Show filters
98 Total Results
Displaying 1-10 of 98
Sort by:
Attacker Value
Unknown

CVE-2021-35975

Disclosure Date: November 30, 2023 (last updated December 12, 2023)
Absolute path traversal vulnerability in the Systematica SMTP Adapter component (up to v2.0.1.101) in Systematica Radius (up to v.3.9.256.777) allows remote attackers to read arbitrary files via a full pathname in GET parameter "file" in URL. Also: affected components in same product - HTTP Adapter (up to v.1.8.0.15), MSSQL MessageBus Proxy (up to v.1.1.06), Financial Calculator (up to v.1.3.05), FIX Adapter (up to v.2.4.0.25)
Attacker Value
Unknown

CVE-2025-24712

Disclosure Date: January 24, 2025 (last updated January 25, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme Radius Blocks allows Cross Site Request Forgery. This issue affects Radius Blocks: from n/a through 2.1.2.
0
Attacker Value
Unknown

CVE-2024-54272

Disclosure Date: December 13, 2024 (last updated December 18, 2024)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RadiusTheme Radius Blocks – WordPress Gutenberg Blocks allows Stored XSS.This issue affects Radius Blocks – WordPress Gutenberg Blocks: from n/a through 2.1.2.
0
Attacker Value
Unknown

CVE-2024-3596

Disclosure Date: July 09, 2024 (last updated January 07, 2025)
RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
Attacker Value
Unknown

CVE-2024-22923

Disclosure Date: February 13, 2024 (last updated February 28, 2024)
SQL injection vulnerability in adv radius v.2.2.5 allows a local attacker to execute arbitrary code via a crafted script.
Attacker Value
Unknown

CVE-2023-39930

Disclosure Date: October 25, 2023 (last updated November 01, 2023)
A first-factor authentication bypass vulnerability exists in the PingFederate with PingID Radius PCV when a MSCHAP authentication request is sent via a maliciously crafted RADIUS client request.
Attacker Value
Unknown

CVE-2023-4951

Disclosure Date: September 14, 2023 (last updated October 08, 2023)
A cross site scripting issue was discovered with the pagination function on the "Client-based Authentication Policy Configuration" screen of the GreenRADIUS web admin interface. This issue is found in GreenRADIUS v5.1.1.1 and prior. A fix was included in v5.1.2.2.
Attacker Value
Unknown

CVE-2022-40723

Disclosure Date: April 25, 2023 (last updated October 08, 2023)
The PingID RADIUS PCV adapter for PingFederate, which supports RADIUS authentication with PingID MFA, is vulnerable to MFA bypass under certain configurations.
Attacker Value
Unknown

CVE-2022-41861

Disclosure Date: January 17, 2023 (last updated October 08, 2023)
A flaw was found in freeradius. A malicious RADIUS client or home server can send a malformed abinary attribute which can cause the server to crash.
Attacker Value
Unknown

CVE-2022-41860

Disclosure Date: January 17, 2023 (last updated October 08, 2023)
In freeradius, when an EAP-SIM supplicant sends an unknown SIM option, the server will try to look that option up in the internal dictionaries. This lookup will fail, but the SIM code will not check for that failure. Instead, it will dereference a NULL pointer, and cause the server to crash.