Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2018-7104
A Remote Code Execution vulnerability was identified in HPE Intelligent Management Center (iMC) Wireless Services Manager Software earlier than version IMC WSM 7.3 E0506P02.
Hp Intelligent Management Center Wireless Services Manager Software 7.3
Hp Intelligent Management Center Wireless Services Manager Software
NA
CVE-2012-0985
Multiple buffer overflows in the Wireless Manager ActiveX control 4.0.0.0 in WifiMan.dll in Sony VAIO PC Wireless LAN Wizard 1.0; VAIO Wireless Wizard 1.00, 1.00_64, 1.0.1, 2.0, and 3.0; SmartWi Connection Utility 4.7, 4.7.4, 4.8, 4.9, 4.10, and 4.11; and VAIO Easy Connect softwa...
Sony Vaio Pc Wireless Lan Wizard 1.0
Sony Smartwi Connection Utillity 4.7.4
Sony Smartwi Connection Utillity 4.8
Sony Vaio Wireless Wizard 3.0
Sony Smartwi Connection Utillity 4.7
Sony Vaio Easy Connect 1.1.0
Sony Vaio Wireless Wizard 1.00
Sony Vaio Wireless Wizard 1.00 64
Sony Smartwi Connection Utillity 4.9
Sony Smartwi Connection Utillity 4.10
Sony Vaio Wireless Wizard 1.01
Sony Vaio Wireless Wizard 2.0
Sony Smartwi Connection Utillity 4.11
Sony Vaio Easy Connect 1.0.0
1 EDB exploit
7.5
CVSSv3
CVE-2023-52161
The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) prior to 2.14 allows malicious users to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4...
Intel Inet Wireless Daemon
8.2
CVSSv3
CVE-2017-11322
The chroothole_client executable in UCOPIA Wireless Appliance prior to 5.1.8 allows remote malicious users to gain root privileges via a dollar sign ($) metacharacter in the argument to chroothole_client.
Ucopia Ucopia Wireless Appliance
1 EDB exploit
NA
CVE-2013-3581
ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax modem allows remote malicious users to obtain sensitive information via an Ajax (1) wmxState or (2) netState request.
Choice Wireless Wixfmr-111 -
NA
CVE-2007-2035
Cisco Wireless Control System (WCS) prior to 4.0.66.0 stores sensitive information under the web root with insufficient access control, which allows remote malicious users to obtain network organization data via a direct request for files in certain directories, aka Bug ID CSCsg0...
Cisco Wireless Control System
NA
CVE-2006-3286
The internal database in Cisco Wireless Control System (WCS) for Linux and Windows prior to 3.2(63) stores a hard-coded username and password in plaintext within unspecified files, which allows remote authenticated users to access the database (aka bug CSCsd15951).
Cisco Wireless Control System
6.8
CVSSv3
CVE-2018-8117
A security feature bypass vulnerability exists in the Microsoft Wireless Keyboard 850 which could allow an malicious user to reuse an AES encryption key to send keystrokes to other keyboard devices or to read keystrokes sent by other keyboards for the affected devices, aka "...
Microsoft Wireless Keyboard 850 -
1 Article
8.8
CVSSv3
CVE-2020-25036
UCOPIA Wi-Fi appliances 6.0.5 allow authenticated remote malicious users to escape the restricted administration shell CLI, and access a shell with admin user rights, via an unprotected less command.
Ucopia Ucopia Wireless Appliance
NA
CVE-2013-4731
ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax modem allows remote malicious users to execute arbitrary commands via shell metacharacters in the pip parameter in an Ajax tag_ipPing request, a different vulnerability than CVE-2013-3581.
Choice-wireless Wixfmr-111 -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »