cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2006-4181,https://securityvulnerability.io/vulnerability/CVE-2006-4181,,Format string vulnerability in the sqllog function in the SQL accounting code for radiusd in GNU Radius 1.2 and 1.3 allows remote attackers to execute arbitrary code via unknown vectors.,Gnu,Radius,,,0.1909399926662445,false,false,false,false,,false,false,2006-11-28T02:00:00.000Z,0 CVE-2004-0849,https://securityvulnerability.io/vulnerability/CVE-2004-0849,,"Integer overflow in the asn_decode_string() function defined in asn1.c in radiusd for GNU Radius 1.1 and 1.2 before 1.2.94, when compiled with the --enable-snmp option, allows remote attackers to cause a denial of service (daemon crash) via certain SNMP requests.",Gnu,Radius,,,0.0065899998880922794,false,false,false,false,,false,false,2004-12-23T05:00:00.000Z,0 CVE-2004-0576,https://securityvulnerability.io/vulnerability/CVE-2004-0576,,"The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing an invalid OID.",Gnu,Radius,,,0.007459999993443489,false,false,false,false,,false,false,2004-12-06T05:00:00.000Z,0 CVE-2004-0131,https://securityvulnerability.io/vulnerability/CVE-2004-0131,,"The rad_print_request function in logger.c for GNU Radius daemon (radiusd) before 1.2 allows remote attackers to cause a denial of service (crash) via a UDP packet with an Acct-Status-Type attribute without a value and no Acct-Session-Id attribute, which causes a null dereference.",Gnu,Radius,,,0.03060000017285347,false,false,false,false,,false,false,2004-03-03T05:00:00.000Z,0