Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cyrus sasl 1.5.28 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2013-4122
Cyrus SASL 2.1.23, 2.1.26, and previous versions does not properly handle when a NULL value is returned upon an error by the crypt function as implemented in glibc 2.17 and later, which allows remote malicious users to cause a denial of service (thread crash and consumption) via ...
Cmu Cyrus-sasl 2.1.22
Cmu Cyrus-sasl 2.1.21
Cmu Cyrus-sasl 2.1.24
Cmu Cyrus-sasl 2.1.25
Cmu Cyrus-sasl 1.5.28
Cmu Cyrus-sasl 2.1.20
Cmu Cyrus-sasl 2.1.19
Cmu Cyrus-sasl
Cmu Cyrus-sasl 2.1.23
7.2
CVSSv2
CVE-2004-0884
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and previous versions trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.
Cyrus Sasl 2.1.10
Cyrus Sasl 2.1.11
Cyrus Sasl 2.1.18
Cyrus Sasl 2.1.18 R1
Cyrus Sasl 2.1.9
Cyrus Sasl 2.1.12
Cyrus Sasl 2.1.13
Conectiva Linux 10.0
Conectiva Linux 9.0
Cyrus Sasl 1.5.24
Cyrus Sasl 2.1.14
Cyrus Sasl 2.1.15
Cyrus Sasl 1.5.27
Cyrus Sasl 1.5.28
Cyrus Sasl 2.1.16
Cyrus Sasl 2.1.17
7.5
CVSSv2
CVE-2009-0688
Multiple buffer overflows in the CMU Cyrus SASL library prior to 2.1.23 might allow remote malicious users to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
Carnegie Mellon University Cyrus-sasl 2.1.19
Carnegie Mellon University Cyrus-sasl
Carnegie Mellon University Cyrus-sasl 1.5.24
Carnegie Mellon University Cyrus-sasl 1.5.15
Carnegie Mellon University Cyrus-sasl 1.5.16
Carnegie Mellon University Cyrus-sasl 1.5.27
Carnegie Mellon University Cyrus-sasl 1.5.3
Carnegie Mellon University Cyrus-sasl 2.0.5
Carnegie Mellon University Cyrus-sasl 2.1.0
Carnegie Mellon University Cyrus-sasl 2.1.1
Carnegie Mellon University Cyrus-sasl 2.1.16
Carnegie Mellon University Cyrus-sasl 2.1.21
Carnegie Mellon University Cyrus-sasl 2.1.20
Carnegie Mellon University Cyrus-sasl 1.5.11
Carnegie Mellon University Cyrus-sasl 1.5.13
Carnegie Mellon University Cyrus-sasl 1.5.23
Carnegie Mellon University Cyrus-sasl 1.5.26
Carnegie Mellon University Cyrus-sasl 2.0.3
Carnegie Mellon University Cyrus-sasl 2.0.4
Carnegie Mellon University Cyrus-sasl 2.1.14
Carnegie Mellon University Cyrus-sasl 2.1.15
Carnegie Mellon University Cyrus-sasl 2.1.6
7.5
CVSSv2
CVE-2005-0373
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote malicious users to execute arbitrary code.
Cyrus Sasl 1.5.24
Cyrus Sasl 1.5.27
Cyrus Sasl 1.5.28
Cyrus Sasl 2.1.16
Cyrus Sasl 2.1.17
Conectiva Linux 9.0
Cyrus Sasl 2.1.12
Cyrus Sasl 2.1.13
Cyrus Sasl 2.1.9
Openpkg Openpkg 2.1
Openpkg Openpkg 2.2
Cyrus Sasl 2.1.10
Cyrus Sasl 2.1.11
Cyrus Sasl 2.1.18
Cyrus Sasl 2.1.18 R1
Cyrus Sasl 2.1.14
Cyrus Sasl 2.1.15
Suse Suse Cvsup 16.1h 36.i586
Conectiva Linux 10.0
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.2.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started