Page 14 of 73 results (0.006 seconds)

CVSS: 6.2EPSS: 0%CPEs: 4EXPL: 0

Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192. Cisco Aironet 1000 Series y 1500 Series Lightweight Access Points anteriores a 3.2.185.0, y 4.0.x anteriores a 4.0.206.0, tienen una contraseña fija en el código, lo cual permite a atacantes con acceso físico realizar acciones de su elección en el dispositivo, también conocido como Bug ID CSCsg15192. • http://securitytracker.com/id?1017908 http://www.cisco.com/warp/public/707/cisco-sa-20070412-wlc.shtml http://www.osvdb.org/34133 http://www.securityfocus.com/bid/23461 http://www.vupen.com/english/advisories/2007/1368 https://exchange.xforce.ibmcloud.com/vulnerabilities/33610 •

CVSS: 5.5EPSS: 1%CPEs: 8EXPL: 2

Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644. • https://www.exploit-db.com/exploits/1447 http://secunia.com/advisories/18430 http://securityreason.com/securityalert/339 http://securitytracker.com/id?1015483 http://www.cisco.com/warp/public/707/cisco-sa-20060112-wireless.shtml http://www.osvdb.org/22375 http://www.securityfocus.com/bid/16217 http://www.vupen.com/english/advisories/2006/0176 https://exchange.xforce.ibmcloud.com/vulnerabilities/24086 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef% • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 2%CPEs: 3EXPL: 0

Cisco 1200, 1131, and 1240 series Access Points, when operating in Lightweight Access Point Protocol (LWAPP) mode and controlled by 2000 and 4400 series Airespace WLAN controllers running 3.1.59.24, allow remote attackers to send unencrypted traffic to a secure network using frames with the MAC address of an authenticated end host. • http://secunia.com/advisories/17406 http://securityreason.com/securityalert/139 http://securitytracker.com/id?1015140 http://www.cisco.com/warp/public/707/cisco-sa-20051102-lwapp.shtml http://www.osvdb.org/20454 http://www.securityfocus.com/bid/15272 http://www.vupen.com/english/advisories/2005/2278 •

CVSS: 5.0EPSS: 93%CPEs: 296EXPL: 2

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64/SCOSA-2005.64.txt http://secunia.com/advisories/15393 http://secunia.com/advisories/15417 http://secunia.com/advisories/18222 http://secunia.com/advisories/18662 http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml http:/& •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Cisco Aironet before 11.21 with Telnet enabled allows remote attackers to cause a denial of service (reboot) via a series of login attempts with invalid usernames and passwords. Cisco Aironet anteriores a la 11.21 con Telnet habilitado, permite a atacantes remotos una Denegación de Servico (reinicio) mediante una serie de intentos de acceso con nombres de usuario y contraseñas no válidos. • http://www.cisco.com/warp/public/707/Aironet-Telnet.shtml http://www.iss.net/security_center/static/8788.php http://www.securityfocus.com/bid/4461 •