Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
security access point vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2015-6336
Cisco Aironet 1800 devices with software 7.2, 7.3, 7.4, 8.1(112.3), 8.1(112.4), and 8.1(15.14) have a default account, which makes it easier for remote malicious users to obtain access via unspecified vectors, aka Bug ID CSCuw58062.
Cisco Aironet Access Point Software 7.2 Base
Cisco Aironet Access Point Software 7.3 Base
Cisco Aironet Access Point Software 7.4 Base
Cisco Aironet Access Point Software 8.1(15.14)
Cisco Aironet Access Point Software 8.1(112.3)
Cisco Aironet Access Point Software 8.1(112.4)
1 Article
694
VMScore
CVE-2015-6320
The IP ingress packet handler on Cisco Aironet 1800 devices with software 8.1(112.3) and 8.1(112.4) allows remote malicious users to cause a denial of service via a crafted header in an IP packet, aka Bug ID CSCuv63138.
Cisco Aironet Access Point Software 8.1(112.3)
Cisco Aironet Access Point Software 8.1(112.4)
543
VMScore
CVE-2016-6361
The Aggregated MAC Protocol Data Unit (AMPDU) implementation on Cisco Aironet 1800, 2800, and 3800 devices with software prior to 8.2.121.0 and 8.3.x prior to 8.3.102.0 allows remote malicious users to cause a denial of service (device reload) via a crafted AMPDU header, aka Bug ...
Cisco Aironet Access Point Software 8.1(112.3)
Cisco Aironet Access Point Software 8.1(15.14)
Cisco Aironet Access Point Software 8.1(112.4)
Cisco Aironet Access Point Software 8.2(100.0)
Cisco Aironet Access Point Software 8.1(131.0)
Cisco Aironet Access Point Software 8.3.0
Cisco Aironet Access Point Software 8.2(102.43)
543
VMScore
CVE-2016-6363
The rate-limit feature in the 802.11 protocol implementation on Cisco Aironet 1800, 2800, and 3800 devices with software prior to 8.2.121.0 and 8.3.x prior to 8.3.102.0 allows remote malicious users to cause a denial of service (device reload) via crafted 802.11 frames, aka Bug I...
Cisco Aironet Access Point Software 8.1(112.3)
Cisco Aironet Access Point Software 8.1(15.14)
Cisco Aironet Access Point Software 8.1(112.4)
Cisco Aironet Access Point Software 8.2(100.0)
Cisco Aironet Access Point Software 8.1(131.0)
Cisco Aironet Access Point Software 8.3.0
Cisco Aironet Access Point Software 8.2(102.43)
641
VMScore
CVE-2016-6362
Cisco Aironet 1800, 2800, and 3800 devices with software prior to 8.2.110.0, 8.2.12x prior to 8.2.121.0, and 8.3.x prior to 8.3.102.0 allow local users to gain privileges via crafted CLI parameters, aka Bug ID CSCuz24725.
Cisco Aironet Access Point Software 8.1(112.3)
Cisco Aironet Access Point Software 8.1(15.14)
Cisco Aironet Access Point Software 8.1(112.4)
Cisco Aironet Access Point Software 8.2(100.0)
Cisco Aironet Access Point Software 8.1(131.0)
Cisco Aironet Access Point Software 8.3.0
Cisco Aironet Access Point Software 8.2(102.43)
641
VMScore
CVE-2015-6315
Cisco Aironet 1850 access points with software 8.1(112.4) allow local users to gain privileges via crafted CLI commands, aka Bug ID CSCuv79694.
Cisco Aironet Access Point Software 8.1(112.4)
694
VMScore
CVE-2015-6367
Cisco Aironet 1800 devices with software 8.1(131.0) allow remote malicious users to cause a denial of service (CPU consumption) by improperly establishing many SSHv2 connections, aka Bug ID CSCux13374.
Cisco Aironet Access Point Software 8.1(131.0)
NA
CVE-2023-31497
Incorrect access control in Quick Heal Technologies Limited Seqrite Endpoint Security (EPS) all versions prior to v8.0 allows malicious users to escalate privileges to root via supplying a crafted binary to the target system.
Seqrite End Point Security
1 Github repository
801
VMScore
CVE-2021-1552
Multiple vulnerabilities in the web-based management interface of certain Cisco Small Business 100, 300, and 500 Series Wireless Access Points could allow an authenticated, remote malicious user to perform command injection attacks against an affected device. These vulnerabilitie...
Cisco Wap125 Firmware
Cisco Wap131 Firmware
Cisco Wap150 Firmware
Cisco Wap351 Firmware
Cisco Wap361 Firmware
Cisco Wap581 Firmware
801
VMScore
CVE-2021-1553
Multiple vulnerabilities in the web-based management interface of certain Cisco Small Business 100, 300, and 500 Series Wireless Access Points could allow an authenticated, remote malicious user to perform command injection attacks against an affected device. These vulnerabilitie...
Cisco Wap125 Firmware
Cisco Wap131 Firmware
Cisco Wap150 Firmware
Cisco Wap351 Firmware
Cisco Wap361 Firmware
Cisco Wap581 Firmware
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2018-25103
CVE-2024-36279
CVE-2024-38457
elevation of privilege
CVE-2024-27801
CVE-2024-30103
NULL pointer dereference
CVE-2024-6057
XML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »