Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mobility express software vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-20251
A vulnerability in the memory buffer of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent malicious user to cause memory leaks that could eventually lead to a device reboot. This vulnerability is due to memory leaks caused by multiple cl...
Cisco Mobility Express Software -
3.3
CVSSv2
CVE-2020-3260
A vulnerability in Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper processing of client packets that are sent to an aff...
Cisco Aironet 1542i Firmware 8.9\\(100.0\\)
Cisco Aironet 1542d Firmware 8.9\\(100.0\\)
Cisco Aironet 1815 Firmware 8.9\\(100.0\\)
Cisco Aironet 1830 Firmware 8.9\\(100.0\\)
Cisco Aironet 1840 Firmware 8.9\\(100.0\\)
Cisco Aironet 1850 Firmware 8.9\\(100.0\\)
6.1
CVSSv2
CVE-2018-0235
A vulnerability in the 802.11 frame validation functionality of the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, adjacent malicious user to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability ...
Cisco Wireless Lan Controller Software 8.6\\(1.106\\)
Cisco Wireless Lan Controller Software 8.6\\(1.114\\)
7.8
CVSSv2
CVE-2011-1613
Unspecified vulnerability in Cisco Wireless LAN Controller (WLC) software 6.0 prior to 6.0.200.0, 7.0 prior to 7.0.98.216, and 7.0.1xx prior to 7.0.112.0 allows remote malicious users to cause a denial of service (device reload) via a sequence of ICMP packets, aka Bug ID CSCth744...
Cisco Wireless Lan Controller Software 6.0.199.4
Cisco Wireless Lan Controller Software 6.0.199.0
Cisco Wireless Lan Controller Software 6.0.196.0
Cisco Wireless Lan Controller Software 6.0.188.0
Cisco Wireless Lan Controller Software 6.0.182.0
Cisco Wireless Lan Controller Software 7.0.98.0
1 EDB exploit
5
CVSSv2
CVE-2020-3273
A vulnerability in the 802.11 Generic Advertisement Service (GAS) frame processing function of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote malicious user to cause an affected device to reload, resulting in a denial of service (DoS). The vul...
Cisco 5508 Wireless Controller Firmware 8.5\\(151.0\\)
Cisco 5508 Wireless Controller Firmware 8.10\\(204.92\\)
Cisco 5520 Wireless Controller Firmware 8.5\\(151.0\\)
Cisco 5520 Wireless Controller Firmware 8.10\\(204.92\\)
7.8
CVSSv2
CVE-2014-0701
Cisco Wireless LAN Controller (WLC) devices 7.0 prior to 7.0.250.0, 7.2, 7.3, and 7.4 prior to 7.4.110.0 do not properly deallocate memory, which allows remote malicious users to cause a denial of service (reboot) by sending WebAuth login requests at a high rate, aka Bug ID CSCuf...
Cisco Wireless Lan Controller Software 7.2
Cisco Wireless Lan Controller Software 7.2.110.0
Cisco Wireless Lan Controller Software 7.3.101.0
Cisco Wireless Lan Controller Software 7.0
Cisco Wireless Lan Controller Software 7.0.220.0
Cisco Wireless Lan Controller Software 7.0.235.0
Cisco Wireless Lan Controller Software 7.4.100.0
Cisco Wireless Lan Controller Software 7.4.100.60
Cisco Wireless Lan Controller Software 7.2.103.0
Cisco Wireless Lan Controller Software 7.3
10
CVSSv2
CVE-2014-0703
Cisco Wireless LAN Controller (WLC) devices 7.4 prior to 7.4.110.0 distribute Aironet IOS software with a race condition in the status of the administrative HTTP server, which allows remote malicious users to bypass intended access restrictions by connecting to an Aironet access ...
Cisco Wireless Lan Controller Software 7.4.100.0
Cisco Wireless Lan Controller Software 7.4.100.60
Cisco Wireless Lan Controller
7.1
CVSSv2
CVE-2014-0705
The multicast listener discovery (MLD) service on Cisco Wireless LAN Controller (WLC) devices 7.2, 7.3, 7.4 prior to 7.4.121.0, and 7.5, when MLDv2 Snooping is enabled, allows remote malicious users to cause a denial of service (device restart) via a malformed IPv6 MLDv2 packet, ...
Cisco Wireless Lan Controller Software 7.2
Cisco Wireless Lan Controller Software 7.2.110.0
Cisco Wireless Lan Controller Software 7.3
Cisco Wireless Lan Controller Software 7.3.101.0
Cisco Wireless Lan Controller Software 7.4.100.0
Cisco Wireless Lan Controller Software 7.5
Cisco Wireless Lan Controller Software 7.2.103.0
Cisco Wireless Lan Controller Software 7.4.100.60
Cisco Wireless Lan Controller
7.8
CVSSv2
CVE-2014-0706
Cisco Wireless LAN Controller (WLC) devices 7.2 prior to 7.2.115.2, 7.3, and 7.4 prior to 7.4.110.0 allow remote malicious users to cause a denial of service (device restart) via a crafted 802.11 Ethernet frame, aka Bug ID CSCue87929.
Cisco Wireless Lan Controller Software 7.2.103.0
Cisco Wireless Lan Controller Software 7.4.100.60
Cisco Wireless Lan Controller Software 7.2.110.0
Cisco Wireless Lan Controller Software 7.3
Cisco Wireless Lan Controller Software 7.3.101.0
Cisco Wireless Lan Controller Software 7.4.100.0
Cisco Wireless Lan Controller Software 7.2
Cisco Wireless Lan Controller
7.8
CVSSv2
CVE-2014-0707
Cisco Wireless LAN Controller (WLC) devices 7.2, 7.3, and 7.4 prior to 7.4.110.0 allow remote malicious users to cause a denial of service (device restart) via a crafted 802.11 Ethernet frame, aka Bug ID CSCuf80681.
Cisco Wireless Lan Controller Software 7.2.103.0
Cisco Wireless Lan Controller Software 7.3
Cisco Wireless Lan Controller Software 7.2
Cisco Wireless Lan Controller Software 7.4.100.0
Cisco Wireless Lan Controller Software 7.4.100.60
Cisco Wireless Lan Controller Software 7.2.110.0
Cisco Wireless Lan Controller Software 7.3.101.0
Cisco Wireless Lan Controller
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »