Количество 12
Количество 12
CVE-2015-4143
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
CVE-2015-4143
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
CVE-2015-4143
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
CVE-2015-4143
The EAP-pwd server and peer implementation in hostapd and wpa_supplica ...
GHSA-jrqr-5j62-r5j7
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
BDU:2015-12094
Уязвимость операционной системы openSUSE, клиента защищённого доступа Wi-Fi WPA Supplicant, программной точки доступа Jouni Malinen Hostapd, позволяющая нарушителю вызвать отказ в обслуживании
openSUSE-SU-2016:2357-1
Security update for wpa_supplicant
SUSE-SU-2016:2305-1
Security update for wpa_supplicant
openSUSE-SU-2017:2896-1
Security update for hostapd
openSUSE-SU-2020:2059-1
Security update for wpa_supplicant
openSUSE-SU-2020:2053-1
Security update for wpa_supplicant
SUSE-SU-2020:3380-1
Security update for wpa_supplicant
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2015-4143 The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload. | CVSS2: 5 | 1% Низкий | больше 10 лет назад | |
CVE-2015-4143 The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload. | CVSS2: 2.9 | 1% Низкий | почти 11 лет назад | |
CVE-2015-4143 The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload. | CVSS2: 5 | 1% Низкий | больше 10 лет назад | |
CVE-2015-4143 The EAP-pwd server and peer implementation in hostapd and wpa_supplica ... | CVSS2: 5 | 1% Низкий | больше 10 лет назад | |
GHSA-jrqr-5j62-r5j7 The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload. | 1% Низкий | больше 3 лет назад | ||
BDU:2015-12094 Уязвимость операционной системы openSUSE, клиента защищённого доступа Wi-Fi WPA Supplicant, программной точки доступа Jouni Malinen Hostapd, позволяющая нарушителю вызвать отказ в обслуживании | CVSS2: 5 | 1% Низкий | больше 10 лет назад | |
openSUSE-SU-2016:2357-1 Security update for wpa_supplicant | больше 9 лет назад | |||
SUSE-SU-2016:2305-1 Security update for wpa_supplicant | больше 9 лет назад | |||
openSUSE-SU-2017:2896-1 Security update for hostapd | больше 8 лет назад | |||
openSUSE-SU-2020:2059-1 Security update for wpa_supplicant | около 5 лет назад | |||
openSUSE-SU-2020:2053-1 Security update for wpa_supplicant | около 5 лет назад | |||
SUSE-SU-2020:3380-1 Security update for wpa_supplicant | около 5 лет назад |
Уязвимостей на страницу