Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco 1100 firmware - vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2015-7705
The rate limiting feature in NTP 4.x prior to 4.2.8p4 and 4.3.x prior to 4.3.77 allows remote malicious users to have unspecified impact via a large number of crafted requests.
Ntp Ntp 4.2.8
Ntp Ntp
Netapp Clustered Data Ontap -
Netapp Data Ontap -
Netapp Oncommand Unified Manager -
Netapp Oncommand Performance Manager -
Citrix Xenserver 7.0
Citrix Xenserver 6.0.2
Citrix Xenserver 6.5
Citrix Xenserver 6.2.0
Siemens Tim 4r-ie Firmware
Siemens Tim 4r-ie Dnp3 Firmware
7.8
CVSSv3
CVE-2021-1419
A vulnerability in the SSH management feature of multiple Cisco Access Points (APs) platforms could allow a local, authenticated user to modify files on the affected device and possibly gain escalated privileges. The vulnerability is due to improper checking on file operations wi...
Cisco Aironet 1542d Firmware -
Cisco Aironet 1562d Firmware -
Cisco Aironet 1815m Firmware -
Cisco Aironet 1830e Firmware -
Cisco Aironet 1840i Firmware -
Cisco Aironet 1850e Firmware -
Cisco Aironet 2800i Firmware -
Cisco Aironet 3800p Firmware -
Cisco Aironet 4800 Firmware -
Cisco Catalyst 9105axi Firmware -
Cisco Catalyst 9115axe Firmware -
Cisco Catalyst 9117 Firmware -
Cisco Catalyst 9120axi Firmware -
Cisco Catalyst 9124axd Firmware -
Cisco Catalyst 9130axe Firmware -
Cisco Catalyst Iw6300 Ac Firmware -
Cisco Esw6300 Firmware -
Cisco 1100-8p Firmware -
Cisco 1120 Firmware -
Cisco 1160 Firmware -
Cisco Wireless Lan Controller Software
Cisco Catalyst 9800 Firmware
7.5
CVSSv3
CVE-2021-1437
A vulnerability in the FlexConnect Upgrade feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, remote malicious user to obtain confidential information from an affected device. This vulnerability is due to an unrestricted Trivial File Transfer P...
Cisco Aironet Access Point Software -
Cisco Catalyst 9800 Firmware
Cisco Wireless Lan Controller Software
7.4
CVSSv3
CVE-2021-1439
A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input v...
Cisco Aironet Access Point Software -
Cisco Catalyst 9800 Firmware
6.8
CVSSv3
CVE-2017-13084
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Debian Debian Linux 8.0
Freebsd Freebsd
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Opensuse Leap 42.3
Opensuse Leap 42.2
Redhat Enterprise Linux Server 7
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Freebsd Freebsd 10
Freebsd Freebsd 10.4
W1.fi Hostapd 1.1
W1.fi Hostapd 2.4
W1.fi Hostapd 2.0
W1.fi Hostapd 0.7.3
W1.fi Wpa Supplicant 2.3
W1.fi Wpa Supplicant 2.1
W1.fi Wpa Supplicant 2.2
W1.fi Hostapd 1.0
1 Article
6.7
CVSSv3
CVE-2021-1449
A vulnerability in the boot logic of Cisco Access Points Software could allow an authenticated, local malicious user to execute unsigned code at boot time. The vulnerability is due to an improper check that is performed by the area of code that manages system startup processes. A...
Cisco Aironet Access Point Software -
Cisco Catalyst 9800 Firmware
Cisco Wireless Lan Controller Software
6.5
CVSSv3
CVE-2020-26140
An issue exists in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
Alfa Awus036h Firmware 6.1316.1209
Siemens Scalance W1748-1 Firmware -
Siemens Scalance W1750d Firmware -
Siemens Scalance W1788-1 Firmware -
Siemens Scalance W1788-2 Firmware -
Siemens Scalance W1788-2ia Firmware -
Siemens Scalance W721-1 Firmware -
Siemens Scalance W722-1 Firmware -
Siemens Scalance W734-1 Firmware -
Siemens Scalance W738-1 Firmware -
Siemens Scalance W748-1 Firmware -
Siemens Scalance W761-1 Firmware -
Siemens Scalance W774-1 Firmware -
Siemens Scalance W778-1 Firmware -
Siemens Scalance W786-1 Firmware -
Siemens Scalance W786-2 Firmware -
Siemens Scalance W786-2ia Firmware -
Siemens Scalance W788-1 Firmware -
Siemens Scalance W788-2 Firmware -
Siemens Scalance Wam763-1 Firmware -
Siemens Scalance Wam766-1 Firmware -
Siemens Scalance Wam766-1 6ghz Firmware -
6.5
CVSSv3
CVE-2020-26141
An issue exists in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that s...
Alfa Awus036h Firmware 6.1316.1209
Cisco Meraki Gr10 Firmware
Cisco Meraki Gr60 Firmware
Cisco Meraki Mr20 Firmware
Cisco Meraki Mr30h Firmware
Cisco Meraki Mr33 Firmware
Cisco Meraki Mr36 Firmware
Cisco Meraki Mr42 Firmware
Cisco Meraki Mr42e Firmware
Cisco Meraki Mr44 Firmware
Cisco Meraki Mr45 Firmware
Cisco Meraki Mr46 Firmware
Cisco Meraki Mr46e Firmware
Cisco Meraki Mr52 Firmware
Cisco Meraki Mr53 Firmware
Cisco Meraki Mr53e Firmware
Cisco Meraki Mr55 Firmware
Cisco Meraki Mr56 Firmware
Cisco Meraki Mr70 Firmware
Cisco Meraki Mr74 Firmware
Cisco Meraki Mr76 Firmware
Cisco Meraki Mr84 Firmware
6.5
CVSSv3
CVE-2020-26143
An issue exists in the ALFA Windows 10 driver 1030.36.604 for AWUS036ACH. The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configura...
Alfa Awus036h Firmware 1030.36.604
Arista C-75 Firmware -
Arista O-90 Firmware -
Arista C-65 Firmware -
Arista W-68 Firmware -
Siemens Scalance W700 Ieee 802.11n Firmware
6.5
CVSSv3
CVE-2020-26144
An issue exists on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary netw...
Samsung Galaxy I9305 Firmware 4.4.4
Arista C-250 Firmware
Arista C-260 Firmware
Arista C-230 Firmware
Arista C-235 Firmware
Arista C-200 Firmware
Arista C-120 Firmware
Arista C-130 Firmware
Arista C-100 Firmware
Arista C-110 Firmware
Arista O-105 Firmware
Arista W-118 Firmware
Arista C-75 Firmware -
Arista O-90 Firmware -
Arista C-65 Firmware -
Arista W-68 Firmware -
Siemens Scalance W700 Ieee 802.11ax Firmware
Siemens Scalance W700 Ieee 802.11n Firmware
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4541
CVE-2024-3080
CVE-2024-4787
log injection
CVE-2024-5967
inject
CVE-2024-30078
CVE-2024-5899
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »