Page 6 of 30 results (0.021 seconds)

CVSS: 5.0EPSS: 0%CPEs: 18EXPL: 0

Cisco Wireless LAN Controller (WLC) software, possibly 6.0.x or possibly 4.1 through 6.0.x, allows remote attackers to bypass ACLs in the controller CPU, and consequently send network traffic to unintended segments or devices, via unspecified vectors, a different vulnerability than CVE-2010-0575. El software Cisco Wireless LAN Controller (WLC), posiblemente v6.0.x o posiblemente v4.1 hasta v6.0.x, permite a atacantes remotos saltar las ACLs (listas de control de acceso) en el controlador de CPU, y consecuentemente enviar tráfico de red a segmentos o dispositivos no deseados, a través de vectores no especificados. Es una vulnerabilidad distinta a CVE-2010-0575. • http://tools.cisco.com/security/center/viewAlert.x?alertId=21291 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.0EPSS: 0%CPEs: 21EXPL: 0

Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2842 and CVE-2010-2843. El software Cisco Wireless LAN Controller (WLC), posiblemente v4.2 hasta v6.0, permite a usuarios remotos autenticados, saltar las restricciones de acceso y modificar la configuración, y posiblemente obtener privilegios administrativos, a través de vectores no especificados, una vulnerabilidad diferente de CVE-2010-2842 y CVE-2010 2843. • http://tools.cisco.com/security/center/viewAlert.x?alertId=21290 http://www.cisco.com/en/US/products/products_security_advisory09186a0080b466e9.shtml • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.2.x before 5.2.157.0 allow remote attackers to cause a denial of service (device reload) via a web authentication (aka WebAuth) session that includes a malformed POST request to login.html. El Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), y Cisco Catalyst 3750 Integrated Wireless LAN Controller con software v4.x anterior a v4.2.176.0 y v5.2.x anterior a 5.2.157.0; permiten a atacantes remotos provocar una denegación de servicio (reinicio de dispositivo) a través de una sesión de autenticación Web (también conocido WebAuth) que incluye una solicitud POST mal formada a login.html. • http://secunia.com/advisories/33749 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6c1dd.shtml http://www.securityfocus.com/bid/33608 http://www.securitytracker.com/id?1021679 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

Unspecified vulnerability in the Wireless LAN Controller (WLC) TSEC driver in the Cisco 4400 WLC, Cisco Catalyst 6500 and 7600 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.1 allows remote attackers to cause a denial of service (device crash or hang) via unknown IP packets. Vulnerabilidad no especificada en el dispositivo Wireless LAN Controller (WLC) TSEC en Cisco 4400 WLC, Cisco Catalyst 6500 y 7600 Wireless Services Module (WiSM), y Cisco Catalyst 3750 Integrated Wireless LAN Controller con software 4.x versiones anteriores a 4.2.176.0 y 5.x versiones anteriores a 5.1 permite a atacantes remotos provocar una denegación de servicio (cuelgue o caída del servicio) a través de paquetes IPs desconocidos. • http://secunia.com/advisories/33749 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6c1dd.shtml http://www.securityfocus.com/bid/33608 http://www.securitytracker.com/id?1021679 • CWE-20: Improper Input Validation •

CVSS: 6.1EPSS: 0%CPEs: 15EXPL: 0

The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.2 allow remote attackers to cause a denial of service (web authentication outage or device reload) via unspecified network traffic, as demonstrated by a vulnerability scanner. Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), y Cisco Catalyst 3750 Integrated Wireless LAN Controller con software v4.x antes de v4.2.176.0 y v5.x antes de v5.2, permiten a atacantes remotos provocar una denegación de servicio (caída del servicio de autenticación web) mediante tráfico de red no especificado, como ha demostrado un escáner de vulnerabilidades. • http://secunia.com/advisories/33749 http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6c1dd.shtml http://www.securityfocus.com/bid/33608 http://www.securitytracker.com/id?1021679 • CWE-20: Improper Input Validation •