Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-59x4-84v4-pcgx

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

ieee80211_output.c in MadWifi before 0.9.3 sends unencrypted packets before WPA authentication succeeds, which allows remote attackers to obtain sensitive information (related to network structure), and possibly cause a denial of service (disrupted authentication) and conduct spoofing attacks.

ieee80211_output.c in MadWifi before 0.9.3 sends unencrypted packets before WPA authentication succeeds, which allows remote attackers to obtain sensitive information (related to network structure), and possibly cause a denial of service (disrupted authentication) and conduct spoofing attacks.

EPSS

Процентиль: 87%
0.03327
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

ieee80211_output.c in MadWifi before 0.9.3 sends unencrypted packets before WPA authentication succeeds, which allows remote attackers to obtain sensitive information (related to network structure), and possibly cause a denial of service (disrupted authentication) and conduct spoofing attacks.

nvd
больше 18 лет назад

ieee80211_output.c in MadWifi before 0.9.3 sends unencrypted packets before WPA authentication succeeds, which allows remote attackers to obtain sensitive information (related to network structure), and possibly cause a denial of service (disrupted authentication) and conduct spoofing attacks.

debian
больше 18 лет назад

ieee80211_output.c in MadWifi before 0.9.3 sends unencrypted packets b ...

EPSS

Процентиль: 87%
0.03327
Низкий