Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mit kerberos 4 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2007-3999
Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 up to and including 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party application...
Mit Kerberos 5 1.4.1
Mit Kerberos 5 1.4.2
Mit Kerberos 5 1.6
Mit Kerberos 5 1.6.1
Mit Kerberos 5 1.4.3
Mit Kerberos 5 1.4.4
Mit Kerberos 5 1.6.2
Mit Kerberos 5 1.4
Mit Kerberos 5 1.5.2
Mit Kerberos 5 1.5.3
Mit Kerberos 5 1.5
Mit Kerberos 5 1.5.1
7.5
CVSSv2
CVE-2005-1689
Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and previous versions allows remote malicious users to execute arbitrary code via certain error conditions.
Mit Kerberos 5
Apple Mac Os X Server
Apple Mac Os X
Debian Debian Linux 3.1
Debian Debian Linux 3.0
5
CVSSv2
CVE-2005-1174
MIT Kerberos 5 (krb5) 1.3 up to and including 1.4.1 Key Distribution Center (KDC) allows remote malicious users to cause a denial of service (application crash) via a certain valid TCP connection that causes a free of unallocated memory.
Mit Kerberos 5 1.3.4
Mit Kerberos 5 1.3.5
Mit Kerberos 5 1.3
Mit Kerberos 5 1.3.1
Mit Kerberos 5 1.4.1
Mit Kerberos 5 1.3.2
Mit Kerberos 5 1.3.3
Mit Kerberos 5 1.3.6
Mit Kerberos 5 1.4
7.5
CVSSv2
CVE-2005-1175
Heap-based buffer overflow in the Key Distribution Center (KDC) in MIT Kerberos 5 (krb5) 1.4.1 and previous versions allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a certain valid TCP or UDP request.
Mit Kerberos 5 1.3.2
Mit Kerberos 5 1.3.3
Mit Kerberos 5 1.3.4
Mit Kerberos 5 1.4
Mit Kerberos 5 1.4.1
Mit Kerberos 5 1.3
Mit Kerberos 5 1.3.1
Mit Kerberos 5 1.3.5
Mit Kerberos 5 1.3.6
7.5
CVSSv2
CVE-2005-0469
Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote malicious users to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
Ncsa Telnet
7.5
CVSSv2
CVE-2004-0772
Double free vulnerabilities in error handling code in krb524d for MIT Kerberos 5 (krb5) 1.2.8 and previous versions may allow remote malicious users to execute arbitrary code.
Mit Kerberos 5
Openpkg Openpkg 2.0
Openpkg Openpkg 2.1
Debian Debian Linux 3.0
7.5
CVSSv2
CVE-2003-0138
Version 4 of the Kerberos protocol (krb4), as used in Heimdal and other packages, allows an malicious user to impersonate any principal in a realm via a chosen-plaintext attack.
Mit Kerberos 4
7.5
CVSSv2
CVE-2003-0139
Certain weaknesses in the implementation of version 4 of the Kerberos protocol (krb4) in the krb5 distribution, when triple-DES keys are used to key krb4 services, allow an malicious user to create krb4 tickets for unauthorized principals using a cut-and-paste attack and "ti...
Mit Kerberos 4
10
CVSSv2
CVE-2002-1235
The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and previous versions, (2) kadmind in KTH Kerberos 4 (eBones) prior to 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) prior to 0.5.1 when comp...
Kth Kth Kerberos 4
Kth Kth Kerberos 5
Mit Kerberos 5
Debian Debian Linux 3.0
5
CVSSv2
CVE-2002-1146
The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and previous versions, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual bo...
Gnu Glibc
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »