[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*


CVE-2016-10743
hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.

CVE-2019-11555
The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (deni ...

*CPE
cpe:/a:w1.fi:hostapd:0.4.2
OVAL    8
oval:org.secpod.oval:def:55018
oval:org.secpod.oval:def:54400
oval:org.secpod.oval:def:55306
oval:org.secpod.oval:def:1801484
...

© SecPod Technologies