Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cyrus sasl 2.1.17 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-2004-0884
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and previous versions trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.
Cyrus Sasl 2.1.10
Cyrus Sasl 2.1.11
Cyrus Sasl 2.1.18
Cyrus Sasl 2.1.18 R1
Cyrus Sasl 2.1.9
Cyrus Sasl 2.1.12
Cyrus Sasl 2.1.13
Conectiva Linux 10.0
Conectiva Linux 9.0
Cyrus Sasl 1.5.24
Cyrus Sasl 2.1.14
Cyrus Sasl 2.1.15
Cyrus Sasl 1.5.27
Cyrus Sasl 1.5.28
Cyrus Sasl 2.1.16
Cyrus Sasl 2.1.17
668
VMScore
CVE-2009-0688
Multiple buffer overflows in the CMU Cyrus SASL library prior to 2.1.23 might allow remote malicious users to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
Carnegie Mellon University Cyrus-sasl 2.1.19
Carnegie Mellon University Cyrus-sasl
Carnegie Mellon University Cyrus-sasl 1.5.24
Carnegie Mellon University Cyrus-sasl 1.5.15
Carnegie Mellon University Cyrus-sasl 1.5.16
Carnegie Mellon University Cyrus-sasl 1.5.27
Carnegie Mellon University Cyrus-sasl 1.5.3
Carnegie Mellon University Cyrus-sasl 2.0.5
Carnegie Mellon University Cyrus-sasl 2.1.0
Carnegie Mellon University Cyrus-sasl 2.1.1
Carnegie Mellon University Cyrus-sasl 2.1.16
Carnegie Mellon University Cyrus-sasl 2.1.21
Carnegie Mellon University Cyrus-sasl 2.1.20
Carnegie Mellon University Cyrus-sasl 1.5.11
Carnegie Mellon University Cyrus-sasl 1.5.13
Carnegie Mellon University Cyrus-sasl 1.5.23
Carnegie Mellon University Cyrus-sasl 1.5.26
Carnegie Mellon University Cyrus-sasl 2.0.3
Carnegie Mellon University Cyrus-sasl 2.0.4
Carnegie Mellon University Cyrus-sasl 2.1.14
Carnegie Mellon University Cyrus-sasl 2.1.15
Carnegie Mellon University Cyrus-sasl 2.1.6
668
VMScore
CVE-2005-0373
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote malicious users to execute arbitrary code.
Cyrus Sasl 1.5.24
Cyrus Sasl 1.5.27
Cyrus Sasl 1.5.28
Cyrus Sasl 2.1.16
Cyrus Sasl 2.1.17
Conectiva Linux 9.0
Cyrus Sasl 2.1.12
Cyrus Sasl 2.1.13
Cyrus Sasl 2.1.9
Openpkg Openpkg 2.1
Openpkg Openpkg 2.2
Cyrus Sasl 2.1.10
Cyrus Sasl 2.1.11
Cyrus Sasl 2.1.18
Cyrus Sasl 2.1.18 R1
Cyrus Sasl 2.1.14
Cyrus Sasl 2.1.15
Suse Suse Cvsup 16.1h 36.i586
Conectiva Linux 10.0
Apple Mac Os X 10.1.1
Apple Mac Os X 10.1.2
Apple Mac Os X 10.2.3
580
VMScore
CVE-2022-24407
In Cyrus SASL 2.1.17 up to and including 2.1.27 prior to 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.
Cyrusimap Cyrus-sasl
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Fedoraproject Fedora 34
Fedoraproject Fedora 35
Fedoraproject Fedora 36
Netapp Ontap Select Deploy Administration Utility -
Netapp Active Iq Unified Manager -
Oracle Communications Cloud Native Core Security Edge Protection Proxy 22.1.1
Oracle Communications Cloud Native Core Console 22.2.0
Oracle Communications Cloud Native Core Network Function Cloud Native Environment 22.2.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started