Safety vulnerability ID: 54055
The information on this page was manually curated by our Cybersecurity Intelligence Team.
packet.py in pyrad before 2.1 uses weak random numbers to generate RADIUS authenticators and hash passwords, which makes it easier for remote attackers to obtain sensitive information via a brute force attack.
Latest version: 2.4
RADIUS tools
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application