Show filters
98 Total Results
Displaying 11-20 of 98
Sort by:
Attacker Value
Unknown

CVE-2022-41859

Disclosure Date: January 17, 2023 (last updated October 08, 2023)
In freeradius, the EAP-PWD function compute_password_element() leaks information about the password which allows an attacker to substantially reduce the size of an offline dictionary attack.
Attacker Value
Unknown

CVE-2023-0338

Disclosure Date: January 17, 2023 (last updated October 08, 2023)
Cross-site Scripting (XSS) - Reflected in GitHub repository lirantal/daloradius prior to master-branch.
Attacker Value
Unknown

CVE-2023-0337

Disclosure Date: January 17, 2023 (last updated October 08, 2023)
Cross-site Scripting (XSS) - Reflected in GitHub repository lirantal/daloradius prior to master-branch.
Attacker Value
Unknown

CVE-2023-0048

Disclosure Date: January 04, 2023 (last updated October 08, 2023)
Code Injection in GitHub repository lirantal/daloradius prior to master-branch.
Attacker Value
Unknown

CVE-2023-0046

Disclosure Date: January 04, 2023 (last updated October 08, 2023)
Improper Restriction of Names for Files and Other Resources in GitHub repository lirantal/daloradius prior to master-branch.
Attacker Value
Unknown

CVE-2022-4630

Disclosure Date: December 21, 2022 (last updated October 08, 2023)
Sensitive Cookie Without 'HttpOnly' Flag in GitHub repository lirantal/daloradius prior to master.
Attacker Value
Unknown

CVE-2022-4366

Disclosure Date: December 08, 2022 (last updated October 08, 2023)
Missing Authorization in GitHub repository lirantal/daloradius prior to master branch.
Attacker Value
Unknown

CVE-2022-23475

Disclosure Date: December 06, 2022 (last updated November 08, 2023)
daloRADIUS is an open source RADIUS web management application. daloRadius 1.3 and prior are vulnerable to a combination cross site scripting (XSS) and cross site request forgery (CSRF) vulnerability which leads to account takeover in the mng-del.php file because of an unescaped variable reflected in the DOM on line 116. This issue has been addressed in commit `ec3b4a419e`. Users are advised to manually apply the commit in order to mitigate this issue. Users may also mitigate this issue with in two parts 1) The CSRF vulnerability can be mitigated by making the daloRadius session cookie to samesite=Lax or by the implimentation of a CSRF token in all forms. 2) The XSS vulnerability may be mitigated by escaping it or by introducing a Content-Security policy.
Attacker Value
Unknown

CVE-2021-0276

Disclosure Date: July 14, 2021 (last updated February 23, 2025)
A stack-based Buffer Overflow vulnerability in Juniper Networks SBR Carrier with EAP (Extensible Authentication Protocol) authentication configured, allows an attacker sending specific packets causing the radius daemon to crash resulting with a Denial of Service (DoS) or leading to remote code execution (RCE). By continuously sending this specific packets, an attacker can repeatedly crash the radius daemon, causing a sustained Denial of Service (DoS). This issue affects Juniper Networks SBR Carrier: 8.4.1 versions prior to 8.4.1R19; 8.5.0 versions prior to 8.5.0R10; 8.6.0 versions prior to 8.6.0R4.
0
Attacker Value
Unknown

CVE-2021-30147

Disclosure Date: April 07, 2021 (last updated February 22, 2025)
DMA Softlab Radius Manager 4.4.0 allows CSRF with impacts such as adding new manager accounts via admin.php.