
CVE-2014-7998
https://notcve.org/view.php?id=CVE-2014-7998
15 Nov 2014 — Cisco IOS on Aironet access points, when "dot11 aaa authenticator" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509. Cisco IOS en puntos de acceso Aironet, cuando la depuración está habilitada en 'dot11 aaa authenticator', permite a atacantes remotos a causar una denegación de servicio a través de un paquete EAP mal-formado, también conocido como Bug ID CSCul15509. • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-3441
https://notcve.org/view.php?id=CVE-2013-3441
22 Jul 2013 — Cisco Aironet 3600 access points allow remote attackers to cause a denial of service (memory corruption and device crash) by disrupting Cisco Wireless LAN Controller communication and consequently forcing many transitions from FlexConnect mode to Standalone mode, aka Bug ID CSCuh71210. puntos de acceso Cisco Aironet 3600 permite a atacantes remotos provocar una denegación de servicio (caída de dispositivo y corrupción de memoria) mediante la interrupción de la comunicación del Cisco Wireless LAN Controller ... • http://osvdb.org/95548 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2012-6026
https://notcve.org/view.php?id=CVE-2012-6026
03 Mar 2013 — The HTTP Profiler on the Cisco Aironet Access Point with software 15.2 and earlier does not properly manage buffers, which allows remote attackers to cause a denial of service (device reload) via crafted HTTP requests, aka Bug ID CSCuc62460. El HTTP Profiler en el Cisco Aironet Access Point con software v15.2 y anteriores no gestiona correctamente los búfers, permitiendo a atacantes remotos causar una denegación de servicio (reinicio del dispositivo) mediante peticiones HTTP especialmente diseñadas, también... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6026 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2012-1350
https://notcve.org/view.php?id=CVE-2012-1350
06 Aug 2012 — Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426. Cisco IOS v12.3 y v12.4 en puntos de acceso Aironet permite a atacantes remotos provocar una denegación de servicio (radio-interface input-queue hang) a través de IAPP 0x3281 paquetes, también conocido como Bug ID CSCtc12426. • http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/12_3_8_JED1rn.html •

CVE-2009-2976
https://notcve.org/view.php?id=CVE-2009-2976
27 Aug 2009 — Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network. Los dispositivos Cisco Aironet Lightweight Access Point (AP) envían el contenido de ciertos paquetes de multidifusión en texto plano, lo que permite a atacantes remotos descubrir las direcciones IP y MAC del Wireless LAN Controller a... • http://securitytracker.com/id?1022774 • CWE-310: Cryptographic Issues •

CVE-2009-2861
https://notcve.org/view.php?id=CVE-2009-2861
27 Aug 2009 — The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka "SkyJack" or Bug ID CSCtb56664. La funcionalidad Over-the-Air Provisioning (OTAP) en dispositivos Cisco Aironet Lightweight Access Point 1100 y 1200 no implementan apropiadamente la asociac... • http://securitytracker.com/id?1022774 •

CVE-2007-2040
https://notcve.org/view.php?id=CVE-2007-2040
16 Apr 2007 — Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192. Cisco Aironet 1000 Series y 1500 Series Lightweight Access Points anteriores a 3.2.185.0, y 4.0.x anteriores a 4.0.206.0, tienen una contraseña fija en el código, lo cual permite a atacantes con acceso físico realizar acciones de su elección en el dispositivo... • http://securitytracker.com/id?1017908 •

CVE-2006-0354 – Cisco Aironet Wireless Access Points - Memory Exhaustion ARP (Denial of Service)
https://notcve.org/view.php?id=CVE-2006-0354
22 Jan 2006 — Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644. • https://www.exploit-db.com/exploits/1447 • CWE-399: Resource Management Errors •

CVE-2005-3482
https://notcve.org/view.php?id=CVE-2005-3482
03 Nov 2005 — Cisco 1200, 1131, and 1240 series Access Points, when operating in Lightweight Access Point Protocol (LWAPP) mode and controlled by 2000 and 4400 series Airespace WLAN controllers running 3.1.59.24, allow remote attackers to send unencrypted traffic to a secure network using frames with the MAC address of an authenticated end host. • http://secunia.com/advisories/17406 •

CVE-2005-0356 – TCP TIMESTAMPS - Denial of Service
https://notcve.org/view.php?id=CVE-2005-0356
31 May 2005 — Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 •