Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco wireless lan controller software 8.0.120.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2015-6341
The Web Management GUI on Cisco Wireless LAN Controller (WLC) devices with software 7.4(140.0) and 8.0(120.0) allows remote malicious users to cause a denial of service (client disconnection) via unspecified vectors, aka Bug ID CSCuw10610.
Cisco Wireless Lan Controller Software 8.0.120.0
Cisco Wireless Lan Controller Software 7.4.140.0
6.1
CVSSv2
CVE-2016-6376
The Adaptive Wireless Intrusion Prevention System (wIPS) feature on Cisco Wireless LAN Controller (WLC) devices prior to 8.0.140.0, 8.1.x and 8.2.x prior to 8.2.121.0, and 8.3.x prior to 8.3.102.0 allows remote malicious users to cause a denial of service (device restart) via a m...
Cisco Wireless Lan Controller 4.0.179.11
Cisco Wireless Lan Controller 3.2.116.21
Cisco Wireless Lan Controller 3.2.185.0
Cisco Wireless Lan Controller 4.0.155.0
Cisco Wireless Lan Controller 3.2.193.5
Cisco Wireless Lan Controller 3.0 Base
Cisco Wireless Lan Controller 4.1.185.0
Cisco Wireless Lan Controller 5.0.148.0
Cisco Wireless Lan Controller 5.0.148.2
Cisco Wireless Lan Controller 4.2.173.0
Cisco Wireless Lan Controller 4.2.174.0
Cisco Wireless Lan Controller 6.0 199.4
Cisco Wireless Lan Controller 6.0 202.0
Cisco Wireless Lan Controller 7.0 Base
Cisco Wireless Lan Controller 7.1 91.0
Cisco Wireless Lan Controller 7.2 103.0
Cisco Wireless Lan Controller 7.4.100
Cisco Wireless Lan Controller 7.4.100.60
Cisco Wireless Lan Controller 4.0.196
Cisco Wireless Lan Controller 3.2.78.0
Cisco Wireless Lan Controller 3.2.150.6
Cisco Wireless Lan Controller 3.2.150.10
6.1
CVSSv2
CVE-2016-9194
A vulnerability in 802.11 Wireless Multimedia Extensions (WME) action frame processing in Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition. The vulnerability is due to incomplete inpu...
Cisco Wireless Lan Controller 8.1.104.37
Cisco Wireless Lan Controller 6.0 Base
Cisco Wireless Lan Controller 5.2.157.0
Cisco Wireless Lan Controller 7.5.102.11
Cisco Wireless Lan Controller 8.1.111.0
Cisco Wireless Lan Controller 7.0 240.0
Cisco Wireless Lan Controller 7.4 1.19
Cisco Wireless Lan Controller 7.0 220.0
Cisco Wireless Lan Controller 7.0 98.0
Cisco Wireless Lan Controller 7.2 103.0
Cisco Wireless Lan Controller 8.1.0
Cisco Wireless Lan Controller 7.0 252.0
Cisco Wireless Lan Controller 7.5.102.0
Cisco Wireless Lan Controller 6.0 202.0
Cisco Wireless Lan Controller 8.1.122.0
Cisco Wireless Lan Controller 7.3.101.0
Cisco Wireless Lan Controller 8.0.0
Cisco Wireless Lan Controller 7.4.100
Cisco Wireless Lan Controller 8.0.72.140
Cisco Wireless Lan Controller 7.4 Base
Cisco Wireless Lan Controller 7.4.100.60
Cisco Wireless Lan Controller 8.0.0.30220.385
10
CVSSv2
CVE-2015-6314
Cisco Wireless LAN Controller (WLC) devices with software 7.6.x, 8.0 prior to 8.0.121.0, and 8.1 prior to 8.1.131.0 allow remote malicious users to change configuration settings via unspecified vectors, aka Bug ID CSCuw06153.
