|ID||CVSS||Summary||Last (major) update||Published|
Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/sasl
|29-09-2017 - 01:33||15-05-2009 - 15:30|
cyrus-sasl before 1.5.24 in Red Hat Linux 7.0 does not properly verify the authorization for a local user, which could allow the users to bypass specified access restrictions.
|10-10-2017 - 01:29||19-12-2000 - 05:00|