CVE-2018-11036
31.05.2018, 12:29
Ruckus SmartZone (formerly Virtual SmartCell Gateway or vSCG) 3.5.0, 3.5.1, 3.6.0, and 3.6.1 (Essentials and High Scale) on vSZ, SZ-100, SZ-300, and SCG-200 devices allows remote attackers to obtain sensitive information or modify data.Enginsight
Vendor | Product | Version |
---|---|---|
ruckuswireless | vsz_firmware | 3.5.0 |
ruckuswireless | vsz_firmware | 3.5.1 |
ruckuswireless | vsz_firmware | 3.6.0 |
ruckuswireless | vsz_firmware | 3.6.1 |
ruckuswireless | scg-200_firmware | 3.5.0 |
ruckuswireless | scg-200_firmware | 3.5.1 |
ruckuswireless | scg-200_firmware | 3.6.0 |
ruckuswireless | scg-200_firmware | 3.6.1 |
ruckuswireless | sz-300_firmware | 3.5.0 |
ruckuswireless | sz-300_firmware | 3.5.1 |
ruckuswireless | sz-300_firmware | 3.6.0 |
ruckuswireless | sz-300_firmware | 3.6.1 |
ruckuswireless | sz-100_firmware | 3.5.0 |
ruckuswireless | sz-100_firmware | 3.5.1 |
ruckuswireless | sz-100_firmware | 3.6.0 |
ruckuswireless | sz-100_firmware | 3.6.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration