Количество 12
Количество 12

CVE-2017-13086
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

CVE-2017-13086
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

CVE-2017-13086
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
CVE-2017-13086
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tun ...
GHSA-9pwc-v5p9-3c37
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.

BDU:2017-02270
Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (Tunered Direct Link PeerKey) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети
ELSA-2017-2907
ELSA-2017-2907: wpa_supplicant security update (IMPORTANT)

SUSE-SU-2020:3424-1
Security update for wpa_supplicant

SUSE-SU-2022:1853-1
Security update for wpa_supplicant

openSUSE-SU-2020:2059-1
Security update for wpa_supplicant

openSUSE-SU-2020:2053-1
Security update for wpa_supplicant

SUSE-SU-2020:3380-1
Security update for wpa_supplicant
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2017-13086 Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. | CVSS3: 6.8 | 0% Низкий | больше 7 лет назад |
![]() | CVE-2017-13086 Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. | CVSS3: 8.1 | 0% Низкий | больше 7 лет назад |
![]() | CVE-2017-13086 Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. | CVSS3: 6.8 | 0% Низкий | больше 7 лет назад |
CVE-2017-13086 Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tun ... | CVSS3: 6.8 | 0% Низкий | больше 7 лет назад | |
GHSA-9pwc-v5p9-3c37 Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames. | CVSS3: 6.8 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2017-02270 Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (Tunered Direct Link PeerKey) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети | CVSS3: 7.9 | 0% Низкий | почти 8 лет назад |
ELSA-2017-2907 ELSA-2017-2907: wpa_supplicant security update (IMPORTANT) | больше 7 лет назад | |||
![]() | SUSE-SU-2020:3424-1 Security update for wpa_supplicant | больше 4 лет назад | ||
![]() | SUSE-SU-2022:1853-1 Security update for wpa_supplicant | около 3 лет назад | ||
![]() | openSUSE-SU-2020:2059-1 Security update for wpa_supplicant | больше 4 лет назад | ||
![]() | openSUSE-SU-2020:2053-1 Security update for wpa_supplicant | больше 4 лет назад | ||
![]() | SUSE-SU-2020:3380-1 Security update for wpa_supplicant | больше 4 лет назад |
Уязвимостей на страницу