Note:
This project will be discontinued after December 13, 2021. [more]
Product:
2000_wireless_lan_controller
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 13 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2013-05-04 | CVE-2013-1235 | Cisco Wireless LAN Controller (WLC) devices do not properly address the resource consumption of terminated TELNET sessions, which allows remote attackers to cause a denial of service (TELNET outage) by making many TELNET connections and improperly ending these connections, aka Bug ID CSCug35507. | 2000_wireless_lan_controller, 2100_wireless_lan_controller, 2106_wireless_lan_controller, 2112_wireless_lan_controller, 2125_wireless_lan_controller, 2500_wireless_lan_controller, 2504_wireless_lan_controller, 4100_wireless_lan_controller, 4400_wireless_lan_controller, 4402_wireless_lan_controller, 4404_wireless_lan_controller, 5500_wireless_lan_controller, 7500_wireless_lan_controller, 8500_wireless_lan_controller, Airespace_4000_wireless_lan_controller, Wireless_lan_controller | N/A | ||
2013-01-24 | CVE-2013-1105 | Cisco Wireless LAN Controller (WLC) devices with software 7.0 before 7.0.235.3, 7.1 and 7.2 before 7.2.111.3, and 7.3 before 7.3.101.0 allow remote authenticated users to bypass wireless-management settings and read or modify the device configuration via an SNMP request, aka Bug ID CSCua60653. | 2000_wireless_lan_controller, 2100_wireless_lan_controller, 2500_wireless_lan_controller, 5500_wireless_lan_controller, 7500_wireless_lan_controller, 8500_wireless_lan_controller, Wireless_lan_controller_software | N/A | ||
2013-01-24 | CVE-2013-1104 | The HTTP Profiling functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.3.101.0 allows remote authenticated users to execute arbitrary code via a crafted HTTP User-Agent header, aka Bug ID CSCuc15636. | 2000_wireless_lan_controller, 2100_wireless_lan_controller, 2500_wireless_lan_controller, 4100_wireless_lan_controller, 4400_wireless_lan_controller, 5500_wireless_lan_controller, 7500_wireless_lan_controller, 8500_wireless_lan_controller, Wireless_lan_controller_software | N/A | ||
2013-01-24 | CVE-2013-1103 | Cisco Wireless LAN Controller (WLC) devices with software 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allow remote attackers to cause a denial of service (Access Point reload) via crafted SIP packets, aka Bug ID CSCts87659. | 2000_wireless_lan_controller, 2100_wireless_lan_controller, 2500_wireless_lan_controller, 4100_wireless_lan_controller, 4400_wireless_lan_controller, 5500_wireless_lan_controller, 7500_wireless_lan_controller, 8500_wireless_lan_controller, Wireless_lan_controller_software | N/A | ||
2013-01-24 | CVE-2013-1102 | The Wireless Intrusion Prevention System (wIPS) component on Cisco Wireless LAN Controller (WLC) devices with software 7.0 before 7.0.235.0, 7.1 and 7.2 before 7.2.110.0, and 7.3 before 7.3.101.0 allows remote attackers to cause a denial of service (device reload) via crafted IP packets, aka Bug ID CSCtx80743. | 2000_wireless_lan_controller, 2100_wireless_lan_controller, 2500_wireless_lan_controller, 4100_wireless_lan_controller, 4400_wireless_lan_controller, 5500_wireless_lan_controller, 7500_wireless_lan_controller, 8500_wireless_lan_controller, Wireless_lan_controller_software | N/A | ||
2012-12-19 | CVE-2012-6007 | Cross-site scripting (XSS) vulnerability in screens/base/web_auth_custom.html on Cisco Wireless LAN Controller (WLC) devices with software 7.2.110.0 allows remote authenticated users to inject arbitrary web script or HTML via the headline parameter, aka Bug ID CSCud65187, a different vulnerability than CVE-2012-5992. | 2000_wireless_lan_controller, 2100_wireless_lan_controller, 2500_wireless_lan_controller, 4100_wireless_lan_controller, 4400_wireless_lan_controller, 5500_wireless_lan_controller, 7500_wireless_lan_controller, 8500_wireless_lan_controller, Wireless_lan_controller_software | N/A | ||
2012-12-19 | CVE-2012-5992 | Multiple cross-site request forgery (CSRF) vulnerabilities on Cisco Wireless LAN Controller (WLC) devices with software 7.2.110.0 allow remote attackers to hijack the authentication of administrators for requests that (1) add administrative accounts via screens/aaa/mgmtuser_create.html or (2) insert XSS sequences via the headline parameter to screens/base/web_auth_custom.html, aka Bug ID CSCud50283. | 2000_wireless_lan_controller, 2100_wireless_lan_controller, 2500_wireless_lan_controller, 4100_wireless_lan_controller, 4400_wireless_lan_controller, 5500_wireless_lan_controller, 7500_wireless_lan_controller, 8500_wireless_lan_controller, Wireless_lan_controller_software | N/A | ||
2012-12-19 | CVE-2012-5991 | screens/base/web_auth_custom.html on Cisco Wireless LAN Controller (WLC) devices with software 7.2.110.0 allows remote authenticated users to cause a denial of service (device reload) via a certain buttonClicked value in an internal webauth_type request, aka Bug ID CSCud50209. | 2000_wireless_lan_controller, 2100_wireless_lan_controller, 2500_wireless_lan_controller, 4100_wireless_lan_controller, 4400_wireless_lan_controller, 5500_wireless_lan_controller, 7500_wireless_lan_controller, 8500_wireless_lan_controller, Wireless_lan_controller_software | N/A | ||
2012-03-01 | CVE-2012-0371 | Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.4, when CPU-based ACLs are enabled, allow remote attackers to read or modify the configuration via unspecified vectors, aka Bug ID CSCtu56709. | 2000_wireless_lan_controller, 2100_wireless_lan_controller, 2106_wireless_lan_controller, 2112_wireless_lan_controller, 2125_wireless_lan_controller, 2500_wireless_lan_controller, 2504_wireless_lan_controller, 4100_wireless_lan_controller, 4400_wireless_lan_controller, 4402_wireless_lan_controller, 4404_wireless_lan_controller, 5508_wireless_controller, Wireless_lan_controller_software | N/A | ||
2012-03-01 | CVE-2012-0370 | Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0 and 7.1 before 7.1.91.0, when WebAuth is enabled, allow remote attackers to cause a denial of service (device reload) via a sequence of (1) HTTP or (2) HTTPS packets, aka Bug ID CSCtt47435. | 2000_wireless_lan_controller, 2100_wireless_lan_controller, 2106_wireless_lan_controller, 2112_wireless_lan_controller, 2125_wireless_lan_controller, 2500_wireless_lan_controller, 2504_wireless_lan_controller, 4100_wireless_lan_controller, 4400_wireless_lan_controller, 4402_wireless_lan_controller, 4404_wireless_lan_controller, 5508_wireless_controller, Wireless_lan_controller_software | N/A |