Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kerberos vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2000-0389
Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote malicious users to gain root privileges.
Cygnus Cygnus Network Security 4.0
Cygnus Kerbnet 5.0
Mit Kerberos 5 1.0
Mit Kerberos 4.0
Mit Kerberos 5 1.1.1
Redhat Linux 6.2
3 EDB exploits
10
CVSSv2
CVE-2000-0390
Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote malicious users to gain root privileges.
Mit Kerberos 5 1.1.1
Cygnus Cygnus Network Security 4.0
Mit Kerberos 4.0
Cygnus Kerbnet 5.0
Mit Kerberos 5 1.0
Redhat Linux 6.2
10
CVSSv2
CVE-2000-0391
Buffer overflow in krshd in Kerberos 5 allows remote malicious users to gain root privileges.
Cygnus Kerbnet 5.0
Mit Kerberos 4.0
Mit Kerberos 5 1.0
Mit Kerberos 5 1.1.1
Cygnus Cygnus Network Security 4.0
Redhat Linux 6.2
9.3
CVSSv2
CVE-2020-1013
<p>An elevation of privilege vulnerability exists when Microsoft Windows processes group policy updates. An attacker who successfully exploited this vulnerability could potentially escalate permissions or perform additional privileged actions on the target machine.</p>...
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows 10 1709
Microsoft Windows 10 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows Server 2016 1903
Microsoft Windows 10 1903
Microsoft Windows Server 2016 1909
Microsoft Windows 10 1909
Microsoft Windows 10 2004
Microsoft Windows Server 2016 2004
2 Github repositories
9.3
CVSSv2
CVE-2019-0734
An elevation of privilege vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully decode and replace authentication request using Kerberos, allowing an malicious user to be validated as an Administrator.The update addresses this vulnera...
Microsoft Windows 8.1 -
Microsoft Windows 10 -
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008 -
Microsoft Windows 10 1703
Microsoft Windows 10 1709
Microsoft Windows 10 1803
Microsoft Windows 10 1809
Microsoft Windows 10 1903
Microsoft Windows 7 -
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016 -
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2016 1903
Microsoft Windows Rt 8.1 -
Microsoft Windows 10 1607
Microsoft Windows Server 2012 -
Microsoft Windows Server 2019
1 Article
9.3
CVSSv2
CVE-2012-1015
The kdc_handle_protected_negotiation function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x prior to 1.9.5, and 1.10.x prior to 1.10.3 attempts to calculate a checksum before verifying that the key type is appropriate for a checksum, which allows ...
Mit Kerberos 5 1.8.5
Mit Kerberos 5 1.8.6
Mit Kerberos 5 1.8.3
Mit Kerberos 5 1.8.4
Mit Kerberos 5 1.8.1
Mit Kerberos 5 1.8.2
Mit Kerberos 5 1.8
Mit Kerberos 5 1.9.4
Mit Kerberos 5 1.10.1
Mit Kerberos 5 1.10.2
Mit Kerberos 5 1.10
9.3
CVSSv2
CVE-2010-3550
Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors.
Sun Jre 1.6.0
Sun Jre
Sun Jdk 1.6.0
Sun Jdk
Sun Jdk 1.5.0
Sun Jre 1.5.0
9.3
CVSSv2
CVE-2010-3555
Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote malicious users to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CP...
Sun Jre 1.6.0
Sun Jre
Sun Jdk 1.6.0
Sun Jdk
9.3
CVSSv2
CVE-2008-5359
Buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and previous versions; JDK and JRE 5.0 Update 16 and previous versions; SDK and JRE 1.4.2_18 and previous versions; and SDK and JRE 1.3.1_23 and previous versions might allow remote malicious users ...
Sun Jre 1.6.0
Sun Jre 1.5.0
Sun Jre 1.4.2 3
Sun Jre 1.4.2 4
Sun Jre 1.4.2 5
Sun Jre 1.4.2 6
Sun Jre 1.4.2 7
Sun Jre 1.3.1 2
Sun Jre 1.3.1 03
Sun Jre 1.3.1 04
Sun Jre 1.3.1 05
Sun Jre 1.3.1 19
Sun Jre 1.3.1 20
Sun Jre 1.3.1 21
Sun Jre 1.3.1 22
Sun Jre 1.4.2 1
Sun Jre 1.4.2 8
Sun Jre 1.4.2 10
Sun Jre 1.4.2 17
Sun Jre 1.3.1
Sun Jre 1.3.1 06
Sun Jre 1.3.1 08
9.3
CVSSv2
CVE-2008-5354
Stack-based buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and previous versions; JDK and JRE 5.0 Update 16 and previous versions; and SDK and JRE 1.4.2_18 and previous versions allows locally-launched and possibly remote untrusted Java applicat...
Sun Jdk 6
Sun Jre 6
Sun Jre 5.0
Sun Jdk 5.0
Sun Sdk
Sun Jre 1.4.2 17
Sun Sdk 1.4.2 14
Sun Jre 1.4.2 13
Sun Sdk 1.4.2 10
Sun Sdk 1.4.2 16
Sun Jre 1.4.2 15
Sun Sdk 1.4.2 12
Sun Jre 1.4.2 11
Sun Sdk 1.4.2 8
Sun Jre 1.4.2 7
Sun Sdk 1.4.2 7
Sun Jre 1.4.2 3
Sun Sdk 1.4.2 3
Sun Jdk
Sun Jre
Sun Jre 1.4.2 9
Sun Jre 1.4.2 5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »