Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
hostapd vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-4445
Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 up to and including 1.0 allows remote malicious users to cause a denial of service (crash or abort) via a small "TLS Message ...
W1.fi Hostapd 0.6.2
W1.fi Hostapd 0.6.1
W1.fi Hostapd 0.7.3
W1.fi Hostapd 1.0
W1.fi Hostapd 0.6.0
W1.fi Hostapd 0.7.0
W1.fi Hostapd 0.6.6
W1.fi Hostapd 0.6.3
W1.fi Hostapd 0.7.2
W1.fi Hostapd 0.6.7
W1.fi Hostapd 0.6.4
W1.fi Hostapd 0.7.1
W1.fi Hostapd 0.6.5
NA
CVE-2012-2389
hostapd 0.7.3, and possibly other versions prior to 1.0, uses 0644 permissions for /etc/hostapd/hostapd.conf, which might allow local users to obtain sensitive information such as credentials.
W1.fi Hostapd 0.7.3
NA
CVE-2006-2213
Hostapd 0.3.7-2 allows remote malicious users to cause a denial of service (segmentation fault) via an unspecified value in the key_data_length field of an EAPoL frame.
Hostapd Hostapd 0.3.7 2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5