Логотип exploitDog
bind:CVE-2019-11235
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-11235

Количество 14

Количество 14

ubuntu логотип

CVE-2019-11235

почти 7 лет назад

FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2019-11235

почти 7 лет назад

FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2019-11235

почти 7 лет назад

FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2019-11235

почти 7 лет назад

FreeRADIUS before 3.0.19 mishandles the "each participant verifies tha ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-qx2m-p74g-xjwh

больше 3 лет назад

FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2020-01576

почти 7 лет назад

Уязвимость RADIUS-сервера FreeRADIUS, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 9.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0542-1

почти 6 лет назад

Security update for freeradius-server

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1394-1

больше 6 лет назад

Security update for freeradius-server

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1346-1

почти 7 лет назад

Security update for freeradius-server

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1181-1

почти 7 лет назад

Security update for freeradius-server

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1086-1

почти 7 лет назад

Security update for freeradius-server

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1039-1

почти 7 лет назад

Security update for freeradius-server

EPSS: Низкий
oracle-oval логотип

ELSA-2019-1142

больше 6 лет назад

ELSA-2019-1142: freeradius:3.0 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-1131

почти 7 лет назад

ELSA-2019-1131: freeradius security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-11235

FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.

CVSS3: 9.8
6%
Низкий
почти 7 лет назад
redhat логотип
CVE-2019-11235

FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.

CVSS3: 8.1
6%
Низкий
почти 7 лет назад
nvd логотип
CVE-2019-11235

FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.

CVSS3: 9.8
6%
Низкий
почти 7 лет назад
debian логотип
CVE-2019-11235

FreeRADIUS before 3.0.19 mishandles the "each participant verifies tha ...

CVSS3: 9.8
6%
Низкий
почти 7 лет назад
github логотип
GHSA-qx2m-p74g-xjwh

FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.

CVSS3: 9.8
6%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-01576

Уязвимость RADIUS-сервера FreeRADIUS, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 9.8
6%
Низкий
почти 7 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0542-1

Security update for freeradius-server

почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1394-1

Security update for freeradius-server

больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1346-1

Security update for freeradius-server

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:1181-1

Security update for freeradius-server

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:1086-1

Security update for freeradius-server

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:1039-1

Security update for freeradius-server

почти 7 лет назад
oracle-oval логотип
ELSA-2019-1142

ELSA-2019-1142: freeradius:3.0 security update (IMPORTANT)

больше 6 лет назад
oracle-oval логотип
ELSA-2019-1131

ELSA-2019-1131: freeradius security update (IMPORTANT)

почти 7 лет назад

Уязвимостей на страницу