Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless vulnerabilities and exploits
(subscribe to this query)
632
VMScore
CVE-2010-2982
Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 allows remote malicious users to discover a group password via a series of SNMP requests, as demonstrated by an SNMP walk, aka Bug ID CSCtb74037.
Cisco Unified Wireless Network Solution Software 7.0.98.0
Cisco Unified Wireless Network Solution Software 7.0
445
VMScore
CVE-2005-3661
Dell TrueMobile 2300 Wireless Broadband Router running firmware 3.0.0.8 and 5.1.1.6, and possibly other versions, allows remote malicious users to reset authentication credentials, then change configuration or firmware, via a direct request to apply.cgi with the Page parameter se...
Dell Truemobile 2300 Wireless Broadband Router 3.0.0.8
Dell Truemobile 2300 Wireless Broadband Router 5.1.1.6
890
VMScore
CVE-2010-2976
The controller in Cisco Unified Wireless Network (UWN) Solution 7.x up to and including 7.0.98.0 has (1) a default SNMP read-only community of public, (2) a default SNMP read-write community of private, and a value of "default" for the (3) SNMP v3 username, (4) SNMP v3 ...
Cisco Unified Wireless Network Solution Software 7.0.98.0
Cisco Unified Wireless Network Solution Software 7.0
543
VMScore
CVE-2015-0679
The web-authentication functionality on Cisco Wireless LAN Controller (WLC) devices 7.3(103.8) and 7.4(110.0) allows remote malicious users to cause a denial of service (device reload) via a malformed password, aka Bug ID CSCui57980.
Cisco Wireless Lan Controller Software 7.4\\(110.0\\)
Cisco Wireless Lan Controller Software 7.3\\(103.8\\)
694
VMScore
CVE-2016-1325
The administration interface on Cisco DPC3939B and DPC3941 devices allows remote malicious users to obtain sensitive information via a crafted HTTP request, aka Bug ID CSCus49506.
Cisco Dpc3939 Wireless Residential Voice Gateway Firmware 130514acmcst Base
NA
CVE-2021-37409
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Wireless-ac 9560 Firmware
Intel Wireless-ac 9462 Firmware
Intel Wireless-ac 9461 Firmware
Intel Killer Ac 1550 Firmware
Intel Killer Wi-fi 6 Ax1650 Firmware
Intel Killer Wi-fi 6e Ax1690 Firmware
Intel Killer Wi-fi 6e Ax1675 Firmware
Intel Wireless-ac 9260 Firmware
Intel Proset Wi-fi 6e Ax210 Firmware
Intel Wi-fi 6e Ax211 Firmware
Intel Wi-fi 6 Ax200 Firmware
Intel Wi-fi 6 Ax201 Firmware
Intel Wi-fi 6e Ax411 Firmware
605
VMScore
CVE-2016-1000213
Ruckus Wireless H500 web management interface CSRF
Ruckus Wireless H500 -
801
VMScore
CVE-2016-1000216
Ruckus Wireless H500 web management interface authenticated command injection
Ruckus Wireless H500 -
445
VMScore
CVE-2016-1000214
Ruckus Wireless H500 web management interface authentication bypass
Ruckus Wireless H500 -
445
VMScore
CVE-2016-1000215
Ruckus Wireless H500 web management interface denial of service
Ruckus Wireless H500 -
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »