Page 7 of 67 results (0.003 seconds)

CVSS: 9.0EPSS: 0%CPEs: 6EXPL: 0

05 Feb 2009 — Unspecified vulnerability in the Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.2.173.0 allows remote authenticated users to gain privileges via unknown vectors, as demonstrated by escalation from the (1) Lobby Admin and (2) Local Management User privilege levels. Vulnerabilidad no especificada en Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), y Cis... • http://secunia.com/advisories/33749 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 1%CPEs: 10EXPL: 0

26 Jul 2007 — Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software before 3.2 20070727, 4.0 before 20070727, and 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (traffic amplification or ARP storm) via a crafted unicast ARP request that (1) has a destination MAC address unknown to the Layer-2 infrastructure, aka CSCsj69233; or (2) occurs during Layer-3 roaming across IP subnets, aka CSCsj70841. Cisco 4100 y 4400, Airespace 4000, y Catalyst 6500 y... • http://secunia.com/advisories/26161 •

CVSS: 7.5EPSS: 1%CPEs: 10EXPL: 0

26 Jul 2007 — Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (ARP storm) via a broadcast ARP packet that "targets the IP address of a known client context", aka CSCsj50374. Cisco 4100 y 4400, Airespace 4000, y Catalyst 6500 y 3750 Wireless LAN Controller (WLC) software 4.1 versiones anteriores a 4.1.180.0, permiten a atacantes remotos provocar una denegación de servicio (tormenta ARP) mediante... • http://secunia.com/advisories/26161 •

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 0

16 Apr 2007 — The SNMP implementation in the Cisco Wireless LAN Controller (WLC) before 20070419 uses the default read-only community public, and the default read-write community private, which allows remote attackers to read and modify SNMP variables, aka Bug ID CSCse02384. La implementación SNMP en el Cisco Wireless LAN Controller (WLC) anterior al 19/04/2007 usa el nombre de comunidad de sólo lectura por defecto (public), y el nombre de comunidad de lectura-escritura por defecto (private), lo cual permite a atacantes ... • http://securitytracker.com/id?1017908 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

16 Apr 2007 — Cisco Wireless LAN Controller (WLC) before 3.2.116.21, and 4.0.x before 4.0.155.0, allows remote attackers on a local network to cause a denial of service (device crash) via malformed Ethernet traffic. Cisco Wireless LAN Controller (WLC) anterior a 3.2.116.21, y 4.0.x anterior a 4.0.155.0, permite a atacantes remotos en una red local provocar una denegación de servicio (caída del dispositivo) mediante tráfico Ethernet mal formado. • http://securitytracker.com/id?1017908 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

16 Apr 2007 — The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.171.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1) crafted SNAP packets, (2) malformed 802.11 traffic, or (3) packets with certain header length values, aka Bug IDs CSCsg15901 and CSCsh10841. La Network Processing Unit (NPU) en el Cisco Wireless LAN Controller (WLC) anterior a 3.2.171.5, 4.0.x anterior a 4.0.206.0, ... • http://securitytracker.com/id?1017908 • CWE-399: Resource Management Errors •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

16 Apr 2007 — Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192. Cisco Aironet 1000 Series y 1500 Series Lightweight Access Points anteriores a 3.2.185.0, y 4.0.x anteriores a 4.0.206.0, tienen una contraseña fija en el código, lo cual permite a atacantes con acceso físico realizar acciones de su elección en el dispositivo... • http://securitytracker.com/id?1017908 •