Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-2981
Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 allows remote malicious users to cause a denial of service (device crash) by pinging a virtual interface, aka Bug ID CSCte55370.
Cisco Unified Wireless Network Solution Software 7.0
Cisco Unified Wireless Network Solution Software 7.0.98.0
NA
CVE-2010-2982
Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 allows remote malicious users to discover a group password via a series of SNMP requests, as demonstrated by an SNMP walk, aka Bug ID CSCtb74037.
Cisco Unified Wireless Network Solution Software 7.0.98.0
Cisco Unified Wireless Network Solution Software 7.0
NA
CVE-2005-3661
Dell TrueMobile 2300 Wireless Broadband Router running firmware 3.0.0.8 and 5.1.1.6, and possibly other versions, allows remote malicious users to reset authentication credentials, then change configuration or firmware, via a direct request to apply.cgi with the Page parameter se...
Dell Truemobile 2300 Wireless Broadband Router 3.0.0.8
Dell Truemobile 2300 Wireless Broadband Router 5.1.1.6
NA
CVE-2006-5405
Unspecified vulnerability in Toshiba Bluetooth wireless device driver 3.x and 4 up to and including 4.00.35, as used in multiple products, allows physically proximate malicious users to cause a denial of service (crash), corrupt memory, and possibly execute arbitrary code via cra...
Toshiba Bluetooth Wireless Device Driver 3.x
Toshiba Bluetooth Wireless Device Driver 4.x
7.5
CVSSv3
CVE-2016-1325
The administration interface on Cisco DPC3939B and DPC3941 devices allows remote malicious users to obtain sensitive information via a crafted HTTP request, aka Bug ID CSCus49506.
Cisco Dpc3939 Wireless Residential Voice Gateway Firmware 130514acmcst Base
7.8
CVSSv3
CVE-2021-37409
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Wireless-ac 9560 Firmware
Intel Wireless-ac 9462 Firmware
Intel Wireless-ac 9461 Firmware
Intel Killer Ac 1550 Firmware
Intel Killer Wi-fi 6 Ax1650 Firmware
Intel Killer Wi-fi 6e Ax1690 Firmware
Intel Killer Wi-fi 6e Ax1675 Firmware
Intel Wireless-ac 9260 Firmware
Intel Proset Wi-fi 6e Ax210 Firmware
Intel Wi-fi 6e Ax211 Firmware
Intel Wi-fi 6 Ax200 Firmware
Intel Wi-fi 6 Ax201 Firmware
Intel Wi-fi 6e Ax411 Firmware
NA
CVE-2008-1114
Vocera Communications wireless handsets, when using Protected Extensible Authentication Protocol (PEAP), do not validate server certificates, which allows remote wireless access points to steal hashed passwords and conduct man-in-the-middle (MITM) attacks.
Vocera Wireless Handset -
7.2
CVSSv3
CVE-2017-11321
The restricted shell interface in UCOPIA Wireless Appliance prior to 5.1.8 allows remote authenticated users to gain 'admin' privileges via shell metacharacters in the less command.
Ucopia Wireless Appliance
1 EDB exploit
NA
CVE-2006-2316
S24EvMon.exe in the Intel PROset/Wireless software, possibly 10.1.0.33, uses a S24EventManagerSharedMemory shared memory section with weak permissions, which allows local users to read or modify passwords or other data, or cause a denial of service.
Intel Proset Wireless
1 EDB exploit
5.5
CVSSv3
CVE-2018-12159
Buffer overflow in the command-line interface for Intel(R) PROSet Wireless v20.50 and before may allow an authenticated user to potentially enable denial of service via local access.
Intel Proset\\/wireless
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »