Show filters
98 Total Results
Displaying 51-60 of 98
Sort by:
Attacker Value
Unknown

CVE-2016-0800

Disclosure Date: March 01, 2016 (last updated November 25, 2024)
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
0
Attacker Value
Unknown

CVE-2014-2015

Disclosure Date: November 02, 2014 (last updated October 05, 2023)
Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.
0
Attacker Value
Unknown

CVE-2013-4147

Disclosure Date: August 09, 2013 (last updated October 05, 2023)
Multiple format string vulnerabilities in Yet Another Radius Daemon (YARD RADIUS) 1.1.2 allow context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in a request in the (1) log_msg function in log.c or (2) version or (3) build_version function in version.c.
0
Attacker Value
Unknown

CVE-2013-2220

Disclosure Date: July 31, 2013 (last updated October 05, 2023)
Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
0
Attacker Value
Unknown

CVE-2011-4966

Disclosure Date: March 12, 2013 (last updated October 05, 2023)
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
0
Attacker Value
Unknown

CVE-2012-3547

Disclosure Date: September 18, 2012 (last updated October 05, 2023)
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
0
Attacker Value
Unknown

CVE-2012-3816

Disclosure Date: June 27, 2012 (last updated October 04, 2023)
WinRadius Server 2009 allows remote attackers to cause a denial of service (crash) via a long password in an Access-Request packet.
0
Attacker Value
Unknown

CVE-2011-2701

Disclosure Date: August 04, 2011 (last updated October 04, 2023)
The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate.
0
Attacker Value
Unknown

CVE-2010-4275

Disclosure Date: December 22, 2010 (last updated October 04, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in Radius Manager 3.8.0 allow remote authenticated administrators to inject arbitrary web script or HTML via the (1) name or (2) descr parameter in an (a) update_usergroup or a (b) store_nas action to admin.php.
0
Attacker Value
Unknown

CVE-2010-3697

Disclosure Date: October 07, 2010 (last updated October 04, 2023)
The wait_for_child_to_die function in main/event.c in FreeRADIUS 2.1.x before 2.1.10, in certain circumstances involving long-term database outages, does not properly handle long queue times for requests, which allows remote attackers to cause a denial of service (daemon crash) by sending many requests.
0