Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
aironet vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2016-1418
Cisco Aironet Access Point Software 8.2(100.0) on 1830e, 1830i, 1850e, 1850i, 2800, and 3800 access points allows local users to obtain Linux root access via crafted CLI command parameters, aka Bug ID CSCuy64037.
Cisco Aironet Access Point Software 8.2 \\(100.0\\)
NA
CVE-2012-6026
The HTTP Profiler on the Cisco Aironet Access Point with software 15.2 and previous versions does not properly manage buffers, which allows remote malicious users to cause a denial of service (device reload) via crafted HTTP requests, aka Bug ID CSCuc62460.
Cisco Aironet Access Point Software 7.3
Cisco Aironet Access Point Software 15.2
Cisco Aironet Access Point Software 12.4
Cisco Aironet Access Point Software 7.4
NA
CVE-2007-2040
Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points prior to 3.2.185.0, and 4.0.x prior to 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192.
Cisco Wireless Lan Controller Software
7.5
CVSSv3
CVE-2016-2180
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL up to and including 1.0.2h allows remote malicious users to cause a denial of service (out-of-bounds read and application crash) via a cr...
Openssl Openssl 1.0.1m
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.1j
Openssl Openssl 1.0.1h
Openssl Openssl 1.0.2e
Openssl Openssl 1.0.1r
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.1c
Openssl Openssl 1.0.1g
Openssl Openssl 1.0.2g
Openssl Openssl 1.0.1a
Openssl Openssl 1.0.2h
Openssl Openssl 1.0.1d
Openssl Openssl 1.0.1t
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.1p
Openssl Openssl 1.0.1k
Openssl Openssl 1.0.1b
Openssl Openssl 1.0.1n
Openssl Openssl 1.0.1q
Openssl Openssl 1.0.1e
Openssl Openssl 1.0.1l
NA
CVE-2014-0703
Cisco Wireless LAN Controller (WLC) devices 7.4 prior to 7.4.110.0 distribute Aironet IOS software with a race condition in the status of the administrative HTTP server, which allows remote malicious users to bypass intended access restrictions by connecting to an Aironet access ...
Cisco Wireless Lan Controller Software 7.4.100.0
Cisco Wireless Lan Controller Software 7.4.100.60
Cisco Wireless Lan Controller
NA
CVE-2002-0012
Vulnerabilities in a large number of SNMP implementations allow remote malicious users to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into m...
Snmp Snmp
NA
CVE-2002-0013
Vulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote malicious users to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test...
Snmp Snmp
1 EDB exploit
6.7
CVSSv3
CVE-2016-9196
A vulnerability in login authentication management in Cisco Aironet 1800, 2800, and 3800 Series Access Point platforms could allow an authenticated, local malicious user to gain unrestricted root access to the underlying Linux operating system. The root Linux shell is provided fo...
Cisco Aironet Access Point 8.1\\(112.4\\)
Cisco Aironet Access Point 8.1\\(15.14\\)
Cisco Aironet Access Point 8.2\\(100.0\\)
Cisco Aironet Access Point 8.2\\(102.43\\)
Cisco Aironet Access Point 8.2 Base
Cisco Aironet Access Point 8.1\\(131.0\\)
Cisco Aironet Access Point 8.1\\(112.3\\)
NA
CVE-2024-20354
A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to incomplete cleanup of...
7.5
CVSSv3
CVE-2020-3262
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol handler of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on an affected device. The vulner...
Cisco 5508 Wireless Controller Firmware 8.8\\(120.0\\)
Cisco 5520 Wireless Controller Firmware 8.8\\(120.0\\)
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »