Количество 7
Количество 7
GHSA-f2g3-x645-4qw2
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.

CVE-2020-26142
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.

CVE-2020-26142
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.

CVE-2020-26142
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.
CVE-2020-26142
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WP ...

BDU:2021-02667
Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 ядра операционной системы OpenBSD, позволяющая нарушителю внедрить произвольные сетевые пакеты
ELSA-2021-9459
ELSA-2021-9459: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-f2g3-x645-4qw2 An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration. | 2% Низкий | около 3 лет назад | ||
![]() | CVE-2020-26142 An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration. | CVSS3: 5.3 | 2% Низкий | около 4 лет назад |
![]() | CVE-2020-26142 An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration. | CVSS3: 7.5 | 2% Низкий | около 4 лет назад |
![]() | CVE-2020-26142 An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration. | CVSS3: 5.3 | 2% Низкий | около 4 лет назад |
CVE-2020-26142 An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WP ... | CVSS3: 5.3 | 2% Низкий | около 4 лет назад | |
![]() | BDU:2021-02667 Уязвимость реализации алгоритмов WEP, WPA, WPA2 и WPA3 ядра операционной системы OpenBSD, позволяющая нарушителю внедрить произвольные сетевые пакеты | CVSS3: 5.3 | 2% Низкий | около 4 лет назад |
ELSA-2021-9459 ELSA-2021-9459: Unbreakable Enterprise kernel security update (IMPORTANT) | почти 4 года назад |
Уязвимостей на страницу