NVD List
| Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
|---|---|---|---|---|---|---|---|---|---|
| 25637 | CVE-2015-4146 | The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message. | 2 | 5 | Medium | 2017-01-19 | 2016-07-29 | View | |
| 25636 | CVE-2015-4145 | The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message. | 2 | 5 | Medium | 2017-01-19 | 2016-07-29 | View | |
| 25635 | CVE-2015-4144 | The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message. | 2 | 5 | Medium | 2017-01-19 | 2016-07-29 | View | |
| 25634 | CVE-2015-4143 | The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload. | 2 | 5 | Medium | 2017-01-19 | 2016-07-29 | View | |
| 25633 | CVE-2015-4142 | Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read. | 2 | 4.3 | Medium | 2017-01-19 | 2016-12-07 | View |
Page 3232 of 17672, showing 5 records out of 88360 total, starting on record 16156, ending on 16160