Cisco Wireless Lan Controller Software 8.0 Base
Cisco Wireless Lan Controller Software 8.1.104.37
Cisco Wireless Lan Controller Software 8.1.0
Cisco Wireless Lan Controller Software 8.1.122.0
Cisco Wireless Lan Controller Software 8.1.111.0
Cisco Wireless Lan Controller Software 8.0.72.140
1 Article
5.7
CVSSv2
CVE-2016-6375
Cisco Wireless LAN Controller (WLC) devices prior to 8.0.140.0, 8.1.x and 8.2.x prior to 8.2.121.0, and 8.3.x prior to 8.3.102.0 allow remote malicious users to cause a denial of service (device reload) by sending crafted Inter-Access Point Protocol (IAPP) packets and then sendin...
Cisco Wireless Lan Controller Software 4.0.179.8
Cisco Wireless Lan Controller Software 4.0.179.11
Cisco Wireless Lan Controller Software 3.1.111.0
Cisco Wireless Lan Controller Software 3.2.185.0
Cisco Wireless Lan Controller Software 3.2.195.10
Cisco Wireless Lan Controller Software 3.2.193.5
Cisco Wireless Lan Controller Software 4.2.130.0
Cisco Wireless Lan Controller Software 5.0.148.0
Cisco Wireless Lan Controller Software 4.2.117.0
Cisco Wireless Lan Controller Software 4.0.196
Cisco Wireless Lan Controller Software 3.2.78.0
Cisco Wireless Lan Controller Software 3.2.150.10
Cisco Wireless Lan Controller Software 3.2.171.5
Cisco Wireless Lan Controller Software 4.1 Base
Cisco Wireless Lan Controller Software 4.1.181.0
Cisco Wireless Lan Controller Software 4.0.219.0
Cisco Wireless Lan Controller Software 4.2 Base
Cisco Wireless Lan Controller Software 4.2.61.0
Cisco Wireless Lan Controller Software 5.2.157.0
Cisco Wireless Lan Controller Software 5.2.169.0
Cisco Wireless Lan Controller Software 4.2.182.0
Cisco Wireless Lan Controller Software 6.0 Base
5
CVSSv2
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected ...
Openssl Openssl 1.0.1j
5
CVSSv2
CVE-2015-0207
The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 prior to 1.0.2a does not properly isolate the state information of independent data streams, which allows remote malicious users to cause a denial of service (application crash) via crafted DTLS traffic, as demonstrated by DT...
Openssl Openssl 1.0.2
4.3
CVSSv2
CVE-2015-0208
The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c in OpenSSL 1.0.2 prior to 1.0.2a allows remote malicious users to cause a denial of service (NULL pointer dereference and application crash) via crafted RSA PSS parameters to...
Openssl Openssl 1.0.2
6.8
CVSSv2
CVE-2015-0209
Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL prior to 0.9.8zf, 1.0.0 prior to 1.0.0r, 1.0.1 prior to 1.0.1m, and 1.0.2 prior to 1.0.2a might allow remote malicious users to cause a denial of service (memory corruption and applica...
Openssl Openssl 1.0.1j
Openssl Openssl 1.0.0n
Openssl Openssl 1.0.0c
Openssl Openssl 1.0.0i
Openssl Openssl 1.0.1h
Openssl Openssl 1.0.0m
Openssl Openssl 1.0.1c
Openssl Openssl 1.0.1g
Openssl Openssl 1.0.0h
Openssl Openssl 1.0.0e
Openssl Openssl 1.0.0f
Openssl Openssl 1.0.0d
Openssl Openssl 1.0.0j
Openssl Openssl 1.0.0p
Openssl Openssl 1.0.1a
Openssl Openssl 1.0.0o
Openssl Openssl 1.0.1d
Openssl Openssl 1.0.0k
Openssl Openssl 1.0.1k
Openssl Openssl 1.0.0
Openssl Openssl 1.0.1b
Openssl Openssl 1.0.1e
4.3
CVSSv2
CVE-2015-0285
The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 prior to 1.0.2a does not ensure that the PRNG is seeded before proceeding with a handshake, which makes it easier for remote malicious users to defeat cryptographic protection mechanisms by sniffing the network and then...
Openssl Openssl 1.0.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »