Page 7 of 39 results (0.004 seconds)

CVSS: 7.5EPSS: 3%CPEs: 40EXPL: 0

Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data. • http://archives.neohapsis.com/archives/linux/suse/2002-q2/0362.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000466 http://marc.info/?l=bugtraq&m=101537153021792&w=2 http://online.securityfocus.com/archive/1/239784 http://www.cert.org/advisories/CA-2002-06.html http://www.kb.cert.org/vuls/id/589523 http://www.redhat.com/support/errata/RHSA-2002-030.html http://www.securityfocus.com/bid/3530 https://exchange.xforce.ibmcloud.com/vulnerabilities/7534 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The Lucent Closed Network protocol can allow remote attackers to join Closed Network networks which they do not have access to. The 'Network Name' or SSID, which is used as a shared secret to join the network, is transmitted in the clear. • http://archives.neohapsis.com/archives/bugtraq/2001-04/0015.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Orinoco RG-1000 wireless Residential Gateway uses the last 5 digits of the 'Network Name' or SSID as the default Wired Equivalent Privacy (WEP) encryption key. Since the SSID occurs in the clear during communications, a remote attacker could determine the WEP key and decrypt RG-1000 traffic. • http://archives.neohapsis.com/archives/bugtraq/2001-04/0020.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6328 •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Multiple buffer overflows in RADIUS daemon radiusd in (1) Merit 3.6b and (2) Lucent 2.1-2 RADIUS allow remote attackers to cause a denial of service or execute arbitrary commands. • http://www.kb.cert.org/vuls/id/898931 http://www.securityfocus.com/bid/2989 http://xforce.iss.net/alerts/alerts.php •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Directory traversal vulnerability in Livingston/Lucent RADIUS before 2.1.va.1 may allow attackers to read arbitrary files via a .. (dot dot) attack. • http://freshmeat.net/releases/52020 •