Point-to-point Protocol Project

Point-to-point Protocol

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 65.99%
  • Published 03.02.2020 23:15:11
  • Last modified 21.11.2024 05:39:05

eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.

  • EPSS 0.43%
  • Published 14.06.2018 20:29:00
  • Last modified 21.11.2024 03:43:38

Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes ...

  • EPSS 1.51%
  • Published 24.04.2015 14:59:11
  • Last modified 12.04.2025 10:46:40

Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message ...

  • EPSS 1.48%
  • Published 15.11.2014 21:59:00
  • Last modified 12.04.2025 10:46:40

Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] se...

  • EPSS 0.06%
  • Published 05.07.2006 18:05:00
  • Last modified 03.04.2025 01:03:51

The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user...

  • EPSS 0.82%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

SQL injection vulnerability in the Authorize.net callback code (subscriptions/authorize.php) in Jelsoft vBulletin 3.0 through 3.0.3 allows remote attackers to execute arbitrary SQL statements via the x_invoice_num parameter. NOTE: this issue might b...