Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
madwifi madwifi 0.9.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2007-2830
The ath_beacon_config function in if_ath.c in MadWifi prior to 0.9.3.1 allows remote malicious users to cause a denial of service (system crash) via crafted beacon interval information when scanning for access points, which triggers a divide-by-zero error.
Madwifi Madwifi 0.9.2
Madwifi Madwifi 0.9.2.1
Madwifi Madwifi 0.9.0
Madwifi Madwifi 0.9.1
Madwifi Madwifi
5
CVSSv2
CVE-2007-2829
The 802.11 network stack in net80211/ieee80211_input.c in MadWifi prior to 0.9.3.1 allows remote malicious users to cause a denial of service (system hang) via a crafted length field in nested 802.3 Ethernet frames in Fast Frame packets, which results in a NULL pointer dereferenc...
Madwifi Madwifi
Madwifi Madwifi 0.9.0
Madwifi Madwifi 0.9.1
Madwifi Madwifi 0.9.2
Madwifi Madwifi 0.9.2.1
10
CVSSv2
CVE-2007-2831
Array index error in the (1) ieee80211_ioctl_getwmmparams and (2) ieee80211_ioctl_setwmmparams functions in net80211/ieee80211_wireless.c in MadWifi prior to 0.9.3.1 allows local users to cause a denial of service (system crash), possibly obtain kernel memory contents, and possib...
Madwifi Madwifi 0.9.0
Madwifi Madwifi 0.9.1
Madwifi Madwifi
Madwifi Madwifi 0.9.2
Madwifi Madwifi 0.9.2.1
7.1
CVSSv2
CVE-2005-4835
The ath_rate_sample function in the ath_rate/sample/sample.c sample code in MadWifi prior to 0.9.3 allows remote malicious users to cause a denial of service (failed KASSERT and system crash) by moving a connected system to a location with low signal strength, and possibly other ...
Madwifi Madwifi 0.9.1
Madwifi Madwifi 0.9.2.1
Madwifi Madwifi 0.9.0
Madwifi Madwifi 0.9.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started