wpa vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the wpa package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2022-37660

<2:2.10-24
  • H
Uncontrolled Search Path Element

<2:2.10-22
  • M
Improper Authentication

<2:2.10-21.1
  • C
Information Exposure

<2:2.10-1
  • C
Information Exposure

<2:2.10-1
  • L
Improper Input Validation

*
  • H
CVE-2021-27803

<2:2.9.0-21
  • H
Out-of-bounds Write

<2:2.9.0-17
  • H
Incorrect Default Permissions

<2:2.9.0-16
  • H
Insufficient Entropy

<2:2.6-7
  • L
Improper Input Validation

<2:2.9+git20200213+877d9a0-1
  • L
Improper Input Validation

*
  • M
Origin Validation Error

<2:2.9-2
  • M
Information Exposure

<2:2.9-1
  • M
NULL Pointer Dereference

<2:2.7+git20190128+0c1e29f-5
  • H
Improper Authentication

<2:2.7+git20190128+0c1e29f-4
  • M
Information Exposure

<2:2.7+git20190128+0c1e29f-4
  • L
Use of a Broken or Risky Cryptographic Algorithm

<2:2.7+git20190128+0c1e29f-4
  • H
Improper Authentication

<2:2.7+git20190128+0c1e29f-4
  • H
Improper Authentication

<2:2.7+git20190128+0c1e29f-4
  • H
Improper Authentication

<2:2.7+git20190128+0c1e29f-4
  • L
Insufficient Entropy in PRNG

<2:2.6-7
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<2:2.6-18
  • M
Out-of-Bounds

<2.3-2.3
  • M
NULL Pointer Dereference

<2.3-2.3
  • M
Out-of-Bounds

<2.3-2.3
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • H
Use of Insufficiently Random Values

<2:2.4-1.1
  • L
Use of Insufficiently Random Values

*
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • M
Use of Insufficiently Random Values

<2:2.4-1.1
  • H
Improper Input Validation

<2.3-2.4
  • H
Improper Data Handling

<2.3-2.4
  • M
Information Exposure

<2.3-2.3
  • M
Numeric Errors

<2.3-2.2
  • M
CVE-2015-4146

<2.3-2.2
  • M
Out-of-Bounds

<2.3-2.2
  • M
Resource Management Errors

<2.3-2.2
  • M
Out-of-Bounds

<2.3-2.2
  • M
Out-of-Bounds

<2.3-2.2
  • M
Out-of-Bounds

<2.3-2.2
  • M
Out-of-Bounds

<2.3-2
  • H
Improper Input Validation

<2.3-1
  • M
Out-of-Bounds

<1.0-3