Radius
Sign in to watchby Lucent
CVEs (5)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2001-1376 | 0.02 | — | 0.30 | Mar 4, 2002 | Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data. | ||
| CVE-2001-1377 | 0.01 | — | 0.13 | Mar 4, 2002 | Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2. | ||
| CVE-2001-0534 | 0.00 | — | 0.02 | Jul 21, 2001 | Multiple buffer overflows in RADIUS daemon radiusd in (1) Merit 3.6b and (2) Lucent 2.1-2 RADIUS allow remote attackers to cause a denial of service or execute arbitrary commands. | ||
| CVE-2001-1082 | 0.00 | — | 0.01 | Jul 13, 2001 | Directory traversal vulnerability in Livingston/Lucent RADIUS before 2.1.va.1 may allow attackers to read arbitrary files via a .. (dot dot) attack. | ||
| CVE-2001-1081 | 0.00 | — | 0.01 | Jul 6, 2001 | Format string vulnerabilities in Livingston/Lucent RADIUS before 2.1.va.1 may allow local or remote attackers to cause a denial of service and possibly execute arbitrary code via format specifiers that are injected into log messages. |