CVE-2012-0371
https://notcve.org/view.php?id=CVE-2012-0371
Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.4, when CPU-based ACLs are enabled, allow remote attackers to read or modify the configuration via unspecified vectors, aka Bug ID CSCtu56709. Dispositivos Cisco Wireless LAN Controller (WLC) son software v4.x, v5.x, v6.0, y 7.0 anteriores a v7.0.220.4, cuando está activada la opción CPU-based ACLs, permite a atacantes remotos leer y modificar la configuración a través de vectores no especificados, también conocido como Bug ID CSCtu56709. • http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2010-2842
https://notcve.org/view.php?id=CVE-2010-2842
Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2843 and CVE-2010-3033. El software Cisco Wireless LAN Controller (WLC), posiblemente v4.2 hasta v6.0, permite a usuarios remotos autenticados saltar las limitaciones de acceso impuestas, modificar la configuración y posiblemente obtener derechos administrativos, a través de vectores no específicos, vulnerabilidad diferente a CVE-2010-2843 and CVE-2010-3033. • http://tools.cisco.com/security/center/viewAlert.x?alertId=21290 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2010-2841
https://notcve.org/view.php?id=CVE-2010-2841
Unspecified vulnerability in Cisco Wireless LAN Controller (WLC) software 4.2 before 4.2.209.0; 4.2M before 4.2.207.54M; 5.0, 5.1, and 6.0 before 6.0.196.0; and 5.2 before 5.2.193.11 allows remote authenticated users to cause a denial of service (device reload) via crafted HTTP packets that trigger invalid arguments to the emweb component, aka Bug ID CSCtd16938. Vulnerabilidad no específica en Cisco Wireless LAN Controller (WLC), posiblemente v4.2 anterior a v4.2.209.0; hasta v6.0, v4.2M anteriores a v4.2.207.54M; v5.0, v5.1, y v6.0 anteriores a v6.0.196.0; y v5.2 anteriores a v5.2.193.11 permite a usuarios remotos autenticados provocan una denegación de servicio (recarga de dispositivo) a través de paquetes HTTP manipulados que provocan argumentos no válidos sobre el componente emweb, también conocido como Bug ID CSCtd16938. • http://tools.cisco.com/security/center/viewAlert.x?alertId=21288 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml •
CVE-2010-2843
https://notcve.org/view.php?id=CVE-2010-2843
Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2842 and CVE-2010-3033. El software Cisco Wireless LAN Controller (WLC), posiblemente v4.2 hasta v6.0, permite a usuarios remotos autenticados saltar las limitaciones de acceso impuestas, modificar la configuración y posiblemente obtener derechos administrativos, a través de vectores no específicos, vulnerabilidad diferente a CVE-2010-2842 and CVE-2010-3033. • http://tools.cisco.com/security/center/viewAlert.x?alertId=21290 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2010-0575
https://notcve.org/view.php?id=CVE-2010-0575
Cisco Wireless LAN Controller (WLC) software, possibly 6.0.x or possibly 4.1 through 6.0.x, allows remote attackers to bypass ACLs in the controller CPU, and consequently send network traffic to unintended segments or devices, via unspecified vectors, a different vulnerability than CVE-2010-3034. El software Cisco Wireless LAN Controller (WLC), posiblemente V6.0.X o posiblemente v4.1 hasta v6.0.x, permite a atacantes remotos saltar las ACLs (listas de control de acceso) en el controlador de la CPU, y consecuentemente envíar tráfico de red a segmentos o dispositivos no deseados, a través de vectores no especificados, una vulnerabilidad diferente de CVE-2010-3034. • http://tools.cisco.com/security/center/viewAlert.x?alertId=21291 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml • CWE-264: Permissions, Privileges, and Access Controls •