Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Wireless_lan_controller
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 26 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2013-11-22 | CVE-2013-6698 | The web interface on Cisco Wireless LAN Controller (WLC) devices does not properly restrict use of IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks and unspecified other attacks via a crafted web site, related to a "cross-frame scripting (XFS)" issue, aka Bug ID CSCuf77821. | Wireless_lan_controller | N/A | ||
2013-11-13 | CVE-2013-6684 | The web framework on Cisco Wireless LAN Controller (WLC) devices does not properly validate configuration parameters, which allows remote authenticated users to cause a denial of service via a crafted HTTP request, aka Bug ID CSCuh81011. | Wireless_lan_controller | N/A | ||
2013-10-03 | CVE-2013-5519 | Cross-site scripting (XSS) vulnerability in the management interface on Cisco Wireless LAN Controller (WLC) devices allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuf77810. | Wireless_lan_controller | N/A | ||
2013-08-30 | CVE-2013-3474 | The Web Administrator Interface on Cisco Wireless LAN Controller (WLC) devices allows remote authenticated users to cause a denial of service (device crash) by leveraging membership in the Full Manager managers group, Read Only managers group, or Lobby Ambassador managers group, and sending a request that (1) lacks a parameter value or (2) contains a malformed parameter value, aka Bug IDs CSCuh14313, CSCuh14159, CSCuh14368, and CSCuh14436. | Wireless_lan_controller | N/A | ||
2013-05-04 | CVE-2013-1235 | Cisco Wireless LAN Controller (WLC) devices do not properly address the resource consumption of terminated TELNET sessions, which allows remote attackers to cause a denial of service (TELNET outage) by making many TELNET connections and improperly ending these connections, aka Bug ID CSCug35507. | 2000_wireless_lan_controller, 2100_wireless_lan_controller, 2106_wireless_lan_controller, 2112_wireless_lan_controller, 2125_wireless_lan_controller, 2500_wireless_lan_controller, 2504_wireless_lan_controller, 4100_wireless_lan_controller, 4400_wireless_lan_controller, 4402_wireless_lan_controller, 4404_wireless_lan_controller, 5500_wireless_lan_controller, 7500_wireless_lan_controller, 8500_wireless_lan_controller, Airespace_4000_wireless_lan_controller, Wireless_lan_controller | N/A | ||
2013-02-28 | CVE-2013-1141 | The mDNS snooping functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.4.1.54 and earlier does not properly manage buffers, which allows remote authenticated users to cause a denial of service (device reload) via crafted mDNS packets, aka Bug ID CSCue04153. | Wireless_lan_controller, Wireless_lan_controller_software | N/A |