Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kerberos project kerberos vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2009-0361
Russ Allbery pam-krb5 prior to 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME env...
Eyrie Pam-krb5 3.2
Eyrie Pam-krb5 3.3
Eyrie Pam-krb5
Eyrie Pam-krb5 3.0
Eyrie Pam-krb5 3.1
Eyrie Pam-krb5 3.6
Eyrie Pam-krb5 3.7
Eyrie Pam-krb5 3.10
Eyrie Pam-krb5 3.11
Eyrie Pam-krb5 3.8
Eyrie Pam-krb5 3.9
Eyrie Pam-krb5 3.4
Eyrie Pam-krb5 3.5
4
CVSSv2
CVE-2016-2126
Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with...
Samba Samba
6.5
CVSSv2
CVE-2016-2123
A flaw was found in samba versions 4.0.0 to 4.5.2. The Samba routine ndr_pull_dnsp_name contains an integer wrap problem, leading to an attacker-controlled memory overwrite. ndr_pull_dnsp_name parses data from the Samba Active Directory ldb database. Any user who can write to the...
Samba Samba
10
CVSSv2
CVE-2011-4862
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 up to and including 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and previous versions, Heimdal 1.5.1 and previous versions, GNU inetutils, and possibly other products allows remote malicious users...
Gnu Inetutils
Heimdal Project Heimdal
Mit Krb5-appl
Freebsd Freebsd
Fedoraproject Fedora 15
Fedoraproject Fedora 16
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Debian Debian Linux 7.0
Opensuse Opensuse 11.3
Opensuse Opensuse 11.4
Suse Linux Enterprise Desktop 10
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Server 9
Suse Linux Enterprise Server 10
Suse Linux Enterprise Server 11
Suse Linux Enterprise Software Development Kit 10
Suse Linux Enterprise Software Development Kit 11
3 EDB exploits
5 Github repositories
1 Article
7.8
CVSSv2
CVE-2006-0677
telnetd in Heimdal 0.6.x prior to 0.6.6 and 0.7.x prior to 0.7.2 allows remote unauthenticated malicious users to cause a denial of service (server crash) via unknown vectors that trigger a null dereference.
Kth Heimdal 0.7.1
Kth Heimdal 0.7.1.1
Kth Heimdal 0.6.1
Kth Heimdal 0.7.1.2
Kth Heimdal 0.7.1.3
Kth Heimdal 0.6.4
Kth Heimdal 0.6.5
Kth Heimdal 0.6.2
Kth Heimdal 0.6.3
2.1
CVSSv2
CVE-2006-0582
Unspecified vulnerability in rshd in Heimdal 0.6.x prior to 0.6.6 and 0.7.x prior to 0.7.2, when storing forwarded credentials, allows malicious users to overwrite arbitrary files and change file ownership via unknown vectors.
Kth Heimdal 0.6.2
Kth Heimdal 0.6.3
Kth Heimdal 0.6.1
Kth Heimdal 0.7.1.2
Kth Heimdal 0.7.1.3
Kth Heimdal 0.6.4
Kth Heimdal 0.6.5
Kth Heimdal 0.7.1
Kth Heimdal 0.7.1.1
4.3
CVSSv2
CVE-2021-3522
GStreamer prior to 1.18.4 may perform an out-of-bounds read when handling certain ID3v2 tags.
Gstreamer Project Gstreamer
Netapp Snapmanager -
Netapp Oncommand Workflow Automation -
Netapp Oncommand Insight -
Netapp E-series Santricity Storage Manager -
Netapp Solidfire -
Netapp Hci Management Node -
Netapp Active Iq Unified Manager -
Netapp Santricity Unified Manager -
Netapp E-series Santricity Web Services -
Netapp E-series Santricity Os Controller
Oracle Openjdk 8
7.5
CVSSv2
CVE-2005-0468
Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote malicious users to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocate...
Ncsa Telnet C
1 EDB exploit
7.5
CVSSv2
CVE-2005-0469
Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote malicious users to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
Ncsa Telnet
7.8
CVSSv2
CVE-2006-4924
sshd in OpenSSH prior to 4.4, when using the version 1 SSH protocol, allows remote malicious users to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
Openbsd Openssh 1.2.1
Openbsd Openssh 1.2.2
Openbsd Openssh 1.2.27
Openbsd Openssh 2.5.1
Openbsd Openssh 2.5.2
Openbsd Openssh 3.0.1
Openbsd Openssh 3.0.1p1
Openbsd Openssh 3.2.2
Openbsd Openssh 3.2.2p1
Openbsd Openssh 3.2.3p1
Openbsd Openssh 3.6
Openbsd Openssh 3.6.1
Openbsd Openssh 3.8
Openbsd Openssh 3.8.1
Openbsd Openssh 4.2
Openbsd Openssh 4.2p1
Openbsd Openssh 1.2
Openbsd Openssh 2.3
Openbsd Openssh 2.5
Openbsd Openssh 2.9p2
Openbsd Openssh 3.0
Openbsd Openssh 3.1p1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »