Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
w1.fi wpa supplicant 2.4 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2019-9495
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary f...
W1.fi Hostapd
W1.fi Wpa Supplicant
Fedoraproject Fedora 28
Fedoraproject Fedora 29
Fedoraproject Fedora 30
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Debian Debian Linux 8.0
Synology Radius Server 3.0
Synology Router Manager
Freebsd Freebsd 11.2
Freebsd Freebsd 12.0
4.3
CVSSv2
CVE-2015-4141
The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 up to and including 2.4 allows remote malicious users to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or h...
W1.fi Wpa Supplicant 2.3
W1.fi Wpa Supplicant 0.7.1
W1.fi Wpa Supplicant 2.1
W1.fi Wpa Supplicant 2.2
W1.fi Wpa Supplicant 1.0
W1.fi Wpa Supplicant 2.4
W1.fi Wpa Supplicant 0.7.0
W1.fi Wpa Supplicant 0.7.3
W1.fi Wpa Supplicant 1.1
W1.fi Wpa Supplicant 0.7.2
W1.fi Wpa Supplicant 2.0
W1.fi Hostapd 1.1
W1.fi Hostapd 2.4
W1.fi Hostapd 2.0
W1.fi Hostapd 0.7.3
W1.fi Hostapd 1.0
W1.fi Hostapd 0.7.0
W1.fi Hostapd 2.3
W1.fi Hostapd 0.7.2
W1.fi Hostapd 2.2
W1.fi Hostapd 2.1
W1.fi Hostapd 0.7.1
2.9
CVSSv2
CVE-2017-13079
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Debian Debian Linux 8.0
Freebsd Freebsd
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Opensuse Leap 42.3
Opensuse Leap 42.2
Redhat Enterprise Linux Server 7
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Freebsd Freebsd 10
Freebsd Freebsd 10.4
W1.fi Hostapd 1.1
W1.fi Hostapd 2.4
W1.fi Hostapd 2.0
W1.fi Hostapd 0.7.3
W1.fi Wpa Supplicant 2.3
W1.fi Wpa Supplicant 2.1
W1.fi Wpa Supplicant 2.2
W1.fi Hostapd 1.0
2 Articles
2.9
CVSSv2
CVE-2017-13081
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Debian Debian Linux 8.0
Freebsd Freebsd
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Opensuse Leap 42.3
Opensuse Leap 42.2
Redhat Enterprise Linux Server 7
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Freebsd Freebsd 10
Freebsd Freebsd 10.4
W1.fi Hostapd 1.1
W1.fi Hostapd 2.4
W1.fi Hostapd 2.0
W1.fi Hostapd 0.7.3
W1.fi Wpa Supplicant 2.3
W1.fi Wpa Supplicant 2.1
W1.fi Wpa Supplicant 2.2
W1.fi Hostapd 1.0
2 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
malicious code
XML injection
CVE-2024-28020
CVE-2024-35252
CVE-2024-5833
CVE-2024-30066
injection
CVE-2024-23282
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2