Page 8 of 74 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

03 Jul 2002 — Cisco Aironet before 11.21 with Telnet enabled allows remote attackers to cause a denial of service (reboot) via a series of login attempts with invalid usernames and passwords. Cisco Aironet anteriores a la 11.21 con Telnet habilitado, permite a atacantes remotos una Denegación de Servico (reinicio) mediante una serie de intentos de acceso con nombres de usuario y contraseñas no válidos. • http://www.cisco.com/warp/public/707/Aironet-Telnet.shtml •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

27 Jun 2001 — Cisco Aironet 340 Series wireless bridge before 8.55 does not properly disable access to the web interface, which allows remote attackers to modify its configuration. • http://www.cisco.com/warp/public/707/Aironet340-pub.shtml •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

01 Jan 2001 — Cisco 340-series Aironet access point using firmware 11.01 does not use 6 of the 24 available IV bits for WEP encryption, which makes it easier for remote attackers to mount brute force attacks. • http://www.cs.jhu.edu/~seny/pubs/wince802.pdf •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

01 Jan 2001 — Cisco AP340 base station produces predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections. • https://www.exploit-db.com/exploits/19522 •