Max CVSS | 7.5 | Min CVSS | 2.9 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2019-10143 | 6.9 |
It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a rad
|
04-08-2024 - 22:15 | 24-05-2019 - 17:29 | |
CVE-2015-2675 | 5.0 |
The OAuth implementation in librest before 0.7.93 incorrectly truncates the pointer returned by the rest_proxy_call_get_url function, which allows remote attackers to cause a denial of service (application crash) via running the EnsureCredentials met
|
13-02-2023 - 00:47 | 18-08-2017 - 18:29 | |
CVE-2019-10153 | 4.0 |
A flaw was discovered in fence-agents, prior to version 4.3.4, where using non-ASCII characters in a guest VM's comment or other fields would cause fence_rhevm to exit with an exception. In cluster environments, this could lead to preventing automate
|
02-02-2023 - 18:58 | 30-07-2019 - 23:15 | |
CVE-2019-17185 | 5.0 |
In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are in
|
22-04-2022 - 19:04 | 21-03-2020 - 01:15 | |
CVE-2019-13456 | 2.9 |
In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the pa
|
01-01-2022 - 20:06 | 03-12-2019 - 20:15 | |
CVE-2019-10143 | 6.9 |
** DISPUTED ** It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate int
|
30-09-2020 - 14:22 | 24-05-2019 - 17:29 | |
CVE-2020-11078 | 4.3 |
In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httpli
|
19-08-2020 - 18:56 | 20-05-2020 - 16:15 | |
CVE-2019-11235 | 7.5 |
FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar is
|
13-05-2019 - 18:29 | 22-04-2019 - 11:29 | |
CVE-2018-13988 | 4.3 |
Poppler through 0.62 contains an out of bounds read vulnerability due to an incorrect memory access that is not mapped in its memory space, as demonstrated by pdfunite. This can result in memory corruption and denial of service. This may be exploitab
|
25-04-2019 - 14:16 | 25-07-2018 - 23:29 |