Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Aircrack\-Ng
(Aircrack\-Ng)Repositories | https://github.com/aircrack-ng/aircrack-ng |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-01-31 | CVE-2014-8322 | Stack-based buffer overflow in the tcp_test function in aireplay-ng.c in Aircrack-ng before 1.2 RC 1 allows remote attackers to execute arbitrary code via a crafted length parameter value. | Aircrack\-Ng | N/A | ||
2020-01-31 | CVE-2014-8321 | Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors. | Aircrack\-Ng | N/A | ||
2017-10-17 | CVE-2014-8324 | network.c in Aircrack-ng before 1.2 Beta 3 allows remote attackers to cause a denial of service (segmentation fault) via a response with a crafted length parameter. | Aircrack\-Ng | 7.5 | ||
2017-10-17 | CVE-2014-8323 | buddy-ng.c in Aircrack-ng before 1.2 Beta 3 allows remote attackers to cause a denial of service (segmentation fault) via a response with a crafted length parameter. | Aircrack\-Ng | 7.5 | ||
2013-10-28 | CVE-2010-1159 | Multiple heap-based buffer overflows in Aircrack-ng before 1.1 allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a (1) large length value in an EAPOL packet or (2) long EAPOL packet. | Aircrack\-Ng, Linux | N/A |