Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
heimdal vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2002-1225
Multiple buffer overflows in Heimdal prior to 0.5, possibly in both the (1) kadmind and (2) kdc servers, may allow remote malicious users to gain root access.
Kth Heimdal 0.4a
Kth Heimdal 0.4b
Kth Heimdal 0.3e
Kth Heimdal 0.4c
Kth Heimdal 0.4d
Kth Heimdal 0.4e
5
CVSSv2
CVE-2002-1146
The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and previous versions, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual bo...
Gnu Glibc
7.2
CVSSv2
CVE-2002-0754
Kerberos 5 su (k5su) in FreeBSD 4.4 and previous versions relies on the getlogin system call to determine if the user running k5su is root, which could allow a root-initiated process to regain its privileges after it has dropped them.
Freebsd Heimdal 0.4e
Kth Heimdal 0.4e
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Freebsd Freebsd 4.4
5
CVSSv2
CVE-2001-1443
KTH Kerberos IV and Kerberos V (Heimdal) for Telnet clients do not encrypt connections if the server does not support the requested encryption, which allows remote malicious users to read communications via a man-in-the-middle attack.
Kth Kth Kerberos 4
Kth Kth Kerberos 5
7.5
CVSSv2
CVE-2001-1444
The Kerberos Telnet protocol, as implemented by KTH Kerberos IV and Kerberos V (Heimdal), does not encrypt authentication and encryption options sent from the server, which allows remote malicious users to downgrade authentication and encryption mechanisms via a man-in-the-middle...
Kth Kth Kerberos 4
Kth Kth Kerberos 5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5