Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-2981
Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 allows remote malicious users to cause a denial of service (device crash) by pinging a virtual interface, aka Bug ID CSCte55370.
Cisco Unified Wireless Network Solution Software 7.0
Cisco Unified Wireless Network Solution Software 7.0.98.0
NA
CVE-2010-2982
Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 allows remote malicious users to discover a group password via a series of SNMP requests, as demonstrated by an SNMP walk, aka Bug ID CSCtb74037.
Cisco Unified Wireless Network Solution Software 7.0.98.0
Cisco Unified Wireless Network Solution Software 7.0
NA
CVE-2010-2983
The workgroup bridge (aka WGB) functionality in Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 allows remote malicious users to cause a denial of service (dropped connection) via a series of spoofed EAPoL-Logoff frames, related to an "EAPoL logoff attack...
Cisco Unified Wireless Network Solution Software 7.0
Cisco Unified Wireless Network Solution Software 7.0.98.0
NA
CVE-2006-5882
Stack-based buffer overflow in the Broadcom BCMWL5.SYS wireless device driver 3.50.21.10, as used in Cisco Linksys WPC300N Wireless-N Notebook Adapter prior to 4.100.15.5 and other products, allows remote malicious users to execute arbitrary code via an 802.11 response frame cont...
Linksys Wpc300n Wireless-n Notebook Adapter Driver
Broadcom Bcmwl5.sys Wireless Device Driver 3.50.21.10
1 EDB exploit
7.5
CVSSv3
CVE-2016-1325
The administration interface on Cisco DPC3939B and DPC3941 devices allows remote malicious users to obtain sensitive information via a crafted HTTP request, aka Bug ID CSCus49506.
Cisco Dpc3939 Wireless Residential Voice Gateway Firmware 130514acmcst Base
7.8
CVSSv3
CVE-2021-37409
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Wireless-ac 9560 Firmware
Intel Wireless-ac 9462 Firmware
Intel Wireless-ac 9461 Firmware
Intel Killer Ac 1550 Firmware
Intel Killer Wi-fi 6 Ax1650 Firmware
Intel Killer Wi-fi 6e Ax1690 Firmware
Intel Killer Wi-fi 6e Ax1675 Firmware
Intel Wireless-ac 9260 Firmware
Intel Proset Wi-fi 6e Ax210 Firmware
Intel Wi-fi 6e Ax211 Firmware
Intel Wi-fi 6 Ax200 Firmware
Intel Wi-fi 6 Ax201 Firmware
Intel Wi-fi 6e Ax411 Firmware
7.2
CVSSv3
CVE-2017-11321
The restricted shell interface in UCOPIA Wireless Appliance prior to 5.1.8 allows remote authenticated users to gain 'admin' privileges via shell metacharacters in the less command.
Ucopia Wireless Appliance
1 EDB exploit
5.5
CVSSv3
CVE-2018-12159
Buffer overflow in the command-line interface for Intel(R) PROSet Wireless v20.50 and before may allow an authenticated user to potentially enable denial of service via local access.
Intel Proset\\/wireless
NA
CVE-2006-2316
S24EvMon.exe in the Intel PROset/Wireless software, possibly 10.1.0.33, uses a S24EventManagerSharedMemory shared memory section with weak permissions, which allows local users to read or modify passwords or other data, or cause a denial of service.
Intel Proset Wireless
1 EDB exploit
NA
CVE-2008-1114
Vocera Communications wireless handsets, when using Protected Extensible Authentication Protocol (PEAP), do not validate server certificates, which allows remote wireless access points to steal hashed passwords and conduct man-in-the-middle (MITM) attacks.
Vocera Wireless Handset -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »