Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kerberos vulnerabilities and exploits
(subscribe to this query)
3.5
CVSSv2
CVE-2010-4020
MIT Kerberos 5 (aka krb5) 1.8.x up to and including 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that r...
Mit Kerberos 5 1.8
Mit Kerberos 5 1.8.1
Mit Kerberos 5 1.8.2
Mit Kerberos 5 1.8.3
3.5
CVSSv2
CVE-2013-1417
do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.11 prior to 1.11.4, when a single-component realm name is used, allows remote authenticated users to cause a denial of service (daemon crash) via a TGS-REQ request that triggers an attempted cross-re...
Mit Kerberos 5 1.11
Mit Kerberos 5 1.11.1
Mit Kerberos 5 1.11.2
Mit Kerberos 5 1.11.3
7.5
CVSSv2
CVE-2003-0060
Format string vulnerabilities in the logging routines for MIT Kerberos V5 Key Distribution Center (KDC) prior to 1.2.5 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in Kerberos principal names.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.2.3
Mit Kerberos 5 1.2.4
5
CVSSv2
CVE-2002-0036
Integer signedness error in MIT Kerberos V5 ASN.1 decoder before krb5 1.2.5 allows remote malicious users to cause a denial of service via a large unsigned data element length, which is later used as a negative value.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.2.3
Mit Kerberos 5 1.2.4
4
CVSSv2
CVE-2010-1320
Double free vulnerability in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x prior to 1.8.2 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a request associated wit...
Mit Kerberos 5 1.7
Mit Kerberos 5 1.7.1
Mit Kerberos 5 1.8
Mit Kerberos 5 1.8.1
1 EDB exploit
6.5
CVSSv2
CVE-2010-1322
The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x prior to 1.8.4 does not properly manage an index into an authorization-data list, which allows remote malicious users to cause a denial of service (daemon crash),...
Mit Kerberos 5 1.8
Mit Kerberos 5 1.8.1
Mit Kerberos 5 1.8.2
Mit Kerberos 5 1.8.3
7.2
CVSSv2
CVE-2006-3083
The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x prior to 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and previous versions, do not check return codes for setuid calls, which allows local users to gain privileges by causin...
Heimdal Heimdal 0.7.2
Mit Kerberos 5 1.4
Mit Kerberos 5 1.4.1
Mit Kerberos 5 1.4.2
Mit Kerberos 5 1.4.3
Mit Kerberos 5 1.5
6.9
CVSSv2
CVE-2020-13110
The kerberos package prior to 1.0.0 for Node.js allows arbitrary code execution and privilege escalation via injection of malicious DLLs through use of the kerberos_sspi LoadLibrary() method, because of a DLL path search.
Kerberos Project Kerberos
5
CVSSv2
CVE-2000-0546
Buffer overflow in Kerberos 4 KDC program allows remote malicious users to cause a denial of service via the lastrealm variable in the set_tgtkey function.
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Mit Kerberos 5
Mit Kerberos 4.0
Cygnus Network Security Project Cygnus Network Security -
Kerbnet Project Kerbnet -
Mit Kerberos
5
CVSSv2
CVE-2000-0547
Buffer overflow in Kerberos 4 KDC program allows remote malicious users to cause a denial of service via the localrealm variable in the process_v4 function.
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Mit Kerberos 5
Mit Kerberos 4.0
Cygnus Network Security Project Cygnus Network Security -
Kerbnet Project Kerbnet -
Mit Kerberos
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30065
CVE-2024-5843
CVE-2024-30080
code execution
CVE-2024-4577
CVE-2024-26169
wireless
remote code execution
CVE-2024-36103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »