[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

Paid content will be excluded from the download.


Download | Alert*


CVE-2014-3686
wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

CVE-2019-11555
The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (deni ...

*CPE
cpe:/a:w1.fi:wpa_supplicant:0.72
OVAL    8
oval:org.secpod.oval:def:107864
oval:org.secpod.oval:def:501461
oval:org.secpod.oval:def:108854
oval:org.secpod.oval:def:1501035
...

© SecPod Technologies