CVE-2014-8322
- EPSS 32.21%
- Veröffentlicht 31.01.2020 22:15:11
- Zuletzt bearbeitet 21.11.2024 02:18:51
Stack-based buffer overflow in the tcp_test function in aireplay-ng.c in Aircrack-ng before 1.2 RC 1 allows remote attackers to execute arbitrary code via a crafted length parameter value.
CVE-2014-8321
- EPSS 0.19%
- Veröffentlicht 31.01.2020 22:15:10
- Zuletzt bearbeitet 21.11.2024 02:18:51
Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors.
CVE-2014-8323
- EPSS 7.88%
- Veröffentlicht 17.10.2017 14:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
buddy-ng.c in Aircrack-ng before 1.2 Beta 3 allows remote attackers to cause a denial of service (segmentation fault) via a response with a crafted length parameter.
CVE-2014-8324
- EPSS 7.88%
- Veröffentlicht 17.10.2017 14:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
network.c in Aircrack-ng before 1.2 Beta 3 allows remote attackers to cause a denial of service (segmentation fault) via a response with a crafted length parameter.
CVE-2010-1159
- EPSS 26.4%
- Veröffentlicht 28.10.2013 22:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
Multiple heap-based buffer overflows in Aircrack-ng before 1.1 allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a (1) large length value in an EAPOL packet or (2) long EAPOL packet.