGI IRIX df buffer overflow in directory argument
2000-11-02
2000-08-03
2000-12-13
VU#31554
Adobe Acrobat products have buffer overflow in the CIDFont /Registry and /Ordering entries
2000-12-12
2000-12-10
2000-12-12
VU#17566
sysback makes call to hostname without a fully qualified path specification
2000-10-06
2000-08-24
2000-11-29
VU#747124
ADK flaw in recent versions of PGP
2000-09-26
2000-07-27
2000-11-29
VU#32650
Denial of Service Attack in NetBIOS Services
2000-10-30
2000-07-16
2000-11-29
VU#34043
rpc.statd vulnerable to remote root compromise via format string stack overwrite
Previous
1
237
238
239
You're on page
240
241
Next
Sponsored by
CISA.
Download PGP Key
Read CERT/CC Blog
Learn about Vulnerability Analysis