| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-34397 | himmelblau: NSS fake-primary group lookup reintroduces name collision risk | himmelblau-idm | himmelblau | Medium | 6.3 | 2026-04-01 17:25:06 | Deep Dive |
| CVE-2026-31979 | himmelblaud-tasks: local privilege escalation via /tmp symlink attack on Kerberos ccache | himmelblau-idm | himmelblau | High | 8.8 | 2026-03-11 19:47:06 | Deep Dive |
| CVE-2026-31957 | Himmelblau unset domain configuration can allow any-tenant authentication at first login for remote deployments | himmelblau-idm | himmelblau | Critical | 10.0 | 2026-03-11 19:25:21 | Deep Dive |
| CVE-2025-59044 | Himmelblau vulnerable to GID collision via group name-derived mapping (privilege escalation) | himmelblau-idm | himmelblau | Medium | 4.4 | 2025-09-09 22:31:39 | Deep Dive |
| CVE-2025-54882 | Himmelblau's Kerberos credential cache collection is world readable | himmelblau-idm | himmelblau | High | 7.1 | 2025-08-07 00:02:09 | Deep Dive |
| CVE-2025-54781 | Himmelblau leaks an Intune service access token in its logs | himmelblau-idm | himmelblau | Low | 2.8 | 2025-08-01 23:35:24 | Deep Dive |
| CVE-2025-53013 | Himmelblau offline auth permits authentication with invalid Hello PIN | himmelblau-idm | himmelblau | Medium | 5.2 | 2025-06-26 18:02:32 | Deep Dive |
| CVE-2025-49012 | Himmelblau's Name-Based Group Matching in `pam_allow_groups` Leads to Potential Security Bypass | himmelblau-idm | himmelblau | Medium | 5.4 | 2025-06-05 22:29:41 | Deep Dive |
| CVE-2025-24034 | Himmelblau leaks credentials in the debug log | himmelblau-idm | himmelblau | Low | 3.2 | 2025-01-23 17:38:58 | Deep Dive |