5 results (0.004 seconds)

CVSS: 9.8EPSS: 29%CPEs: 40EXPL: 0

04 Mar 2002 — Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data. • http://archives.neohapsis.com/archives/linux/suse/2002-q2/0362.html •

CVSS: 7.5EPSS: 10%CPEs: 40EXPL: 0

04 Mar 2002 — Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:02.asc •

CVSS: 10.0EPSS: 2%CPEs: 2EXPL: 0

21 Jul 2001 — Multiple buffer overflows in RADIUS daemon radiusd in (1) Merit 3.6b and (2) Lucent 2.1-2 RADIUS allow remote attackers to cause a denial of service or execute arbitrary commands. • http://www.kb.cert.org/vuls/id/898931 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

13 Jul 2001 — Directory traversal vulnerability in Livingston/Lucent RADIUS before 2.1.va.1 may allow attackers to read arbitrary files via a .. (dot dot) attack. • http://freshmeat.net/releases/52020 •

CVSS: 8.4EPSS: 2%CPEs: 2EXPL: 0

06 Jul 2001 — Format string vulnerabilities in Livingston/Lucent RADIUS before 2.1.va.1 may allow local or remote attackers to cause a denial of service and possibly execute arbitrary code via format specifiers that are injected into log messages. • http://archives.neohapsis.com/archives/apps/freshmeat/2001-07/0009.html •