Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pam vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2020-18471
This Metasploit module exploits a stack-based buffer overflow in the Solaris PAM library's username parsing code, as used by the SunSSH daemon when the keyboard-interactive authentication method is specified. Tested against SunSSH 1.1.5 on Solaris 10u11 1/13 (x86) in Virtual...
5
CVSSv2
CVE-2019-16058
An issue exists in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.
Opensc Project Opensc 0.3.0
Opensc Project Opensc 0.2.0
6.8
CVSSv2
CVE-2016-6377
Media Origination System Suite Software 2.6 and previous versions in Cisco Virtual Media Packager (VMP) allows remote malicious users to bypass authentication and make arbitrary Platform and Applications Manager (PAM) API calls via unspecified vectors, aka Bug ID CSCuz52110.
Cisco Media Origination System Suite 2.3(8)
Cisco Media Origination System Suite 2.3(2)
Cisco Media Origination System Suite 2.3(6)
Cisco Media Origination System Suite 2.3(1)
Cisco Media Origination System Suite 2.5(1)
Cisco Media Origination System Suite 2.3 Base
Cisco Media Origination System Suite 2.4(1)
Cisco Media Origination System Suite 2.5(0)
Cisco Media Origination System Suite 2.5 Base
Cisco Media Origination System Suite 2.6 Base
Cisco Media Origination System Suite 2.4 Base
Cisco Media Origination System Suite 2.3(7)
2.6
CVSSv2
CVE-2006-5229
OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote malicious users to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as d...
Openbsd Openssh 4.1
1 EDB exploit
7.5
CVSSv2
CVE-2002-0735
Format string vulnerability in the logging() function in C-Note Squid LDAP authentication module (squid_auth_LDAP) 2.0.2 and previous versions allows remote malicious users to cause a denial of service and possibly execute arbitrary code by triggering log messages.
Padl Software Nss Ldap Build 187
Padl Software Nss Ldap Build 185.1
Padl Software Nss Ldap Build 184
Padl Software Nss Ldap Build 180
Padl Software Nss Ldap Build 189
Padl Software Nss Ldap Build 185.2
Padl Software Nss Ldap Build 186
Padl Software Nss Ldap Build 183
Padl Software Nss Ldap Build 181
C-note Squid Auth Ldap 1.2 B2
C-note Squid Auth Ldap 1.0.1
C-note Squid Auth Ldap 2.0
Padl Software Pam Ldap Build 143
C-note Squid Auth Ldap 1.0.2 Beta
Padl Software Nss Ldap Build 188
Padl Software Nss Ldap Build 185
Padl Software Nss Ldap Build 185.3
7.2
CVSSv2
CVE-2000-0052
Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack.
Redhat Linux 6.0
Turbolinux Turbolinux 4.4
Turbolinux Turbolinux 4.2
Turbolinux Turbolinux 6.0.2
Mandrakesoft Mandrake Linux 6.0
Redhat Linux 6.1
Turbolinux Turbolinux 3.5b2
Mandrakesoft Mandrake Linux 6.1
2 EDB exploits
4.3
CVSSv2
CVE-2016-3176
Salt prior to 2015.5.10 and 2015.8.x prior to 2015.8.8, when PAM external authentication is enabled, allows malicious users to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.
Saltstack Salt 2015.8.5
Saltstack Salt 2015.8.1
Saltstack Salt
Saltstack Salt 2015.8.4
Saltstack Salt 2015.8.2
Saltstack Salt 2015.8.3
Saltstack Salt 2015.8.7
Saltstack Salt 2015.8.0
7.5
CVSSv2
CVE-2005-3532
authpam.c in courier-authdaemon for Courier Mail Server 0.37.3 up to and including 0.52.1, when using pam_tally, does not call the pam_acct_mgmt function to verify that access should be granted, which allows malicious users to authenticate to the server using accounts that have b...
Double Precision Incorporated Courier Mail Server 0.50.0
Double Precision Incorporated Courier Mail Server 0.52.1
Double Precision Incorporated Courier Mail Server 0.48
Double Precision Incorporated Courier Mail Server 0.49.0
Double Precision Incorporated Courier Mail Server 0.37.3
Double Precision Incorporated Courier Mail Server 0.46
Double Precision Incorporated Courier Mail Server 0.48.1
Double Precision Incorporated Courier Mail Server 0.47
Double Precision Incorporated Courier Mail Server 0.48.2
7.2
CVSSv2
CVE-1999-1158
Buffer overflow in (1) pluggable authentication module (PAM) on Solaris 2.5.1 and 2.5 and (2) unix_scheme in Solaris 2.4 and 2.3 allows local users to gain root privileges via programs that use these modules such as passwd, yppasswd, and nispasswd.
Sun Sunos 5.3
Sun Sunos 5.5
Sun Sunos 5.4
Sun Sunos 5.5.1
2 EDB exploits
7.5
CVSSv2
CVE-2004-0362
Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote malicious users to execute arbitrary code via a SRV_MULTI response containing a SRV...
Iss Realsecure Server Sensor 7.0
Iss Realsecure Server Sensor 6.5
Iss Realsecure Network Sensor 7.0
Iss Realsecure Desktop 7.0ebg
Iss Realsecure Guard 3.6ecb
Iss Realsecure Desktop 7.0ebh
Iss Blackice Pc Protection 3.6ccf
Iss Realsecure Sentry 3.6ece
Iss Realsecure Desktop 3.6ebz
Iss Blackice Pc Protection 3.6ccb
Iss Realsecure Sentry 3.6ecf
Iss Realsecure Server Sensor 6.5 Win Sr3.4
Iss Realsecure Guard 3.6ece
Iss Realsecure Server Sensor 6.0
Iss Realsecure Desktop 3.6ecd
Iss Realsecure Guard 3.6eca
Iss Blackice Pc Protection 3.6cbz
Iss Blackice Pc Protection 3.6cce
Iss Realsecure Desktop 7.0ebj
Iss Realsecure Server Sensor 6.5 Win Sr3.9
Iss Realsecure Guard 3.6ebz
Iss Blackice Pc Protection 3.6cca
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
malicious code
XML injection
CVE-2024-28020
CVE-2024-35252
CVE-2024-5833
CVE-2024-30066
injection
CVE-2024-23282
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »