Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mit kerberos vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2003-0041
Kerberos FTP client allows remote FTP sites to execute arbitrary code via a pipe (|) character in a filename that is retrieved by the client.
Mit Kerberos Ftp Client
Redhat Linux 7.0
Redhat Linux 7.2
Redhat Linux 6.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 7.1
Mandrakesoft Mandrake Linux 8.2
Mandrakesoft Mandrake Linux 8.1
Mandrakesoft Mandrake Linux 9.0
Mandrakesoft Mandrake Multi Network Firewall 8.2
890
VMScore
CVE-2002-1235
The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and previous versions, (2) kadmind in KTH Kerberos 4 (eBones) prior to 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) prior to 0.5.1 when comp...
Kth Kth Kerberos 4
Kth Kth Kerberos 5
Mit Kerberos 5
Debian Debian Linux 3.0
890
VMScore
CVE-2000-0514
GSSFTP FTP daemon in Kerberos 5 1.1.x does not properly restrict access to some FTP commands, which allows remote malicious users to cause a denial of service, and local users to gain root privileges.
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
890
VMScore
CVE-2000-0391
Buffer overflow in krshd in Kerberos 5 allows remote malicious users to gain root privileges.
Cygnus Kerbnet 5.0
Mit Kerberos 4.0
Mit Kerberos 5 1.0
Mit Kerberos 5 1.1.1
Cygnus Cygnus Network Security 4.0
Redhat Linux 6.2
890
VMScore
CVE-2000-0390
Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote malicious users to gain root privileges.
Mit Kerberos 5 1.1.1
Cygnus Cygnus Network Security 4.0
Mit Kerberos 4.0
Cygnus Kerbnet 5.0
Mit Kerberos 5 1.0
Redhat Linux 6.2
828
VMScore
CVE-2012-1015
The kdc_handle_protected_negotiation function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x prior to 1.9.5, and 1.10.x prior to 1.10.3 attempts to calculate a checksum before verifying that the key type is appropriate for a checksum, which allows ...
Mit Kerberos 5 1.8.5
Mit Kerberos 5 1.8.6
Mit Kerberos 5 1.8.3
Mit Kerberos 5 1.8.4
Mit Kerberos 5 1.8.1
Mit Kerberos 5 1.8.2
Mit Kerberos 5 1.8
Mit Kerberos 5 1.9.4
Mit Kerberos 5 1.10.1
Mit Kerberos 5 1.10.2
Mit Kerberos 5 1.10
828
VMScore
CVE-2010-3555
Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CP...
Sun Jre 1.6.0
Sun Jre
Sun Jdk 1.6.0
Sun Jdk
828
VMScore
CVE-2010-3550
Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors.
Sun Jre 1.6.0
Sun Jre
Sun Jdk 1.6.0
Sun Jdk
Sun Jdk 1.5.0
Sun Jre 1.5.0
828
VMScore
CVE-2008-0062
KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via crafted messages that trigger a NULL pointer dereference or double-free.
Mit Kerberos 5
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
Fedoraproject Fedora 8
Fedoraproject Fedora 7
828
VMScore
CVE-2008-0948
Buffer overflow in the RPC library (lib/rpc/rpc_dtablesize.c) used by libgssrpc and kadmind in MIT Kerberos 5 (krb5) 1.2.2, and probably other versions prior to 1.3, when running on systems whose unistd.h does not define the FD_SETSIZE macro, allows remote malicious users to caus...
Mit Kerberos 5 1.2.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »