Vulnerabilities > Yard Radius Project
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2013-08-09 | CVE-2013-4147 | USE of Externally-Controlled Format String vulnerability in Yard Radius Project Yard Radius 1.1.24 Multiple format string vulnerabilities in Yet Another Radius Daemon (YARD RADIUS) 1.1.2 allow context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in a request in the (1) log_msg function in log.c or (2) version or (3) build_version function in version.c. | 7.5 |
2005-01-10 | CVE-2004-0987 | Remote Buffer Overflow vulnerability in Yard Radius Buffer overflow in the process_menu function in yardradius 1.0.20 allows remote attackers to execute arbitrary code. | 10.0 |
2002-03-04 | CVE-2001-1377 | Denial Of Service vulnerability in Multiple Vendor Radius Short Vendor-Length Field Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2. network low complexity freeradius gnu icradius livingston lucent miquel-van-smoorenburg-cistron openradius radiusclient xtradius yard-radius yard-radius-project | 5.0 |
2002-03-04 | CVE-2001-1376 | Buffer Overflow vulnerability in Multiple Vendor RADIUS Digest Calculation Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data. network low complexity ascend freeradius gnu icradius livingston lucent miquel-van-smoorenburg-cistron openradius radiusclient xtradius yard-radius yard-radius-project | 7.5 |