Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mit kerberos 5 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2005-1175
Heap-based buffer overflow in the Key Distribution Center (KDC) in MIT Kerberos 5 (krb5) 1.4.1 and previous versions allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a certain valid TCP or UDP request.
Mit Kerberos 5 1.3.2
Mit Kerberos 5 1.3.3
Mit Kerberos 5 1.3.4
Mit Kerberos 5 1.4
Mit Kerberos 5 1.4.1
Mit Kerberos 5 1.3
Mit Kerberos 5 1.3.1
Mit Kerberos 5 1.3.5
Mit Kerberos 5 1.3.6
7.5
CVSSv2
CVE-2005-1689
Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and previous versions allows remote malicious users to execute arbitrary code via certain error conditions.
Mit Kerberos 5
Apple Mac Os X Server
Apple Mac Os X
Debian Debian Linux 3.1
Debian Debian Linux 3.0
7.5
CVSSv2
CVE-2005-0469
Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote malicious users to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
Ncsa Telnet
7.5
CVSSv2
CVE-2004-0772
Double free vulnerabilities in error handling code in krb524d for MIT Kerberos 5 (krb5) 1.2.8 and previous versions may allow remote malicious users to execute arbitrary code.
Mit Kerberos 5
Openpkg Openpkg 2.0
Openpkg Openpkg 2.1
Debian Debian Linux 3.0
7.5
CVSSv2
CVE-2004-0642
Double free vulnerabilities in the error handling code for ASN.1 decoders in the (1) Key Distribution Center (KDC) library and (2) client library for MIT Kerberos 5 (krb5) 1.3.4 and previous versions may allow remote malicious users to execute arbitrary code.
Mit Kerberos 5
Debian Debian Linux 3.0
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Server 3.0
7.5
CVSSv2
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
7.5
CVSSv2
CVE-2003-0138
Version 4 of the Kerberos protocol (krb4), as used in Heimdal and other packages, allows an malicious user to impersonate any principal in a realm via a chosen-plaintext attack.
Mit Kerberos 4
7.5
CVSSv2
CVE-2003-0139
Certain weaknesses in the implementation of version 4 of the Kerberos protocol (krb4) in the krb5 distribution, when triple-DES keys are used to key krb4 services, allow an malicious user to create krb4 tickets for unauthorized principals using a cut-and-paste attack and "ti...
Mit Kerberos 4
7.5
CVSSv2
CVE-2003-0059
Unknown vulnerability in the chk_trans.c of the libkrb5 library for MIT Kerberos V5 prior to 1.2.5 allows users from one realm to impersonate users in other realms that have the same inter-realm keys.
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.2.1
7.5
CVSSv2
CVE-2003-0060
Format string vulnerabilities in the logging routines for MIT Kerberos V5 Key Distribution Center (KDC) prior to 1.2.5 allow remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in Kerberos principal names.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.2.3
Mit Kerberos 5 1.2.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »