Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless vulnerabilities and exploits
(subscribe to this query)
7.1
CVSSv2
CVE-2010-2982
Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 allows remote malicious users to discover a group password via a series of SNMP requests, as demonstrated by an SNMP walk, aka Bug ID CSCtb74037.
Cisco Unified Wireless Network Solution Software 7.0.98.0
Cisco Unified Wireless Network Solution Software 7.0
7.8
CVSSv2
CVE-2010-2983
The workgroup bridge (aka WGB) functionality in Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 allows remote malicious users to cause a denial of service (dropped connection) via a series of spoofed EAPoL-Logoff frames, related to an "EAPoL logoff attack...
Cisco Unified Wireless Network Solution Software 7.0
Cisco Unified Wireless Network Solution Software 7.0.98.0
2.1
CVSSv2
CVE-2010-2975
Cisco Unified Wireless Network (UWN) Solution 7.x up to and including 7.0.98.0 does not properly handle multiple SSH sessions, which allows physically proximate malicious users to read a password, related to an "arrow key failure," aka Bug ID CSCtg51544.
Cisco Unified Wireless Network Solution Software 7.0
Cisco Unified Wireless Network Solution Software 7.0.98.0
10
CVSSv2
CVE-2010-2977
Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 does not properly implement TLS and SSL, which has unspecified impact and remote attack vectors, aka Bug ID CSCtd01611.
Cisco Unified Wireless Network Solution Software 7.0
Cisco Unified Wireless Network Solution Software 7.0.98.0
7.8
CVSSv2
CVE-2016-1325
The administration interface on Cisco DPC3939B and DPC3941 devices allows remote malicious users to obtain sensitive information via a crafted HTTP request, aka Bug ID CSCus49506.
Cisco Dpc3939 Wireless Residential Voice Gateway Firmware 130514acmcst Base
NA
CVE-2021-37409
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Wireless-ac 9560 Firmware
Intel Wireless-ac 9462 Firmware
Intel Wireless-ac 9461 Firmware
Intel Killer Ac 1550 Firmware
Intel Killer Wi-fi 6 Ax1650 Firmware
Intel Killer Wi-fi 6e Ax1690 Firmware
Intel Killer Wi-fi 6e Ax1675 Firmware
Intel Wireless-ac 9260 Firmware
Intel Proset Wi-fi 6e Ax210 Firmware
Intel Wi-fi 6e Ax211 Firmware
Intel Wi-fi 6 Ax200 Firmware
Intel Wi-fi 6 Ax201 Firmware
Intel Wi-fi 6e Ax411 Firmware
5
CVSSv2
CVE-2016-1000214
Ruckus Wireless H500 web management interface authentication bypass
Ruckus Wireless H500 -
9
CVSSv2
CVE-2016-1000216
Ruckus Wireless H500 web management interface authenticated command injection
Ruckus Wireless H500 -
6.5
CVSSv2
CVE-2017-11321
The restricted shell interface in UCOPIA Wireless Appliance prior to 5.1.8 allows remote authenticated users to gain 'admin' privileges via shell metacharacters in the less command.
Ucopia Wireless Appliance
1 EDB exploit
6.8
CVSSv2
CVE-2016-1000213
Ruckus Wireless H500 web management interface CSRF
Ruckus Wireless H500 -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »