Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cygnus kerbnet 5.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0389
Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote malicious users to gain root privileges.
Cygnus Kerbnet 5.0
Cygnus Cygnus Network Security 4.0
Mit Kerberos 4.0
Mit Kerberos 5 1.0
Mit Kerberos 5 1.1.1
Redhat Linux 6.2
3 EDB exploits
NA
CVE-2000-0390
Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote malicious users to gain root privileges.
Cygnus Kerbnet 5.0
Cygnus Cygnus Network Security 4.0
Mit Kerberos 4.0
Mit Kerberos 5 1.0
Mit Kerberos 5 1.1.1
Redhat Linux 6.2
NA
CVE-2000-0391
Buffer overflow in krshd in Kerberos 5 allows remote malicious users to gain root privileges.
Cygnus Kerbnet 5.0
Cygnus Cygnus Network Security 4.0
Mit Kerberos 4.0
Mit Kerberos 5 1.0
Mit Kerberos 5 1.1.1
Redhat Linux 6.2
NA
CVE-2000-0392
Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges.
Cygnus Kerbnet 5.0
Cygnus Cygnus Network Security 4.0
Mit Kerberos 4.0
Mit Kerberos 5 1.0
Mit Kerberos 5 1.1.1
Redhat Linux 6.2
NA
CVE-2000-0549
Kerberos 4 KDC program does not properly check for null termination of AUTH_MSG_KDC_REQUEST requests, which allows remote malicious users to cause a denial of service via a malformed request.
Cygnus Kerbnet 5.0
Cygnus Cygnus Network Security 4.0
Mit Kerberos 4.0
Mit Kerberos 5 1.1
Mit Kerberos 5 1.0
Mit Kerberos 5 1.1.1
NA
CVE-2000-0550
Kerberos 4 KDC program improperly frees memory twice (aka "double-free"), which allows remote malicious users to cause a denial of service.
Cygnus Kerbnet 5.0
Cygnus Cygnus Network Security 4.0
Mit Kerberos 4.0
Mit Kerberos 5 1.1
Mit Kerberos 5 1.0
Mit Kerberos 5 1.1.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started