Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-2978
Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 does not use an adequate message-digest algorithm for a self-signed certificate, which allows remote malicious users to bypass intended access restrictions via vectors involving collisions, aka Bug ID CSCtd67660.
Cisco Unified Wireless Network Solution Software 7.0
Cisco Unified Wireless Network Solution Software 7.0.98.0
7.8
CVSSv2
CVE-2010-2983
The workgroup bridge (aka WGB) functionality in Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 allows remote malicious users to cause a denial of service (dropped connection) via a series of spoofed EAPoL-Logoff frames, related to an "EAPoL logoff attack...
Cisco Unified Wireless Network Solution Software 7.0
Cisco Unified Wireless Network Solution Software 7.0.98.0
6.1
CVSSv2
CVE-2015-0679
The web-authentication functionality on Cisco Wireless LAN Controller (WLC) devices 7.3(103.8) and 7.4(110.0) allows remote malicious users to cause a denial of service (device reload) via a malformed password, aka Bug ID CSCui57980.
Cisco Wireless Lan Controller Software 7.4\\(110.0\\)
Cisco Wireless Lan Controller Software 7.3\\(103.8\\)
8.3
CVSSv2
CVE-2006-5882
Stack-based buffer overflow in the Broadcom BCMWL5.SYS wireless device driver 3.50.21.10, as used in Cisco Linksys WPC300N Wireless-N Notebook Adapter prior to 4.100.15.5 and other products, allows remote malicious users to execute arbitrary code via an 802.11 response frame cont...
Linksys Wpc300n Wireless-n Notebook Adapter Driver
Broadcom Bcmwl5.sys Wireless Device Driver 3.50.21.10
1 EDB exploit
7.8
CVSSv2
CVE-2016-1325
The administration interface on Cisco DPC3939B and DPC3941 devices allows remote malicious users to obtain sensitive information via a crafted HTTP request, aka Bug ID CSCus49506.
Cisco Dpc3939 Wireless Residential Voice Gateway Firmware 130514acmcst Base
NA
CVE-2021-37409
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Wireless-ac 9560 Firmware
Intel Wireless-ac 9462 Firmware
Intel Wireless-ac 9461 Firmware
Intel Killer Ac 1550 Firmware
Intel Killer Wi-fi 6 Ax1650 Firmware
Intel Killer Wi-fi 6e Ax1690 Firmware
Intel Killer Wi-fi 6e Ax1675 Firmware
Intel Wireless-ac 9260 Firmware
Intel Proset Wi-fi 6e Ax210 Firmware
Intel Wi-fi 6e Ax211 Firmware
Intel Wi-fi 6 Ax200 Firmware
Intel Wi-fi 6 Ax201 Firmware
Intel Wi-fi 6e Ax411 Firmware
6.8
CVSSv2
CVE-2016-1000213
Ruckus Wireless H500 web management interface CSRF
Ruckus Wireless H500 -
5
CVSSv2
CVE-2016-1000215
Ruckus Wireless H500 web management interface denial of service
Ruckus Wireless H500 -
9
CVSSv2
CVE-2016-1000216
Ruckus Wireless H500 web management interface authenticated command injection
Ruckus Wireless H500 -
6.5
CVSSv2
CVE-2017-11321
The restricted shell interface in UCOPIA Wireless Appliance prior to 5.1.8 allows remote authenticated users to gain 'admin' privileges via shell metacharacters in the less command.
Ucopia Wireless Appliance
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »