Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Wireless_lan_controller_software
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 85 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2007-04-16 | CVE-2007-2040 | Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192. | Wireless_lan_controller_software | N/A | ||
2016-09-11 | CVE-2016-6375 | Cisco Wireless LAN Controller (WLC) devices before 8.0.140.0, 8.1.x and 8.2.x before 8.2.121.0, and 8.3.x before 8.3.102.0 allow remote attackers to cause a denial of service (device reload) by sending crafted Inter-Access Point Protocol (IAPP) packets and then sending a traffic stream metrics (TSM) information request over SNMP, aka Bug ID CSCuz40221. | Wireless_lan_controller_software, Wireless_lan_controller_software_6\.0, Wireless_lan_controller_software_7\.0, Wireless_lan_controller_software_7\.1, Wireless_lan_controller_software_7\.2, Wireless_lan_controller_software_7\.4 | 5.3 | ||
2016-07-27 | CVE-2016-1460 | Cisco Wireless LAN Controller (WLC) devices 7.4(121.0) and 8.0(0.30220.385) allow remote attackers to cause a denial of service via crafted wireless management frames, aka Bug ID CSCun92979. | Wireless_lan_controller_software | 6.5 | ||
2015-10-25 | CVE-2015-6341 | The Web Management GUI on Cisco Wireless LAN Controller (WLC) devices with software 7.4(140.0) and 8.0(120.0) allows remote attackers to cause a denial of service (client disconnection) via unspecified vectors, aka Bug ID CSCuw10610. | Wireless_lan_controller_software | N/A | ||
2015-09-25 | CVE-2015-6302 | The RADIUS functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.0(250.0) and 7.0(252.0) allows remote attackers to disconnect arbitrary sessions via crafted Disconnect-Request UDP packets, aka Bug ID CSCuw29419. | Wireless_lan_controller_software | N/A | ||
2015-08-22 | CVE-2015-6258 | The Internet Access Point Protocol (IAPP) module on Cisco Wireless LAN Controller (WLC) devices with software 8.1(104.37) allows remote attackers to trigger incorrect traffic forwarding via crafted IPv6 packets, aka Bug ID CSCuv40033. | Wireless_lan_controller_software | N/A | ||
2015-06-26 | CVE-2015-4224 | Cisco Wireless LAN Controller (WLC) devices with software 7.0(240.0) allow local users to execute arbitrary OS commands in a privileged context via crafted CLI commands, aka Bug ID CSCuj39474. | Wireless_lan_controller_software | N/A | ||
2015-05-16 | CVE-2015-0723 | The wireless web-authentication subsystem on Cisco Wireless LAN Controller (WLC) devices 7.5.x and 7.6.x before 7.6.120 allows remote attackers to cause a denial of service (process crash and device restart) via a crafted value, aka Bug ID CSCum03269. | Wireless_lan_controller_software | N/A | ||
2015-04-07 | CVE-2015-0690 | Cross-site scripting (XSS) vulnerability in the HTML help system on Cisco Wireless LAN Controller (WLC) devices before 8.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCun95178. | Wireless_lan_controller_software | N/A | ||
2014-03-06 | CVE-2014-0707 | Cisco Wireless LAN Controller (WLC) devices 7.2, 7.3, and 7.4 before 7.4.110.0 allow remote attackers to cause a denial of service (device restart) via a crafted 802.11 Ethernet frame, aka Bug ID CSCuf80681. | Wireless_lan_controller, Wireless_lan_controller_software | N/A |