Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cyrus sasl 1.5.28 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-4122
Cyrus SASL 2.1.23, 2.1.26, and previous versions does not properly handle when a NULL value is returned upon an error by the crypt function as implemented in glibc 2.17 and later, which allows remote malicious users to cause a denial of service (thread crash and consumption) via ...
Cmu Cyrus-sasl
Cmu Cyrus-sasl 1.5.28
Cmu Cyrus-sasl 2.1.19
Cmu Cyrus-sasl 2.1.20
Cmu Cyrus-sasl 2.1.21
Cmu Cyrus-sasl 2.1.22
Cmu Cyrus-sasl 2.1.23
Cmu Cyrus-sasl 2.1.24
Cmu Cyrus-sasl 2.1.25
NA
CVE-2004-0884
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and previous versions trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.
Cyrus Sasl 2.1.16
Cyrus Sasl 2.1.13
Conectiva Linux 9.0
Cyrus Sasl 2.1.18 R1
Cyrus Sasl 2.1.11
Cyrus Sasl 1.5.24
Cyrus Sasl 1.5.27
Cyrus Sasl 2.1.14
Cyrus Sasl 1.5.28
Cyrus Sasl 2.1.18
Cyrus Sasl 2.1.12
Cyrus Sasl 2.1.17
Conectiva Linux 10.0
Cyrus Sasl 2.1.9
Cyrus Sasl 2.1.10
Cyrus Sasl 2.1.15
NA
CVE-2009-0688
Multiple buffer overflows in the CMU Cyrus SASL library prior to 2.1.23 might allow remote malicious users to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
Carnegie Mellon University Cyrus-sasl 2.1.21
Carnegie Mellon University Cyrus-sasl 2.1.3
Carnegie Mellon University Cyrus-sasl 1.5.23
Carnegie Mellon University Cyrus-sasl 1.5.5
Carnegie Mellon University Cyrus-sasl 1.5.0
Carnegie Mellon University Cyrus-sasl 2.0.3
Carnegie Mellon University Cyrus-sasl 2.1.17
Carnegie Mellon University Cyrus-sasl 2.1.19
Carnegie Mellon University Cyrus-sasl 1.5.10
Carnegie Mellon University Cyrus-sasl 2.1.2
Carnegie Mellon University Cyrus-sasl 1.5.24
Carnegie Mellon University Cyrus-sasl 2.1.8
Carnegie Mellon University Cyrus-sasl 2.1.6
Carnegie Mellon University Cyrus-sasl 1.5.15
Carnegie Mellon University Cyrus-sasl 2.0.1
Carnegie Mellon University Cyrus-sasl 2.1.14
Carnegie Mellon University Cyrus-sasl 1.5.3
Carnegie Mellon University Cyrus-sasl 2.0.0
Carnegie Mellon University Cyrus-sasl 2.1.20
Carnegie Mellon University Cyrus-sasl
Carnegie Mellon University Cyrus-sasl 1.5.27
Carnegie Mellon University Cyrus-sasl 2.1.16
NA
CVE-2005-0373
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote malicious users to execute arbitrary code.
Cyrus Sasl 2.1.16
Cyrus Sasl 2.1.13
Conectiva Linux 9.0
Cyrus Sasl 2.1.18 R1
Cyrus Sasl 2.1.11
Openpkg Openpkg 2.1
Cyrus Sasl 1.5.24
Cyrus Sasl 1.5.27
Cyrus Sasl 2.1.14
Cyrus Sasl 1.5.28
Cyrus Sasl 2.1.18
Cyrus Sasl 2.1.12
Cyrus Sasl 2.1.17
Openpkg Openpkg 2.2
Suse Suse Cvsup 16.1h 36.i586
Conectiva Linux 10.0
Cyrus Sasl 2.1.9
Cyrus Sasl 2.1.10
Cyrus Sasl 2.1.15
Suse Suse Linux 9.0
Apple Mac Os X Server 10.3.2
Apple Mac Os X Server 10.1.5
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started