Show filters
98 Total Results
Displaying 61-70 of 98
Sort by:
Attacker Value
Unknown
CVE-2010-3696
Disclosure Date: October 07, 2010 (last updated November 08, 2023)
The fr_dhcp_decode function in lib/dhcp.c in FreeRADIUS 2.1.9, in certain non-default builds, does not properly handle the DHCP Relay Agent Information option, which allows remote attackers to cause a denial of service (infinite loop and daemon outage) via a packet that has more than one sub-option. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown
CVE-2009-4347
Disclosure Date: December 17, 2009 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in daloradius-users/login.php in daloRADIUS 0.9-8 and earlier allows remote attackers to inject arbitrary web script or HTML via the error parameter.
0
Attacker Value
Unknown
CVE-2009-3111
Disclosure Date: September 09, 2009 (last updated October 04, 2023)
The rad_decode function in FreeRADIUS before 1.1.8 allows remote attackers to cause a denial of service (radiusd crash) via zero-length Tunnel-Password attributes, as demonstrated by a certain module in VulnDisco Pack Professional 7.6 through 8.11. NOTE: this is a regression error related to CVE-2003-0967.
0
Attacker Value
Unknown
CVE-2009-2358
Disclosure Date: July 07, 2009 (last updated October 04, 2023)
TekRADIUS 3.0 uses BUILTIN\Users:R permissions for the TekRADIUS.ini file, which allows local users to obtain obfuscated database credentials by reading this file.
0
Attacker Value
Unknown
CVE-2009-2359
Disclosure Date: July 07, 2009 (last updated October 04, 2023)
Multiple SQL injection vulnerabilities in TekRADIUS 3.0 allow context-dependent attackers to execute arbitrary SQL commands via (1) the GUI client, as demonstrated by input to the Browse Users text box in the Users tab; or (2) the command-line client, as demonstrated by a certain trcli -r command.
0
Attacker Value
Unknown
CVE-2009-2357
Disclosure Date: July 07, 2009 (last updated October 04, 2023)
The default configuration of TekRADIUS 3.0 uses the sa account to communicate with Microsoft SQL Server, which makes it easier for remote attackers to obtain privileged access to the database and the underlying Windows operating system.
0
Attacker Value
Unknown
CVE-2008-5284
Disclosure Date: November 29, 2008 (last updated October 04, 2023)
The web server in IEA Software RadiusNT and RadiusX 5.1.38 and other versions before 5.1.44, Emerald 5.0.49 and other versions before 5.0.52, Air Marshal 2.0.4 and other versions before 2.0.8, and Radius test client (aka Radlogin) 4.0.20 and earlier, allows remote attackers to cause a denial of service (crash) via an HTTP Content-Length header with a negative value, which triggers a single byte overwrite of memory using a NULL terminator. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown
CVE-2008-4474
Disclosure Date: October 07, 2008 (last updated October 04, 2023)
freeradius-dialupadmin in freeradius 2.0.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files in (1) backup_radacct, (2) clean_radacct, (3) monthly_tot_stats, (4) tot_stats, and (5) truncate_radacct.
0
Attacker Value
Unknown
CVE-2008-1752
Disclosure Date: April 11, 2008 (last updated October 04, 2023)
ezRADIUS 0.1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain credentials via a direct request for (1) config.ini or (2) database.ini. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown
CVE-2008-0330
Disclosure Date: January 17, 2008 (last updated October 04, 2023)
Open System Consultants (OSC) Radiator before 4.0 allows remote attackers to cause a denial of service (daemon crash) via malformed RADIUS requests, as demonstrated by packets sent by nmap.
0