Логотип exploitDog
bind:CVE-2015-5310
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-5310

Количество 8

Количество 8

ubuntu логотип

CVE-2015-5310

около 10 лет назад

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2015-5310

около 10 лет назад

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

CVSS2: 2.9
EPSS: Низкий
nvd логотип

CVE-2015-5310

около 10 лет назад

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2015-5310

около 10 лет назад

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not prop ...

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-w9vx-28m4-g24h

больше 3 лет назад

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

CVSS3: 4.3
EPSS: Низкий
fstec логотип

BDU:2016-00081

около 10 лет назад

Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию

CVSS2: 3.3
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2016:2357-1

больше 9 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2016:2305-1

больше 9 лет назад

Security update for wpa_supplicant

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2015-5310

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

CVSS3: 4.3
0%
Низкий
около 10 лет назад
redhat логотип
CVE-2015-5310

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

CVSS2: 2.9
0%
Низкий
около 10 лет назад
nvd логотип
CVE-2015-5310

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

CVSS3: 4.3
0%
Низкий
около 10 лет назад
debian логотип
CVE-2015-5310

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not prop ...

CVSS3: 4.3
0%
Низкий
около 10 лет назад
github логотип
GHSA-w9vx-28m4-g24h

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

CVSS3: 4.3
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2016-00081

Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию

CVSS2: 3.3
0%
Низкий
около 10 лет назад
suse-cvrf логотип
openSUSE-SU-2016:2357-1

Security update for wpa_supplicant

больше 9 лет назад
suse-cvrf логотип
SUSE-SU-2016:2305-1

Security update for wpa_supplicant

больше 9 лет назад

Уязвимостей на страницу