Page 3 of 31 results (0.004 seconds)

CVSS: 9.8EPSS: 0%CPEs: 18EXPL: 0

10 Sep 2010 — Cisco Wireless LAN Controller (WLC) software, possibly 6.0.x or possibly 4.1 through 6.0.x, allows remote attackers to bypass ACLs in the controller CPU, and consequently send network traffic to unintended segments or devices, via unspecified vectors, a different vulnerability than CVE-2010-0575. El software Cisco Wireless LAN Controller (WLC), posiblemente v6.0.x o posiblemente v4.1 hasta v6.0.x, permite a atacantes remotos saltar las ACLs (listas de control de acceso) en el controlador de CPU, y consecuen... • http://tools.cisco.com/security/center/viewAlert.x?alertId=21291 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.0EPSS: 0%CPEs: 21EXPL: 0

10 Sep 2010 — Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2842 and CVE-2010-3033. El software Cisco Wireless LAN Controller (WLC), posiblemente v4.2 hasta v6.0, permite a usuarios remotos autenticados saltar las limitaciones de acceso impuestas, modificar la configuración y posiblem... • http://tools.cisco.com/security/center/viewAlert.x?alertId=21290 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 0%CPEs: 18EXPL: 0

10 Sep 2010 — Cisco Wireless LAN Controller (WLC) software, possibly 6.0.x or possibly 4.1 through 6.0.x, allows remote attackers to bypass ACLs in the controller CPU, and consequently send network traffic to unintended segments or devices, via unspecified vectors, a different vulnerability than CVE-2010-3034. El software Cisco Wireless LAN Controller (WLC), posiblemente V6.0.X o posiblemente v4.1 hasta v6.0.x, permite a atacantes remotos saltar las ACLs (listas de control de acceso) en el controlador de la CPU, y consec... • http://tools.cisco.com/security/center/viewAlert.x?alertId=21291 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.0EPSS: 0%CPEs: 21EXPL: 0

10 Sep 2010 — Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2843 and CVE-2010-3033. El software Cisco Wireless LAN Controller (WLC), posiblemente v4.2 hasta v6.0, permite a usuarios remotos autenticados saltar las limitaciones de acceso impuestas, modificar la configuración y posiblem... • http://tools.cisco.com/security/center/viewAlert.x?alertId=21290 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.0EPSS: 0%CPEs: 21EXPL: 0

10 Sep 2010 — Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2842 and CVE-2010-2843. El software Cisco Wireless LAN Controller (WLC), posiblemente v4.2 hasta v6.0, permite a usuarios remotos autenticados, saltar las restricciones de acceso y modificar la configuración, y posiblemente o... • http://tools.cisco.com/security/center/viewAlert.x?alertId=21290 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.8EPSS: 0%CPEs: 28EXPL: 0

10 Sep 2010 — Unspecified vulnerability in Cisco Wireless LAN Controller (WLC) software 4.2 before 4.2.209.0; 4.2M before 4.2.207.54M; 5.0, 5.1, and 6.0 before 6.0.196.0; and 5.2 before 5.2.193.11 allows remote authenticated users to cause a denial of service (device reload) via crafted HTTP packets that trigger invalid arguments to the emweb component, aka Bug ID CSCtd16938. Vulnerabilidad no específica en Cisco Wireless LAN Controller (WLC), posiblemente v4.2 anterior a v4.2.209.0; hasta v6.0, v4.2M anteriores a v4.2.2... • http://tools.cisco.com/security/center/viewAlert.x?alertId=21288 •

CVSS: 7.8EPSS: 0%CPEs: 46EXPL: 0

10 Sep 2010 — Unspecified vulnerability in Cisco Wireless LAN Controller (WLC) software 3.2 before 3.2.215.0; 4.1 and 4.2 before 4.2.205.0; 4.1M and 4.2M before 4.2.207.54M; 5.0, 5.1, and 6.0 before 6.0.188.0; and 5.2 before 5.2.193.11 allows remote attackers to cause a denial of service (device reload) via a crafted IKE packet, aka Bug ID CSCta56653. Vulnerabilidad no específica en Cisco Wireless LAN Controller (WLC), v3.2 anterior a v3.2.215.0; v4.1 y v4.2 anteriores a v4.2.205.0; v4.1M y v4.2M anteriores a v4.2.207.54... • http://tools.cisco.com/security/center/viewAlert.x?alertId=21287 •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

05 Feb 2009 — The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.2.x before 5.2.157.0 allow remote attackers to cause a denial of service (device reload) via a web authentication (aka WebAuth) session that includes a malformed POST request to login.html. El Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), y Cisco Catalyst 3750 Integrated Wi... • http://secunia.com/advisories/33749 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 0%CPEs: 6EXPL: 0

05 Feb 2009 — Unspecified vulnerability in the Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.2.173.0 allows remote authenticated users to gain privileges via unknown vectors, as demonstrated by escalation from the (1) Lobby Admin and (2) Local Management User privilege levels. Vulnerabilidad no especificada en Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), y Cis... • http://secunia.com/advisories/33749 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 15EXPL: 0

05 Feb 2009 — The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.2 allow remote attackers to cause a denial of service (web authentication outage or device reload) via unspecified network traffic, as demonstrated by a vulnerability scanner. Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), y Cisco Catalyst 3750 Integrated Wireless... • http://secunia.com/advisories/33749 • CWE-20: Improper Input Validation •