Количество 3
Количество 3
CVE-2010-0524
The default configuration of the FreeRADIUS server in Apple Mac OS X Server before 10.6.3 permits EAP-TLS authenticated connections on the basis of an arbitrary client certificate, which allows remote attackers to obtain network connectivity via a crafted RADIUS Access Request message.
CVE-2010-0524
The default configuration of the FreeRADIUS server in Apple Mac OS X S ...
GHSA-9v7p-64xp-q6jf
The default configuration of the FreeRADIUS server in Apple Mac OS X Server before 10.6.3 permits EAP-TLS authenticated connections on the basis of an arbitrary client certificate, which allows remote attackers to obtain network connectivity via a crafted RADIUS Access Request message.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2010-0524 The default configuration of the FreeRADIUS server in Apple Mac OS X Server before 10.6.3 permits EAP-TLS authenticated connections on the basis of an arbitrary client certificate, which allows remote attackers to obtain network connectivity via a crafted RADIUS Access Request message. | CVSS2: 7.5 | 0% Низкий | почти 16 лет назад | |
CVE-2010-0524 The default configuration of the FreeRADIUS server in Apple Mac OS X S ... | CVSS2: 7.5 | 0% Низкий | почти 16 лет назад | |
GHSA-9v7p-64xp-q6jf The default configuration of the FreeRADIUS server in Apple Mac OS X Server before 10.6.3 permits EAP-TLS authenticated connections on the basis of an arbitrary client certificate, which allows remote attackers to obtain network connectivity via a crafted RADIUS Access Request message. | 0% Низкий | почти 4 года назад |
Уязвимостей на страницу