wpa vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the wpa package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Authentication

<2:2.7+git20190128+0c1e29f-6+deb10u4
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Improper Input Validation

*
  • H
CVE-2021-27803

<2:2.7+git20190128+0c1e29f-6+deb10u3
  • H
Out-of-bounds Write

<2:2.7+git20190128+0c1e29f-6+deb10u3
  • H
Incorrect Default Permissions

<2:2.7+git20190128+0c1e29f-6+deb10u3
  • H
Insufficient Entropy

<2:2.6-7
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Origin Validation Error

<2:2.7+git20190128+0c1e29f-6+deb10u1
  • M
Information Exposure

<2:2.7+git20190128+0c1e29f-6+deb10u1
  • M
NULL Pointer Dereference

<2:2.7+git20190128+0c1e29f-5
  • H
Improper Authentication

<2:2.7+git20190128+0c1e29f-4
  • M
Information Exposure

<2:2.7+git20190128+0c1e29f-4
  • L
Use of a Broken or Risky Cryptographic Algorithm

<2:2.7+git20190128+0c1e29f-4
  • H
Improper Authentication

<2:2.7+git20190128+0c1e29f-4
  • H
Improper Authentication

<2:2.7+git20190128+0c1e29f-4
  • H
Improper Authentication

<2:2.7+git20190128+0c1e29f-4
  • L
Insufficient Entropy in PRNG

<2:2.6-7
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<2:2.6-18
  • M
NULL Pointer Dereference

<2.3-2.3
  • M
Out-of-Bounds

<2.3-2.3
  • M
Out-of-Bounds

<2.3-2.3
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • H
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • L
Use of Insufficiently Random Values

*
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • H
Improper Input Validation

<2.3-2.4
  • H
Improper Data Handling

<2.3-2.4
  • M
Information Exposure

<2.3-2.3
  • M
Numeric Errors

<2.3-2.2
  • M
Resource Management Errors

<2.3-2.2
  • M
Out-of-Bounds

<2.3-2.2
  • M
Out-of-Bounds

<2.3-2.2
  • M
Out-of-Bounds

<2.3-2.2
  • M
CVE-2015-4146

<2.3-2.2
  • M
Out-of-Bounds

<2.3-2.2
  • M
Out-of-Bounds

<2.3-2
  • H
Improper Input Validation

<2.3-1
  • M
Out-of-Bounds

<1.0-3