4 results (0.003 seconds)

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 0

The conversion utility for converting CiscoWorks Wireless LAN Solution Engine (WLSE) 4.1.91.0 and earlier to Cisco Wireless Control System (WCS) creates administrator accounts with default usernames and passwords, which allows remote attackers to gain privileges. La utilidad de conversión para converting CiscoWorks Wireless LAN Solution Engine (WLSE) 4.1.91.0 y versiones anteriores en Cisco Wireless Control System (WCS) crea cuentas de administrador con nombres y contraseñas por defecto, lo cual permite a atacantes remotos obtener privilegios. • http://osvdb.org/37936 http://www.cisco.com/en/US/products/products_security_advisory09186a00808d72db.shtml http://www.securityfocus.com/bid/26000 http://www.securitytracker.com/id?1018797 http://www.vupen.com/english/advisories/2007/3456 https://exchange.xforce.ibmcloud.com/vulnerabilities/37053 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 36EXPL: 0

Cisco CiscoWorks Wireless LAN Solution Engine (WLSE) and WLSE Express before 2.13, Hosting Solution Engine (HSE) and User Registration Tool (URT) before 20060419, and all versions of Ethernet Subscriber Solution Engine (ESSE) and CiscoWorks2000 Service Management Solution (SMS) allow local users to gain Linux shell access via shell metacharacters in arguments to the "show" command in the application's command line interface (CLI), aka bug ID CSCsd21502 (WLSE), CSCsd22861 (URT), and CSCsd22859 (HSE). NOTE: other issues might be addressed by the Cisco advisory. • http://secunia.com/advisories/19736 http://secunia.com/advisories/19739 http://secunia.com/advisories/19741 http://securitytracker.com/id?1015965 http://www.assurance.com.au/advisories/200604-cisco.txt http://www.cisco.com/warp/public/707/cisco-sa-20060419-wlse.shtml http://www.cisco.com/warp/public/707/cisco-sr-20060419-priv.shtml http://www.osvdb.org/24813 http://www.securityfocus.com/archive/1/431367/30/5490/threaded http://www.securityfocus.com/archive/1/431371/30 •

CVSS: 5.8EPSS: 1%CPEs: 28EXPL: 1

Cross-site scripting (XSS) vulnerability in the appliance web user interface in Cisco CiscoWorks Wireless LAN Solution Engine (WLSE) and WLSE Express before 2.13 allows remote attackers to inject arbitrary web script or HTML, possibly via the displayMsg parameter to archiveApplyDisplay.jsp, aka bug ID CSCsc01095. • https://www.exploit-db.com/exploits/27684 http://secunia.com/advisories/19736 http://securitytracker.com/id?1015965 http://www.assurance.com.au/advisories/200604-cisco.txt http://www.cisco.com/warp/public/707/cisco-sa-20060419-wlse.shtml http://www.osvdb.org/24812 http://www.securityfocus.com/archive/1/431367/30/5490/threaded http://www.securityfocus.com/archive/1/431371/30/5490/threaded http://www.securityfocus.com/bid/17604 http://www.vupen.com/english/advisories/2 •

CVSS: 10.0EPSS: 2%CPEs: 11EXPL: 0

Cisco Wireless LAN Solution Engine (WLSE) 2.0 through 2.5 and Hosting Solution Engine (HSE) 1.7 through 1.7.3 have a hardcoded username and password, which allows remote attackers to add new users, modify existing users, and change configuration. • http://www.ciac.org/ciac/bulletins/o-111.shtml http://www.cisco.com/warp/public/707/cisco-sa-20040407-username.shtml http://www.kb.cert.org/vuls/id/659228 http://www.securityfocus.com/bid/10076 https://exchange.xforce.ibmcloud.com/vulnerabilities/15773 •