4 results (0.001 seconds)

CVSS: 9.8EPSS: 10%CPEs: 1EXPL: 1

09 Aug 2013 — Multiple format string vulnerabilities in Yet Another Radius Daemon (YARD RADIUS) 1.1.2 allow context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in a request in the (1) log_msg function in log.c or (2) version or (3) build_version function in version.c. Múltiples vulnerabilidades de formato de cadena en Yet Another Radius Daemon (YARD RADIUS) v1.1.2, lo que permite a atacantes dependientes de contexto provocar una denegación de se... • https://www.exploit-db.com/exploits/38672 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 10.0EPSS: 5%CPEs: 8EXPL: 0

05 Dec 2004 — Buffer overflow in the process_menu function in yardradius 1.0.20 allows remote attackers to execute arbitrary code. Desbordamiento de búfer en la función process_menu de yardradius 1.0.20 permite a atacantes remotos ejecutar código de su elección. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278384 •

CVSS: 9.8EPSS: 29%CPEs: 40EXPL: 0

04 Mar 2002 — Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data. • http://archives.neohapsis.com/archives/linux/suse/2002-q2/0362.html •

CVSS: 7.5EPSS: 10%CPEs: 40EXPL: 0

04 Mar 2002 — Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:02.asc •