CVE-2013-4584
https://notcve.org/view.php?id=CVE-2013-4584
Perdition before 2.2 may have weak security when handling outbound connections, caused by an error in the STARTTLS IMAP and POP server. ssl_outgoing_ciphers not being applied to STARTTLS connections Perdition versiones anteriores a la versión2.2, puede tener una seguridad débil cuando se maneja conexiones salientes, causada por un error en el servidor IMAP y POP STARTTLS. La función ssl_outgoing_ciphers no se aplica a las conexiones STARTTLS • http://www.openwall.com/lists/oss-security/2013/11/15/6 http://www.securityfocus.com/bid/63696 https://access.redhat.com/security/cve/cve-2013-4584 https://exchange.xforce.ibmcloud.com/vulnerabilities/89184 https://github.com/horms/perdition/commit/62a0ce94aeb7dd99155882956ce9e327ab914ddf https://security-tracker.debian.org/tracker/CVE-2013-4584 • CWE-755: Improper Handling of Exceptional Conditions •
CVE-2001-1082
https://notcve.org/view.php?id=CVE-2001-1082
Directory traversal vulnerability in Livingston/Lucent RADIUS before 2.1.va.1 may allow attackers to read arbitrary files via a .. (dot dot) attack. • http://freshmeat.net/releases/52020 •
CVE-2001-1081
https://notcve.org/view.php?id=CVE-2001-1081
Format string vulnerabilities in Livingston/Lucent RADIUS before 2.1.va.1 may allow local or remote attackers to cause a denial of service and possibly execute arbitrary code via format specifiers that are injected into log messages. • http://archives.neohapsis.com/archives/apps/freshmeat/2001-07/0009.html http://archives.neohapsis.com/archives/vulnwatch/2001-q3/0005.html http://freshmeat.net/releases/52020 http://www.securityfocus.com/bid/2994 •