Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kerberos 5 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2002-1235
The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and previous versions, (2) kadmind in KTH Kerberos 4 (eBones) prior to 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) prior to 0.5.1 when comp...
Mit Kerberos 5
Kth Kth Kerberos 4
Kth Kth Kerberos 5
Debian Debian Linux 3.0
10
CVSSv2
CVE-2002-0391
Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote malicious users to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services suc...
Openbsd Openbsd 3.1
Sun Sunos 5.7
Sun Sunos 5.8
Sun Sunos 5.5.1
Sun Solaris 2.6
Sun Solaris 9.0
Freebsd Freebsd
Microsoft Windows Nt 4.0
Microsoft Windows Xp -
Microsoft Windows 2000 -
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Netkit Linux Netkit 0.11
Mit Kerberos 5 1.1
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Ibm Aix 4.3.2
Ibm Aix 4.3
Sun Sunos 5.3
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 3.0
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Freebsd Freebsd 2.2.2
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
1 EDB exploit
10
CVSSv2
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.1
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.11
Sgi Irix 6.5.7
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
3 EDB exploits
10
CVSSv2
CVE-2000-0514
GSSFTP FTP daemon in Kerberos 5 1.1.x does not properly restrict access to some FTP commands, which allows remote malicious users to cause a denial of service, and local users to gain root privileges.
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
10
CVSSv2
CVE-2000-0390
Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote malicious users to gain root privileges.
Cygnus Kerbnet 5.0
Cygnus Cygnus Network Security 4.0
Mit Kerberos 4.0
Mit Kerberos 5 1.0
Mit Kerberos 5 1.1.1
Redhat Linux 6.2
10
CVSSv2
CVE-2000-0391
Buffer overflow in krshd in Kerberos 5 allows remote malicious users to gain root privileges.
Cygnus Kerbnet 5.0
Cygnus Cygnus Network Security 4.0
Mit Kerberos 4.0
Mit Kerberos 5 1.0
Mit Kerberos 5 1.1.1
Redhat Linux 6.2
10
CVSSv2
CVE-2000-0389
Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote malicious users to gain root privileges.
Cygnus Kerbnet 5.0
Cygnus Cygnus Network Security 4.0
Mit Kerberos 4.0
Mit Kerberos 5 1.0
Mit Kerberos 5 1.1.1
Redhat Linux 6.2
3 EDB exploits
9.3
CVSSv2
CVE-2012-1015
The kdc_handle_protected_negotiation function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x prior to 1.9.5, and 1.10.x prior to 1.10.3 attempts to calculate a checksum before verifying that the key type is appropriate for a checksum, which allows ...
Mit Kerberos 5 1.8
Mit Kerberos 5 1.8.1
Mit Kerberos 5 1.8.2
Mit Kerberos 5 1.8.3
Mit Kerberos 5 1.8.4
Mit Kerberos 5 1.8.5
Mit Kerberos 5 1.8.6
Mit Kerberos 5 1.9.4
Mit Kerberos 5 1.10
Mit Kerberos 5 1.10.1
Mit Kerberos 5 1.10.2
9.3
CVSSv2
CVE-2010-3550
Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors.
Sun Jre 1.6.0
Sun Jre
Sun Jdk 1.6.0
Sun Jdk
Sun Jdk 1.5.0
Sun Jre 1.5.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »