Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ieee ieee 802.11 vulnerabilities and exploits
(subscribe to this query)
3.3
CVSSv2
CVE-2020-26143
An issue exists in the ALFA Windows 10 driver 1030.36.604 for AWUS036ACH. The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configura...
Alfa Awus036h Firmware 1030.36.604
Arista C-75 Firmware -
Arista O-90 Firmware -
Arista C-65 Firmware -
Arista W-68 Firmware -
Siemens Scalance W700 Ieee 802.11n Firmware
1.8
CVSSv2
CVE-2020-24587
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device se...
Ieee Ieee 802.11
Linux Mac80211 -
Debian Debian Linux 9.0
Arista C-100 Firmware -
Arista C-110 Firmware -
Arista C-120 Firmware -
Arista C-130 Firmware -
Arista C-200 Firmware -
Arista C-230 Firmware -
Arista C-235 Firmware -
Arista C-250 Firmware -
Arista C-260 Firmware -
Arista C-65 Firmware -
Arista C-75 Firmware -
Arista O-105 Firmware -
Arista O-90 Firmware -
Arista W-118 Firmware -
Arista W-68 Firmware -
Cisco 1100 Firmware -
Cisco 1100-4p Firmware -
Cisco 1100-8p Firmware -
Cisco 1101-4p Firmware -
2.9
CVSSv2
CVE-2020-24588
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is ...
Ieee Ieee 802.11
Linux Mac80211 -
Microsoft Windows Server 2008 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows 10 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows 10 1909
Microsoft Windows 10 2004
Microsoft Windows Server 2016 2004
Microsoft Windows 10 20h2
Debian Debian Linux 9.0
Siemens Scalance W1748-1 Firmware -
Siemens Scalance W1750d Firmware -
Siemens Scalance W1788-1 Firmware -
3.3
CVSSv2
CVE-2012-2392
Wireshark 1.4.x prior to 1.4.13 and 1.6.x prior to 1.6.8 allows remote malicious users to cause a denial of service (infinite loop) via vectors related to the (1) ANSI MAP, (2) ASF, (3) IEEE 802.11, (4) IEEE 802.3, and (5) LTP dissectors.
Wireshark Wireshark 1.6.0
Wireshark Wireshark 1.4.7
Wireshark Wireshark 1.4.11
Wireshark Wireshark 1.4.2
Wireshark Wireshark 1.4.0
Wireshark Wireshark 1.4.12
Wireshark Wireshark 1.4.5
Wireshark Wireshark 1.6.4
Wireshark Wireshark 1.4.13
Wireshark Wireshark 1.6.5
Wireshark Wireshark 1.4.4
Wireshark Wireshark 1.4.10
Wireshark Wireshark 1.6.3
Wireshark Wireshark 1.4.9
Wireshark Wireshark 1.6.7
Wireshark Wireshark 1.6.1
Wireshark Wireshark 1.4.6
Wireshark Wireshark 1.6.6
Wireshark Wireshark 1.4.3
Wireshark Wireshark 1.6.2
Wireshark Wireshark 1.4.1
Wireshark Wireshark 1.4.8
1 EDB exploit
5
CVSSv2
CVE-2018-9273
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-pcp.c has a memory leak.
Wireshark Wireshark
Debian Debian Linux 8.0
Debian Debian Linux 9.0
7.8
CVSSv2
CVE-2015-3808
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x prior to 1.12.5 does not reject a zero length, which allows remote malicious users to cause a denial of service (infinite loop) via a crafted packet.
Wireshark Wireshark 1.12.4
Wireshark Wireshark 1.12.0
Wireshark Wireshark 1.12.2
Wireshark Wireshark 1.12.1
Wireshark Wireshark 1.12.3
7.8
CVSSv2
CVE-2015-3809
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x prior to 1.12.5 does not properly track the current offset, which allows remote malicious users to cause a denial of service (infinite loop) via a crafted packet.
Wireshark Wireshark 1.12.4
Wireshark Wireshark 1.12.0
Wireshark Wireshark 1.12.2
Wireshark Wireshark 1.12.1
Wireshark Wireshark 1.12.3
7.8
CVSSv2
CVE-2015-3810
epan/dissectors/packet-websocket.c in the WebSocket dissector in Wireshark 1.12.x prior to 1.12.5 uses a recursive algorithm, which allows remote malicious users to cause a denial of service (CPU consumption) via a crafted packet.
Wireshark Wireshark 1.12.4
Wireshark Wireshark 1.12.0
Wireshark Wireshark 1.12.2
Wireshark Wireshark 1.12.1
Wireshark Wireshark 1.12.3
5
CVSSv2
CVE-2018-7334
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the UMTS MAC dissector could crash. This was addressed in epan/dissectors/packet-umts_mac.c by rejecting a certain reserved value.
Wireshark Wireshark
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Debian Debian Linux 9.0
5
CVSSv2
CVE-2018-9264
In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, the ADB dissector could crash with a heap-based buffer overflow. This was addressed in epan/dissectors/packet-adb.c by checking for a length inconsistency.
Wireshark Wireshark
Debian Debian Linux 8.0
Debian Debian Linux 9.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »