Synology

Radius Server

5 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Published 29.08.2025 07:20:21
  • Last modified 01.09.2025 02:15:40

Improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability in Synology RADIUS Server allows remote authenticated users with administrator privileges to read or write limited files in SRM and conduct limited den...

  • EPSS 1.06%
  • Published 17.04.2019 14:29:04
  • Last modified 21.11.2024 04:51:44

The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar...

  • EPSS 1.06%
  • Published 17.04.2019 14:29:04
  • Last modified 21.11.2024 04:51:44

The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication,...

  • EPSS 1.54%
  • Published 17.04.2019 14:29:03
  • Last modified 21.11.2024 04:51:43

The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that...

  • EPSS 6.03%
  • Published 17.04.2019 14:29:03
  • Last modified 21.11.2024 04:51:43

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execu...