Show filters
18 Total Results
Displaying 1-10 of 18
Sort by:
Attacker Value
Unknown

CVE-2022-40723

Disclosure Date: April 25, 2023 (last updated October 08, 2023)
The PingID RADIUS PCV adapter for PingFederate, which supports RADIUS authentication with PingID MFA, is vulnerable to MFA bypass under certain configurations.
Attacker Value
Unknown

CVE-2017-10982

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-205 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Buffer over-read in fr_dhcp_decode_options()" and a denial of service.
0
Attacker Value
Unknown

CVE-2017-10981

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-204 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Memory leak in fr_dhcp_decode()" and a denial of service.
0
Attacker Value
Unknown

CVE-2017-10979

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-202 issue in FreeRADIUS 2.x before 2.2.10 allows "Write overflow in rad_coalesce()" - this allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code.
0
Attacker Value
Unknown

CVE-2017-10983

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-206 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "DHCP - Read overflow when decoding option 63" and a denial of service.
0
Attacker Value
Unknown

CVE-2017-10980

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-203 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Memory leak in decode_tlv()" and a denial of service.
0
Attacker Value
Unknown

CVE-2017-9148

Disclosure Date: May 29, 2017 (last updated November 26, 2024)
The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
0
Attacker Value
Unknown

CVE-2014-2015

Disclosure Date: November 02, 2014 (last updated October 05, 2023)
Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.
0
Attacker Value
Unknown

CVE-2011-4966

Disclosure Date: March 12, 2013 (last updated October 05, 2023)
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
0
Attacker Value
Unknown

CVE-2012-3547

Disclosure Date: September 18, 2012 (last updated October 05, 2023)
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
0