wpa vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the wpa package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2021-27803

<2:2.9.0-21
  • H
Incorrect Default Permissions

<2:2.9.0-16
  • C
Information Exposure

<2:2.10-1
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<2:2.6-18
  • L
Use of a Broken or Risky Cryptographic Algorithm

<2:2.7+git20190128+0c1e29f-4
  • H
Uncontrolled Search Path Element

<2:2.10-22
  • M
Out-of-Bounds

<2.3-2.3
  • L
Improper Input Validation

*
  • H
Improper Authentication

<2:2.7+git20190128+0c1e29f-4
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Information Exposure

<2:2.7+git20190128+0c1e29f-4
  • M
CVE-2015-4146

<2.3-2.2
  • M
Information Exposure

<2:2.9-1
  • M
Out-of-Bounds

<1.0-3
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • H
Insufficient Entropy

<2:2.6-7
  • H
Improper Data Handling

<2.3-2.4
  • L
Use of Insufficiently Random Values

*
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Numeric Errors

<2.3-2.2
  • M
Resource Management Errors

<2.3-2.2
  • M
Out-of-Bounds

<2.3-2.2
  • M
Out-of-Bounds

<2.3-2.2
  • H
Improper Authentication

<2:2.7+git20190128+0c1e29f-4
  • M
Improper Authentication

<2:2.10-21.1
  • H
Out-of-bounds Write

<2:2.9.0-17
  • L
Improper Input Validation

*
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Out-of-Bounds

<2.3-2.3
  • M
Information Exposure

<2.3-2.3
  • H
Use of Insufficiently Random Values

<2:2.4-1.1
  • H
Improper Input Validation

<2.3-2.4
  • M
Out-of-Bounds

<2.3-2.2
  • L
CVE-2022-37660

<2:2.10-24
  • H
Improper Authentication

<2:2.7+git20190128+0c1e29f-4
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • L
Insufficient Entropy in PRNG

<2:2.6-7
  • M
Origin Validation Error

<2:2.9-2
  • M
Out-of-Bounds

<2.3-2.2
  • H
Improper Input Validation

<2.3-1
  • H
Improper Authentication

<2:2.7+git20190128+0c1e29f-4
  • M
NULL Pointer Dereference

<2:2.7+git20190128+0c1e29f-5
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • L
Improper Input Validation

<2:2.9+git20200213+877d9a0-1
  • C
Information Exposure

<2:2.10-1
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
NULL Pointer Dereference

<2.3-2.3
  • M
Out-of-Bounds

<2.3-2