Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco wireless lan controller software 8.3.102.0 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2019-1797
A vulnerability in the web-based management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote malicious user to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on the device with the privileges of the...
Cisco Wireless Lan Controller Software
4.9
CVSSv3
CVE-2018-0248
A vulnerability in the administrative GUI configuration feature of Cisco Wireless LAN Controller (WLC) Software could allow an aUTHENTICated, remote malicious user to cause the device to reload unexpectedly during device configuration when the administrator is using this GUI, cau...
Cisco Wireless Lan Controller Software
7.5
CVSSv3
CVE-2018-0442
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote malicious user to retrieve memory contents, which could lead to the disclosure of confident...
Cisco Wireless Lan Controller Software
7.5
CVSSv3
CVE-2018-0443
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition. The vulnerability is due to im...
Cisco Wireless Lan Controller Software 8.2(151.0)
8.6
CVSSv3
CVE-2018-0252
A vulnerability in the IP Version 4 (IPv4) fragment reassembly function of Cisco 3500, 5500, and 8500 Series Wireless LAN Controller Software could allow an unauthenticated, remote malicious user to cause an affected device to reload unexpectedly, resulting in a denial of service...
Cisco Wireless Lan Controller Software 8.4(100.0)
Cisco Wireless Lan Controller Software 8.5(107.30)
Cisco Wireless Lan Controller Software 8.5(107.41)
Cisco Wireless Lan Controller Software 8.6(1.108)
7.8
CVSSv3
CVE-2018-0417
A vulnerability in TACACS authentication with Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, local malicious user to perform certain operations within the GUI that are not normally available to that user on the CLI. The vulnerability is due to incorrec...
Cisco Wireless Lan Controller Software 8.7(1.115)
Cisco Wireless Lan Controller Software
Cisco Wireless Lan Controller
7.4
CVSSv3
CVE-2017-12275
A vulnerability in the implementation of 802.11v Basic Service Set (BSS) Transition Management functionality in Cisco Wireless LAN Controllers could allow an unauthenticated, adjacent malicious user to cause an affected device to reload unexpectedly, resulting in a denial of serv...
Cisco Wireless Lan Controller Software -
6.3
CVSSv3
CVE-2017-12278
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco Wireless LAN Controllers could allow an authenticated, remote malicious user to cause an affected device to restart, resulting in a denial of service (DoS) condition. The vulnerability is due to a...
Cisco Wireless Lan Controller Software -
5.3
CVSSv3
CVE-2017-13079
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Debian Debian Linux 8.0
Freebsd Freebsd
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Opensuse Leap 42.3
Opensuse Leap 42.2
Redhat Enterprise Linux Server 7
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Freebsd Freebsd 10
Freebsd Freebsd 10.4
W1.fi Hostapd 1.1
W1.fi Hostapd 2.4
W1.fi Hostapd 2.0
W1.fi Hostapd 0.7.3
W1.fi Wpa Supplicant 2.3
W1.fi Wpa Supplicant 2.1
W1.fi Wpa Supplicant 2.2
W1.fi Hostapd 1.0
2 Articles
5.3
CVSSv3
CVE-2017-13081
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Debian Debian Linux 8.0
Freebsd Freebsd
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Opensuse Leap 42.3
Opensuse Leap 42.2
Redhat Enterprise Linux Server 7
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Freebsd Freebsd 10
Freebsd Freebsd 10.4
W1.fi Hostapd 1.1
W1.fi Hostapd 2.4
W1.fi Hostapd 2.0
W1.fi Hostapd 0.7.3
W1.fi Wpa Supplicant 2.3
W1.fi Wpa Supplicant 2.1
W1.fi Wpa Supplicant 2.2
W1.fi Hostapd 1.0
2 Articles
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-6280
CVE-2024-5346
CVE-2024-30078
CVE-2022-45803
CVE-2024-36886
SQL
CVE-2024-24553
IMAP
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »