Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Wireless_lan_controller_software
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 86 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2010-09-10 | CVE-2010-3033 | Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2842 and CVE-2010-2843. | Wireless_lan_controller_software | N/A | ||
2010-09-10 | CVE-2010-2843 | Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2842 and CVE-2010-3033. | Wireless_lan_controller_software | N/A | ||
2010-09-10 | CVE-2010-2842 | Cisco Wireless LAN Controller (WLC) software, possibly 4.2 through 6.0, allows remote authenticated users to bypass intended access restrictions and modify the configuration, and possibly obtain administrative privileges, via unspecified vectors, a different vulnerability than CVE-2010-2843 and CVE-2010-3033. | Wireless_lan_controller_software | N/A | ||
2010-09-10 | CVE-2010-2841 | Unspecified vulnerability in Cisco Wireless LAN Controller (WLC) software 4.2 before 4.2.209.0; 4.2M before 4.2.207.54M; 5.0, 5.1, and 6.0 before 6.0.196.0; and 5.2 before 5.2.193.11 allows remote authenticated users to cause a denial of service (device reload) via crafted HTTP packets that trigger invalid arguments to the emweb component, aka Bug ID CSCtd16938. | Wireless_lan_controller_software | N/A | ||
2010-09-10 | CVE-2010-0575 | Cisco Wireless LAN Controller (WLC) software, possibly 6.0.x or possibly 4.1 through 6.0.x, allows remote attackers to bypass ACLs in the controller CPU, and consequently send network traffic to unintended segments or devices, via unspecified vectors, a different vulnerability than CVE-2010-3034. | Wireless_lan_controller_software | N/A | ||
2010-09-10 | CVE-2010-0574 | Unspecified vulnerability in Cisco Wireless LAN Controller (WLC) software 3.2 before 3.2.215.0; 4.1 and 4.2 before 4.2.205.0; 4.1M and 4.2M before 4.2.207.54M; 5.0, 5.1, and 6.0 before 6.0.188.0; and 5.2 before 5.2.193.11 allows remote attackers to cause a denial of service (device reload) via a crafted IKE packet, aka Bug ID CSCta56653. | Wireless_lan_controller_software | N/A | ||
2009-02-04 | CVE-2009-0062 | Unspecified vulnerability in the Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.2.173.0 allows remote authenticated users to gain privileges via unknown vectors, as demonstrated by escalation from the (1) Lobby Admin and (2) Local Management User privilege levels. | Catalyst_3750_series_integrated_wireless_lan_controller, Catalyst_6500_wireless_services_modules, Wireless_lan_controller_software | N/A | ||
2009-02-04 | CVE-2009-0061 | Unspecified vulnerability in the Wireless LAN Controller (WLC) TSEC driver in the Cisco 4400 WLC, Cisco Catalyst 6500 and 7600 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.1 allows remote attackers to cause a denial of service (device crash or hang) via unknown IP packets. | 4400_wireless_lan_controller, Catalyst_3750_series_integrated_wireless_lan_controller, Catalyst_6500_series_integrated_wireless_lan_controller, Catalyst_7600_series_wireless_lan_controller, Wireless_lan_controller_software | N/A | ||
2009-02-04 | CVE-2009-0059 | The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.2.x before 5.2.157.0 allow remote attackers to cause a denial of service (device reload) via a web authentication (aka WebAuth) session that includes a malformed POST request to login.html. | 4400_wireless_lan_controller, Catalyst_3750_series_integrated_wireless_lan_controller, Catalyst_6500_series_integrated_wireless_lan_controller, Catalyst_7600_series_wireless_lan_controller, Wireless_lan_controller_software | N/A | ||
2009-02-04 | CVE-2009-0058 | The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.2 allow remote attackers to cause a denial of service (web authentication outage or device reload) via unspecified network traffic, as demonstrated by a vulnerability scanner. | 4400_wireless_lan_controller, Catalyst_3750_series_integrated_wireless_lan_controller, Catalyst_6500_series_integrated_wireless_lan_controller, Catalyst_7600_series_wireless_lan_controller, Wireless_lan_controller_software | N/A |