Page 4 of 17 results (0.003 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

HTTP server in Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(51) stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain usernames and directory paths via a direct URL request. El servidor HTTP de Cisco Wireless Control System (WCS) para Linux y Windows en sus versiones anteriores a la v3.2(51) almacena información confidencial bajo el directorio raiz web con insuficiente control de acceso, lo que permite a atacantes remotos obtener nombres de usuario y rutas de directorios a través de peticiones directas de URL. • http://secunia.com/advisories/20870 http://securitytracker.com/id?1016398 http://www.cisco.com/warp/public/707/cisco-sa-20060628-wcs.shtml http://www.osvdb.org/26879 http://www.securityfocus.com/bid/18701 http://www.vupen.com/english/advisories/2006/2583 https://exchange.xforce.ibmcloud.com/vulnerabilities/27442 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

The internal database in Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(51) uses an undocumented, hard-coded username and password, which allows remote authenticated users to read, and possibly modify, sensitive configuration data (aka bugs CSCsd15955). La base de datos interna en Cisco Wireless Control System (WCS) para Linux y Windows anterior a v3.2(51) utiliza un nombre de usuario indocumentados no modificable y una contraseña, lo cual permite a usuarios remotos autenticados leer, y posiblemente modificar, datos de configuración confidenciales (alias errores CSCsd15955). • http://secunia.com/advisories/20870 http://securitytracker.com/id?1016398 http://www.cisco.com/warp/public/707/cisco-sa-20060628-wcs.shtml http://www.osvdb.org/26884 http://www.securityfocus.com/bid/18701 http://www.vupen.com/english/advisories/2006/2583 https://exchange.xforce.ibmcloud.com/vulnerabilities/27438 •