Количество 9
Количество 9
GHSA-4qm7-rm85-wr68
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
CVE-2015-8023
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
CVE-2015-8023
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
CVE-2015-8023
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
CVE-2015-8023
The server implementation of the EAP-MSCHAPv2 protocol in the eap-msch ...
openSUSE-SU-2015:2103-1
Security update for strongswan
SUSE-SU-2015:2186-1
Security update for strongswan
SUSE-SU-2015:2183-2
Security update for strongswan
SUSE-SU-2015:2183-1
Security update for strongswan
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-4qm7-rm85-wr68 The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message. | 1% Низкий | больше 3 лет назад | ||
CVE-2015-8023 The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message. | CVSS2: 5 | 1% Низкий | около 10 лет назад | |
CVE-2015-8023 The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message. | CVSS2: 6.4 | 1% Низкий | около 10 лет назад | |
CVE-2015-8023 The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message. | CVSS2: 5 | 1% Низкий | около 10 лет назад | |
CVE-2015-8023 The server implementation of the EAP-MSCHAPv2 protocol in the eap-msch ... | CVSS2: 5 | 1% Низкий | около 10 лет назад | |
openSUSE-SU-2015:2103-1 Security update for strongswan | 1% Низкий | около 10 лет назад | ||
SUSE-SU-2015:2186-1 Security update for strongswan | 1% Низкий | около 10 лет назад | ||
SUSE-SU-2015:2183-2 Security update for strongswan | 1% Низкий | около 10 лет назад | ||
SUSE-SU-2015:2183-1 Security update for strongswan | 1% Низкий | около 10 лет назад |
Уязвимостей на страницу