Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco aironet access point software 7.3 vulnerabilities and exploits
(subscribe to this query)
7.3
CVSSv3
CVE-2015-6336
Cisco Aironet 1800 devices with software 7.2, 7.3, 7.4, 8.1(112.3), 8.1(112.4), and 8.1(15.14) have a default account, which makes it easier for remote malicious users to obtain access via unspecified vectors, aka Bug ID CSCuw58062.
Cisco Aironet Access Point Software 7.4 Base
Cisco Aironet Access Point Software 7.3 Base
Cisco Aironet Access Point Software 8.1\\(112.4\\)
Cisco Aironet Access Point Software 8.1\\(112.3\\)
Cisco Aironet Access Point Software 7.2 Base
Cisco Aironet Access Point Software 8.1\\(15.14\\)
1 Article
NA
CVE-2014-0703
Cisco Wireless LAN Controller (WLC) devices 7.4 prior to 7.4.110.0 distribute Aironet IOS software with a race condition in the status of the administrative HTTP server, which allows remote malicious users to bypass intended access restrictions by connecting to an Aironet access ...
Cisco Wireless Lan Controller Software 7.4.100.0
Cisco Wireless Lan Controller Software 7.4.100.60
Cisco Wireless Lan Controller
NA
CVE-2012-6026
The HTTP Profiler on the Cisco Aironet Access Point with software 15.2 and previous versions does not properly manage buffers, which allows remote malicious users to cause a denial of service (device reload) via crafted HTTP requests, aka Bug ID CSCuc62460.
Cisco Aironet Access Point Software 7.3
Cisco Aironet Access Point Software 15.2
Cisco Aironet Access Point Software 12.4
Cisco Aironet Access Point Software 7.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started