Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-0679
The web-authentication functionality on Cisco Wireless LAN Controller (WLC) devices 7.3(103.8) and 7.4(110.0) allows remote malicious users to cause a denial of service (device reload) via a malformed password, aka Bug ID CSCui57980.
Cisco Wireless Lan Controller Software 7.4\\(110.0\\)
Cisco Wireless Lan Controller Software 7.3\\(103.8\\)
NA
CVE-2005-3661
Dell TrueMobile 2300 Wireless Broadband Router running firmware 3.0.0.8 and 5.1.1.6, and possibly other versions, allows remote malicious users to reset authentication credentials, then change configuration or firmware, via a direct request to apply.cgi with the Page parameter se...
Dell Truemobile 2300 Wireless Broadband Router 3.0.0.8
Dell Truemobile 2300 Wireless Broadband Router 5.1.1.6
NA
CVE-2010-2981
Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 allows remote malicious users to cause a denial of service (device crash) by pinging a virtual interface, aka Bug ID CSCte55370.
Cisco Unified Wireless Network Solution Software 7.0
Cisco Unified Wireless Network Solution Software 7.0.98.0
NA
CVE-2010-2983
The workgroup bridge (aka WGB) functionality in Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 allows remote malicious users to cause a denial of service (dropped connection) via a series of spoofed EAPoL-Logoff frames, related to an "EAPoL logoff attack...
Cisco Unified Wireless Network Solution Software 7.0
Cisco Unified Wireless Network Solution Software 7.0.98.0
7.5
CVSSv3
CVE-2016-1325
The administration interface on Cisco DPC3939B and DPC3941 devices allows remote malicious users to obtain sensitive information via a crafted HTTP request, aka Bug ID CSCus49506.
Cisco Dpc3939 Wireless Residential Voice Gateway Firmware 130514acmcst Base
7.8
CVSSv3
CVE-2021-37409
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Wireless-ac 9560 Firmware
Intel Wireless-ac 9462 Firmware
Intel Wireless-ac 9461 Firmware
Intel Killer Ac 1550 Firmware
Intel Killer Wi-fi 6 Ax1650 Firmware
Intel Killer Wi-fi 6e Ax1690 Firmware
Intel Killer Wi-fi 6e Ax1675 Firmware
Intel Wireless-ac 9260 Firmware
Intel Proset Wi-fi 6e Ax210 Firmware
Intel Wi-fi 6e Ax211 Firmware
Intel Wi-fi 6 Ax200 Firmware
Intel Wi-fi 6 Ax201 Firmware
Intel Wi-fi 6e Ax411 Firmware
NA
CVE-2008-1114
Vocera Communications wireless handsets, when using Protected Extensible Authentication Protocol (PEAP), do not validate server certificates, which allows remote wireless access points to steal hashed passwords and conduct man-in-the-middle (MITM) attacks.
Vocera Wireless Handset -
5.5
CVSSv3
CVE-2018-12159
Buffer overflow in the command-line interface for Intel(R) PROSet Wireless v20.50 and before may allow an authenticated user to potentially enable denial of service via local access.
Intel Proset\\/wireless
8.8
CVSSv3
CVE-2016-1000216
Ruckus Wireless H500 web management interface authenticated command injection
Ruckus Wireless H500 -
8.8
CVSSv3
CVE-2016-1000213
Ruckus Wireless H500 web management interface CSRF
Ruckus Wireless H500 -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »