Количество 9
Количество 9
CVE-2015-8023
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
CVE-2015-8023
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
CVE-2015-8023
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
CVE-2015-8023
The server implementation of the EAP-MSCHAPv2 protocol in the eap-msch ...
openSUSE-SU-2015:2103-1
Security update for strongswan
SUSE-SU-2015:2186-1
Security update for strongswan
SUSE-SU-2015:2183-2
Security update for strongswan
SUSE-SU-2015:2183-1
Security update for strongswan
GHSA-4qm7-rm85-wr68
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2015-8023 The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message. | CVSS2: 5 | 1% Низкий | около 10 лет назад | |
CVE-2015-8023 The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message. | CVSS2: 6.4 | 1% Низкий | около 10 лет назад | |
CVE-2015-8023 The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message. | CVSS2: 5 | 1% Низкий | около 10 лет назад | |
CVE-2015-8023 The server implementation of the EAP-MSCHAPv2 protocol in the eap-msch ... | CVSS2: 5 | 1% Низкий | около 10 лет назад | |
openSUSE-SU-2015:2103-1 Security update for strongswan | 1% Низкий | около 10 лет назад | ||
SUSE-SU-2015:2186-1 Security update for strongswan | 1% Низкий | около 10 лет назад | ||
SUSE-SU-2015:2183-2 Security update for strongswan | 1% Низкий | около 10 лет назад | ||
SUSE-SU-2015:2183-1 Security update for strongswan | 1% Низкий | около 10 лет назад | ||
GHSA-4qm7-rm85-wr68 The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message. | 1% Низкий | больше 3 лет назад |
Уязвимостей на страницу