Show filters
98 Total Results
Displaying 61-70 of 98
Sort by:
Attacker Value
Unknown

CVE-2010-3696

Disclosure Date: October 07, 2010 (last updated November 08, 2023)
The fr_dhcp_decode function in lib/dhcp.c in FreeRADIUS 2.1.9, in certain non-default builds, does not properly handle the DHCP Relay Agent Information option, which allows remote attackers to cause a denial of service (infinite loop and daemon outage) via a packet that has more than one sub-option. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown

CVE-2009-4347

Disclosure Date: December 17, 2009 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in daloradius-users/login.php in daloRADIUS 0.9-8 and earlier allows remote attackers to inject arbitrary web script or HTML via the error parameter.
0
Attacker Value
Unknown

CVE-2009-3111

Disclosure Date: September 09, 2009 (last updated October 04, 2023)
The rad_decode function in FreeRADIUS before 1.1.8 allows remote attackers to cause a denial of service (radiusd crash) via zero-length Tunnel-Password attributes, as demonstrated by a certain module in VulnDisco Pack Professional 7.6 through 8.11. NOTE: this is a regression error related to CVE-2003-0967.
0
Attacker Value
Unknown

CVE-2009-2358

Disclosure Date: July 07, 2009 (last updated October 04, 2023)
TekRADIUS 3.0 uses BUILTIN\Users:R permissions for the TekRADIUS.ini file, which allows local users to obtain obfuscated database credentials by reading this file.
0
Attacker Value
Unknown

CVE-2009-2359

Disclosure Date: July 07, 2009 (last updated October 04, 2023)
Multiple SQL injection vulnerabilities in TekRADIUS 3.0 allow context-dependent attackers to execute arbitrary SQL commands via (1) the GUI client, as demonstrated by input to the Browse Users text box in the Users tab; or (2) the command-line client, as demonstrated by a certain trcli -r command.
0
Attacker Value
Unknown

CVE-2009-2357

Disclosure Date: July 07, 2009 (last updated October 04, 2023)
The default configuration of TekRADIUS 3.0 uses the sa account to communicate with Microsoft SQL Server, which makes it easier for remote attackers to obtain privileged access to the database and the underlying Windows operating system.
0
Attacker Value
Unknown

CVE-2008-5284

Disclosure Date: November 29, 2008 (last updated October 04, 2023)
The web server in IEA Software RadiusNT and RadiusX 5.1.38 and other versions before 5.1.44, Emerald 5.0.49 and other versions before 5.0.52, Air Marshal 2.0.4 and other versions before 2.0.8, and Radius test client (aka Radlogin) 4.0.20 and earlier, allows remote attackers to cause a denial of service (crash) via an HTTP Content-Length header with a negative value, which triggers a single byte overwrite of memory using a NULL terminator. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown

CVE-2008-4474

Disclosure Date: October 07, 2008 (last updated October 04, 2023)
freeradius-dialupadmin in freeradius 2.0.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files in (1) backup_radacct, (2) clean_radacct, (3) monthly_tot_stats, (4) tot_stats, and (5) truncate_radacct.
0
Attacker Value
Unknown

CVE-2008-1752

Disclosure Date: April 11, 2008 (last updated October 04, 2023)
ezRADIUS 0.1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain credentials via a direct request for (1) config.ini or (2) database.ini. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown

CVE-2008-0330

Disclosure Date: January 17, 2008 (last updated October 04, 2023)
Open System Consultants (OSC) Radiator before 4.0 allows remote attackers to cause a denial of service (daemon crash) via malformed RADIUS requests, as demonstrated by packets sent by nmap.
0