Логотип exploitDog
bind:"BDU:2021-03177" OR bind:"CVE-2020-26147"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2021-03177" OR bind:"CVE-2020-26147"

Количество 28

Количество 28

fstec логотип

BDU:2021-03177

около 4 лет назад

Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 5.4
EPSS: Низкий
ubuntu логотип

CVE-2020-26147

около 4 лет назад

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
EPSS: Низкий
redhat логотип

CVE-2020-26147

около 4 лет назад

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2020-26147

около 4 лет назад

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
EPSS: Низкий
debian логотип

CVE-2020-26147

около 4 лет назад

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, ...

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-f393-4p85-6h6g

около 3 лет назад

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
EPSS: Низкий
oracle-oval логотип

ELSA-2021-9406

почти 4 года назад

ELSA-2021-9406: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9404

почти 4 года назад

ELSA-2021-9404: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9453

больше 3 лет назад

ELSA-2021-9453: Unbreakable Enterprise kernel-container security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9452

больше 3 лет назад

ELSA-2021-9452: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0947-1

почти 4 года назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0843-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1913-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1912-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1899-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1891-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1890-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1888-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1887-1

около 4 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2451-1

почти 4 года назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2021-03177

Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 5.4
0%
Низкий
около 4 лет назад
ubuntu логотип
CVE-2020-26147

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
0%
Низкий
около 4 лет назад
redhat логотип
CVE-2020-26147

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2020-26147

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
0%
Низкий
около 4 лет назад
debian логотип
CVE-2020-26147

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, ...

CVSS3: 5.4
0%
Низкий
около 4 лет назад
github логотип
GHSA-f393-4p85-6h6g

An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.

CVSS3: 5.4
0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2021-9406

ELSA-2021-9406: Unbreakable Enterprise kernel-container security update (IMPORTANT)

почти 4 года назад
oracle-oval логотип
ELSA-2021-9404

ELSA-2021-9404: Unbreakable Enterprise kernel security update (IMPORTANT)

почти 4 года назад
oracle-oval логотип
ELSA-2021-9453

ELSA-2021-9453: Unbreakable Enterprise kernel-container security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2021-9452

ELSA-2021-9452: Unbreakable Enterprise kernel security update (IMPORTANT)

больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0947-1

Security update for the Linux Kernel

почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2021:0843-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1913-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1912-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1899-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1891-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1890-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1888-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1887-1

Security update for the Linux Kernel

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2451-1

Security update for the Linux Kernel

почти 4 года назад

Уязвимостей на страницу