Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless lan controller vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2013-6699
The Control and Provisioning of Wireless Access Points (CAPWAP) protocol implementation on Cisco Wireless LAN Controller (WLC) devices allows remote malicious users to cause a denial of service via a crafted CAPWAP packet that triggers a buffer over-read, aka Bug ID CSCuh81880.
Cisco Wireless Lan Controller
6.3
CVSSv2
CVE-2012-5991
screens/base/web_auth_custom.html on Cisco Wireless LAN Controller (WLC) devices with software 7.2.110.0 allows remote authenticated users to cause a denial of service (device reload) via a certain buttonClicked value in an internal webauth_type request, aka Bug ID CSCud50209.
Cisco Wireless Lan Controller Software 7.2.110.0
Cisco 4100 Wireless Lan Controller
Cisco 4400 Wireless Lan Controller
Cisco 5500 Wireless Lan Controller -
Cisco 7500 Wireless Lan Controller -
Cisco 2100 Wireless Lan Controller
Cisco 2000 Wireless Lan Controller
Cisco 2500 Wireless Lan Controller -
Cisco 8500 Wireless Lan Controller -
1 EDB exploit
6.8
CVSSv2
CVE-2012-5992
Multiple cross-site request forgery (CSRF) vulnerabilities on Cisco Wireless LAN Controller (WLC) devices with software 7.2.110.0 allow remote malicious users to hijack the authentication of administrators for requests that (1) add administrative accounts via screens/aaa/mgmtuser...
Cisco Wireless Lan Controller Software 7.2.110.0
Cisco 2500 Wireless Lan Controller -
Cisco 4100 Wireless Lan Controller
Cisco 4400 Wireless Lan Controller
Cisco 5500 Wireless Lan Controller -
Cisco 2100 Wireless Lan Controller
Cisco 7500 Wireless Lan Controller -
Cisco 2000 Wireless Lan Controller
Cisco 8500 Wireless Lan Controller -
1 EDB exploit
3.3
CVSSv2
CVE-2019-1805
A vulnerability in certain access control mechanisms for the Secure Shell (SSH) server implementation for Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent malicious user to access a CLI instance on an affected device. The vulnerability is due ...
Cisco Wireless Lan Controller Software 8.3\\(141.0\\)
6.1
CVSSv2
CVE-2015-0756
Cisco Wireless LAN Controller (WLC) devices with software 7.4(1.1) allow remote malicious users to cause a denial of service (wireless-networking outage) via crafted TCP traffic on the local network, aka Bug ID CSCug67104.
Cisco Wireless Lan Controller 7.4\\(1.1\\)
7.2
CVSSv2
CVE-2015-4224
Cisco Wireless LAN Controller (WLC) devices with software 7.0(240.0) allow local users to execute arbitrary OS commands in a privileged context via crafted CLI commands, aka Bug ID CSCuj39474.
Cisco Wireless Lan Controller Software 7.0\\(240.0\\)
6.1
CVSSv2
CVE-2015-4215
Cisco Wireless LAN Controller (WLC) devices with software 7.5(102.0) and 7.6(1.62) allow remote malicious users to cause a denial of service (device crash) by triggering an exception during attempted forwarding of unspecified IPv6 packets to a non-IPv6 device, aka Bug ID CSCuj010...
Cisco Wireless Lan Controller Software 7.5.102.0
9.3
CVSSv2
CVE-2022-20695
A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote malicious user to bypass authentication controls and log in to the device through the management interface This vulnerability is due to the i...
Cisco Wireless Lan Controller 8.10.151.0
Cisco Wireless Lan Controller 8.10.162.0
4.3
CVSSv2
CVE-2020-25684
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the ex...
Thekelleys Dnsmasq
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Arista Eos
2 Github repositories
1 Article
4.3
CVSSv2
CVE-2020-25685
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is c...
Thekelleys Dnsmasq
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
Arista Eos
2 Github repositories
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4040
cross-site scripting
CVE-2023-25790
CVE-2024-2961
XML external entity
CVE-2024-26926
CVE-2024-32806
CVE-2024-32711
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »