Bug | Description |
---|
CVE-2024-5290 | An issue was discovered in Ubuntu wpa_supplicant that resulted in load ... |
CVE-2023-52160 | The implementation of PEAP in wpa_supplicant through 2.10 allows authe ... |
CVE-2021-27803 | A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant b ... |
CVE-2021-0326 | In p2p_copy_client_info of p2p.c, there is a possible out of bounds wr ... |
CVE-2020-12695 | The Open Connectivity Foundation UPnP specification before 2020-04-17 ... |
CVE-2019-16275 | hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect ... |
CVE-2019-13377 | The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2 ... |
CVE-2019-11555 | The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_ ... |
CVE-2019-10064 | hostapd before 2.6, in EAP mode, makes calls to the rand() and random( ... |
CVE-2019-9499 | The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built ... |
CVE-2019-9498 | The implementations of EAP-PWD in hostapd EAP Server, when built again ... |
CVE-2019-9497 | The implementations of EAP-PWD in hostapd EAP Server and wpa_supplican ... |
CVE-2019-9496 | An invalid authentication sequence could result in the hostapd process ... |
CVE-2019-9495 | The implementations of EAP-PWD in hostapd and wpa_supplicant are vulne ... |
CVE-2019-9494 | The implementations of SAE in hostapd and wpa_supplicant are vulnerabl ... |
CVE-2019-5061 | An exploitable denial-of-service vulnerability exists in the hostapd 2 ... |
CVE-2018-14526 | An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 throug ... |
CVE-2017-13088 | Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows rein ... |
CVE-2017-13087 | Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows rein ... |
CVE-2017-13086 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tun ... |
CVE-2017-13082 | Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allow ... |
CVE-2017-13081 | Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allow ... |
CVE-2017-13080 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Gro ... |
CVE-2017-13079 | Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allow ... |
CVE-2017-13078 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Gro ... |
CVE-2017-13077 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pai ... |
CVE-2016-10743 | hostapd before 2.6 does not prevent use of the low-quality PRNG that i ... |
CVE-2016-4477 | wpa_supplicant 0.4.0 through 2.5 does not reject \n and \r characters ... |
CVE-2016-4476 | hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not ... |
CVE-2015-8041 | Multiple integer overflows in the NDEF record parser in hostapd before ... |
CVE-2015-5316 | The eap_pwd_perform_confirm_exchange function in eap_peer/eap_pwd.c in ... |
CVE-2015-5315 | The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2 ... |
CVE-2015-5314 | The eap_pwd_process function in eap_server/eap_server_pwd.c in hostapd ... |
CVE-2015-5310 | The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not prop ... |
CVE-2015-4146 | The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 thro ... |
CVE-2015-4145 | The EAP-pwd server and peer implementation in hostapd and wpa_supplica ... |
CVE-2015-4144 | The EAP-pwd server and peer implementation in hostapd and wpa_supplica ... |
CVE-2015-4143 | The EAP-pwd server and peer implementation in hostapd and wpa_supplica ... |
CVE-2015-4142 | Integer underflow in the WMM Action frame parser in hostapd 0.5.5 thro ... |
CVE-2015-4141 | The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplican ... |
CVE-2015-1863 | Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows re ... |
CVE-2014-3686 | wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certai ... |
CVE-2012-4445 | Heap-based buffer overflow in the eap_server_tls_process_fragment func ... |
CVE-2012-2389 | hostapd 0.7.3, and possibly other versions before 1.0, uses 0644 permi ... |