Page 5 of 22 results (0.006 seconds)

CVSS: 9.3EPSS: 0%CPEs: 56EXPL: 0

Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.4, when CPU-based ACLs are enabled, allow remote attackers to read or modify the configuration via unspecified vectors, aka Bug ID CSCtu56709. Dispositivos Cisco Wireless LAN Controller (WLC) son software v4.x, v5.x, v6.0, y 7.0 anteriores a v7.0.220.4, cuando está activada la opción CPU-based ACLs, permite a atacantes remotos leer y modificar la configuración a través de vectores no especificados, también conocido como Bug ID CSCtu56709. • http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 82%CPEs: 6EXPL: 1

Unspecified vulnerability in Cisco Wireless LAN Controller (WLC) software 6.0 before 6.0.200.0, 7.0 before 7.0.98.216, and 7.0.1xx before 7.0.112.0 allows remote attackers to cause a denial of service (device reload) via a sequence of ICMP packets, aka Bug ID CSCth74426. Vulnerabilidad no especificada en el software Cisco Wireless LAN Controller (WLC) v6.0 antes de v6.0.200.0, v7.0 antes de v7.0.98.216 y v7.0.1xx antes de v7.0.112.0 permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de una secuencia de paquetes ICMP , también conocido como error de identificación CSCth74426. Cisco DPC2100 suffers from a denial of service vulnerability. • https://www.exploit-db.com/exploits/21523 http://secunia.com/advisories/44384 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b7950e.shtml http://www.securityfocus.com/bid/47606 http://www.securitytracker.com/id?1025448 http://www.vupen.com/english/advisories/2011/1123 https://exchange.xforce.ibmcloud.com/vulnerabilities/67128 •