Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
madwifi madwifi 0.9.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2007-2829
The 802.11 network stack in net80211/ieee80211_input.c in MadWifi prior to 0.9.3.1 allows remote malicious users to cause a denial of service (system hang) via a crafted length field in nested 802.3 Ethernet frames in Fast Frame packets, which results in a NULL pointer dereferenc...
Madwifi Madwifi
Madwifi Madwifi 0.9.0
Madwifi Madwifi 0.9.1
Madwifi Madwifi 0.9.2
Madwifi Madwifi 0.9.2.1
5
CVSSv2
CVE-2007-2830
The ath_beacon_config function in if_ath.c in MadWifi prior to 0.9.3.1 allows remote malicious users to cause a denial of service (system crash) via crafted beacon interval information when scanning for access points, which triggers a divide-by-zero error.
Madwifi Madwifi 0.9.2
Madwifi Madwifi 0.9.2.1
Madwifi Madwifi 0.9.0
Madwifi Madwifi 0.9.1
Madwifi Madwifi
10
CVSSv2
CVE-2007-2831
Array index error in the (1) ieee80211_ioctl_getwmmparams and (2) ieee80211_ioctl_setwmmparams functions in net80211/ieee80211_wireless.c in MadWifi prior to 0.9.3.1 allows local users to cause a denial of service (system crash), possibly obtain kernel memory contents, and possib...
Madwifi Madwifi 0.9.0
Madwifi Madwifi 0.9.1
Madwifi Madwifi
Madwifi Madwifi 0.9.2
Madwifi Madwifi 0.9.2.1
7.1
CVSSv2
CVE-2005-4835
The ath_rate_sample function in the ath_rate/sample/sample.c sample code in MadWifi prior to 0.9.3 allows remote malicious users to cause a denial of service (failed KASSERT and system crash) by moving a connected system to a location with low signal strength, and possibly other ...
Madwifi Madwifi 0.9.1
Madwifi Madwifi 0.9.2.1
Madwifi Madwifi 0.9.0
Madwifi Madwifi 0.9.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2024-34351
CVE-2024-1076
CVE-2024-25522
CVE-2024-34547
CVE-2024-4644
unauthorized
remote
CVE-2024-4671
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started