Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
aironet vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-2016-1418
Cisco Aironet Access Point Software 8.2(100.0) on 1830e, 1830i, 1850e, 1850i, 2800, and 3800 access points allows local users to obtain Linux root access via crafted CLI command parameters, aka Bug ID CSCuy64037.
Cisco Aironet Access Point Software 8.2 \\(100.0\\)
446
VMScore
CVE-2016-2180
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL up to and including 1.0.2h allows remote malicious users to cause a denial of service (out-of-bounds read and application crash) via a cr...
Openssl Openssl 1.0.1m
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.1j
Openssl Openssl 1.0.1h
Openssl Openssl 1.0.2e
Openssl Openssl 1.0.1r
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.1c
Openssl Openssl 1.0.1g
Openssl Openssl 1.0.2g
Openssl Openssl 1.0.1a
Openssl Openssl 1.0.2h
Openssl Openssl 1.0.1d
Openssl Openssl 1.0.1t
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.1p
Openssl Openssl 1.0.1k
Openssl Openssl 1.0.1b
Openssl Openssl 1.0.1n
Openssl Openssl 1.0.1q
Openssl Openssl 1.0.1e
Openssl Openssl 1.0.1l
552
VMScore
CVE-2007-2040
Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points prior to 3.2.185.0, and 4.0.x prior to 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192.
Cisco Wireless Lan Controller Software
543
VMScore
CVE-2012-6026
The HTTP Profiler on the Cisco Aironet Access Point with software 15.2 and previous versions does not properly manage buffers, which allows remote malicious users to cause a denial of service (device reload) via crafted HTTP requests, aka Bug ID CSCuc62460.
Cisco Aironet Access Point Software 7.3
Cisco Aironet Access Point Software 15.2
Cisco Aironet Access Point Software 12.4
Cisco Aironet Access Point Software 7.4
890
VMScore
CVE-2014-0703
Cisco Wireless LAN Controller (WLC) devices 7.4 prior to 7.4.110.0 distribute Aironet IOS software with a race condition in the status of the administrative HTTP server, which allows remote malicious users to bypass intended access restrictions by connecting to an Aironet access ...
Cisco Wireless Lan Controller Software 7.4.100.0
Cisco Wireless Lan Controller Software 7.4.100.60
Cisco Wireless Lan Controller
890
VMScore
CVE-2002-0012
Vulnerabilities in a large number of SNMP implementations allow remote malicious users to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into m...
Snmp Snmp
1000
VMScore
CVE-2002-0013
Vulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote malicious users to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test...
Snmp Snmp
1 EDB exploit
641
VMScore
CVE-2016-9196
A vulnerability in login authentication management in Cisco Aironet 1800, 2800, and 3800 Series Access Point platforms could allow an authenticated, local malicious user to gain unrestricted root access to the underlying Linux operating system. The root Linux shell is provided fo...
Cisco Aironet Access Point 8.1\\(112.4\\)
Cisco Aironet Access Point 8.1\\(15.14\\)
Cisco Aironet Access Point 8.2\\(100.0\\)
Cisco Aironet Access Point 8.2\\(102.43\\)
Cisco Aironet Access Point 8.2 Base
Cisco Aironet Access Point 8.1\\(131.0\\)
Cisco Aironet Access Point 8.1\\(112.3\\)
NA
CVE-2024-20354
A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to incomplete cleanup of...
445
VMScore
CVE-2020-3262
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol handler of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on an affected device. The vulner...
Cisco 5508 Wireless Controller Firmware 8.8\\(120.0\\)
Cisco 5520 Wireless Controller Firmware 8.8\\(120.0\\)
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »