cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2013-1235,https://securityvulnerability.io/vulnerability/CVE-2013-1235,,"Cisco Wireless LAN Controller (WLC) devices do not properly address the resource consumption of terminated TELNET sessions, which allows remote attackers to cause a denial of service (TELNET outage) by making many TELNET connections and improperly ending these connections, aka Bug ID CSCug35507.",Cisco,"7500 Wireless Lan Controller,4404 Wireless Lan Controller,Wireless Lan Controller,2000 Wireless Lan Controller,2504 Wireless Lan Controller,2125 Wireless Lan Controller,8500 Wireless Lan Controller,Airespace 4000 Wireless Lan Controller,4100 Wireless Lan Controller,2500 Wireless Lan Controller,4400 Wireless Lan Controller,2100 Wireless Lan Controller,2106 Wireless Lan Controller,5500 Wireless Lan Controller,2112 Wireless Lan Controller,4402 Wireless Lan Controller",,,0.001610000035725534,false,,false,false,false,,,false,false,,2013-05-04T03:24:00.000Z,0 CVE-2013-1103,https://securityvulnerability.io/vulnerability/CVE-2013-1103,,"Cisco Wireless LAN Controller (WLC) devices with software 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allow remote attackers to cause a denial of service (Access Point reload) via crafted SIP packets, aka Bug ID CSCts87659.",Cisco,"Wireless Lan Controller Software,2000 Wireless Lan Controller,2100 Wireless Lan Controller,2500 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,5500 Wireless Lan Controller,7500 Wireless Lan Controller,8500 Wireless Lan Controller",,,0.01355000026524067,false,,false,false,false,,,false,false,,2013-01-24T21:00:00.000Z,0 CVE-2013-1102,https://securityvulnerability.io/vulnerability/CVE-2013-1102,,"The Wireless Intrusion Prevention System (wIPS) component on Cisco Wireless LAN Controller (WLC) devices with software 7.0 before 7.0.235.0, 7.1 and 7.2 before 7.2.110.0, and 7.3 before 7.3.101.0 allows remote attackers to cause a denial of service (device reload) via crafted IP packets, aka Bug ID CSCtx80743.",Cisco,"Wireless Lan Controller Software,2000 Wireless Lan Controller,2100 Wireless Lan Controller,2500 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,5500 Wireless Lan Controller,7500 Wireless Lan Controller,8500 Wireless Lan Controller",,,0.00675999978557229,false,,false,false,false,,,false,false,,2013-01-24T21:00:00.000Z,0 CVE-2013-1104,https://securityvulnerability.io/vulnerability/CVE-2013-1104,,"The HTTP Profiling functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.3.101.0 allows remote authenticated users to execute arbitrary code via a crafted HTTP User-Agent header, aka Bug ID CSCuc15636.",Cisco,"2000 Wireless Lan Controller,2100 Wireless Lan Controller,2500 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,5500 Wireless Lan Controller,7500 Wireless Lan Controller,8500 Wireless Lan Controller,Wireless Lan Controller Software",,,0.014809999614953995,false,,false,false,false,,,false,false,,2013-01-24T21:00:00.000Z,0 CVE-2012-5992,https://securityvulnerability.io/vulnerability/CVE-2012-5992,,"Multiple cross-site request forgery (CSRF) vulnerabilities on Cisco Wireless LAN Controller (WLC) devices with software 7.2.110.0 allow remote attackers to hijack the authentication of administrators for requests that (1) add administrative accounts via screens/aaa/mgmtuser_create.html or (2) insert XSS sequences via the headline parameter to screens/base/web_auth_custom.html, aka Bug ID CSCud50283.",Cisco,"Wireless Lan Controller Software,2000 Wireless Lan Controller,2100 Wireless Lan Controller,2500 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,5500 Wireless Lan Controller,7500 Wireless Lan Controller,8500 Wireless Lan Controller",,,0.0031900000758469105,false,,false,false,false,,,false,false,,2012-12-19T11:56:00.000Z,0 CVE-2012-6007,https://securityvulnerability.io/vulnerability/CVE-2012-6007,,"Cross-site scripting (XSS) vulnerability in screens/base/web_auth_custom.html on Cisco Wireless LAN Controller (WLC) devices with software 7.2.110.0 allows remote authenticated users to inject arbitrary web script or HTML via the headline parameter, aka Bug ID CSCud65187, a different vulnerability than CVE-2012-5992.",Cisco,"Wireless Lan Controller Software,2000 Wireless Lan Controller,2100 Wireless Lan Controller,2500 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,5500 Wireless Lan Controller,7500 Wireless Lan Controller,8500 Wireless Lan Controller",,,0.0014100000262260437,false,,false,false,false,,,false,false,,2012-12-19T11:56:00.000Z,0 CVE-2012-5991,https://securityvulnerability.io/vulnerability/CVE-2012-5991,,"screens/base/web_auth_custom.html on Cisco Wireless LAN Controller (WLC) devices with software 7.2.110.0 allows remote authenticated users to cause a denial of service (device reload) via a certain buttonClicked value in an internal webauth_type request, aka Bug ID CSCud50209.",Cisco,"Wireless Lan Controller Software,2000 Wireless Lan Controller,2100 Wireless Lan Controller,2500 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,5500 Wireless Lan Controller,7500 Wireless Lan Controller,8500 Wireless Lan Controller",,,0.0010499999625608325,false,,false,false,false,,,false,false,,2012-12-19T11:56:00.000Z,0 CVE-2012-0371,https://securityvulnerability.io/vulnerability/CVE-2012-0371,,"Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.4, when CPU-based ACLs are enabled, allow remote attackers to read or modify the configuration via unspecified vectors, aka Bug ID CSCtu56709.",Cisco,"Wireless Lan Controller Software,2000 Wireless Lan Controller,2100 Wireless Lan Controller,2106 Wireless Lan Controller,2112 Wireless Lan Controller,2125 Wireless Lan Controller,2500 Wireless Lan Controller,2504 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,4402 Wireless Lan Controller,4404 Wireless Lan Controller,5508 Wireless Controller",,,0.0036899999249726534,false,,false,false,false,,,false,false,,2012-03-01T01:00:00.000Z,0 CVE-2012-0368,https://securityvulnerability.io/vulnerability/CVE-2012-0368,,"The administrative management interface on Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allows remote attackers to cause a denial of service (device crash) via a malformed URL in an HTTP request, aka Bug ID CSCts81997.",Cisco,"Wireless Lan Controller Software,2000 Wireless Lan Controller,2100 Wireless Lan Controller,2106 Wireless Lan Controller,2112 Wireless Lan Controller,2125 Wireless Lan Controller,2500 Wireless Lan Controller,2504 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,4402 Wireless Lan Controller,4404 Wireless Lan Controller,5508 Wireless Controller",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2012-03-01T01:00:00.000Z,0 CVE-2012-0369,https://securityvulnerability.io/vulnerability/CVE-2012-0369,,"Cisco Wireless LAN Controller (WLC) devices with software 6.0 and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allow remote attackers to cause a denial of service (device reload) via a sequence of IPv6 packets, aka Bug ID CSCtt07949.",Cisco,"Wireless Lan Controller Software,2000 Wireless Lan Controller,2100 Wireless Lan Controller,2106 Wireless Lan Controller,2112 Wireless Lan Controller,2125 Wireless Lan Controller,2500 Wireless Lan Controller,2504 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,4402 Wireless Lan Controller,4404 Wireless Lan Controller,5508 Wireless Controller",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2012-03-01T01:00:00.000Z,0 CVE-2012-0370,https://securityvulnerability.io/vulnerability/CVE-2012-0370,,"Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0 and 7.1 before 7.1.91.0, when WebAuth is enabled, allow remote attackers to cause a denial of service (device reload) via a sequence of (1) HTTP or (2) HTTPS packets, aka Bug ID CSCtt47435.",Cisco,"Wireless Lan Controller Software,2000 Wireless Lan Controller,2100 Wireless Lan Controller,2106 Wireless Lan Controller,2112 Wireless Lan Controller,2125 Wireless Lan Controller,2500 Wireless Lan Controller,2504 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,4402 Wireless Lan Controller,4404 Wireless Lan Controller,5508 Wireless Controller",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2012-03-01T01:00:00.000Z,0 CVE-2009-1167,https://securityvulnerability.io/vulnerability/CVE-2009-1167,,"Unspecified vulnerability on the Cisco Wireless LAN Controller (WLC) platform 4.x before 4.2.205.0 and 5.x before 5.2.191.0, as used in Cisco 1500 Series, 2000 Series, 2100 Series, 4100 Series, 4200 Series, and 4400 Series Wireless Services Modules (WiSM), WLC Modules for Integrated Services Routers, and Catalyst 3750G Integrated Wireless LAN Controllers, allows remote attackers to modify the configuration via a crafted (1) HTTP or (2) HTTPS request, aka Bug ID CSCsy44672.",Cisco,"Cisco 4200 Wireless Lan Controller,Cisco 4400 Wireless Lan Controller,Cisco 2000 Wireless Lan Controller,Cisco 2100 Wireless Lan Controller,Catalyst 3750g,Cisco 1500 Wireless Lan Controller,Cisco 4100 Wireless Lan Controller",,,0.005549999885261059,false,,false,false,false,,,false,false,,2009-07-29T17:00:00.000Z,0 CVE-2009-1165,https://securityvulnerability.io/vulnerability/CVE-2009-1165,,"Memory leak on the Cisco Wireless LAN Controller (WLC) platform 4.x before 4.2.205.0, 5.1 before 5.1.163.0, and 5.0 and 5.2 before 5.2.178.0, as used in Cisco 1500 Series, 2000 Series, 2100 Series, 4100 Series, 4200 Series, and 4400 Series Wireless Services Modules (WiSM), WLC Modules for Integrated Services Routers, and Catalyst 3750G Integrated Wireless LAN Controllers, allows remote attackers to cause a denial of service (memory consumption and device reload) via SSH management connections, aka Bug ID CSCsw40789.",Cisco,"Cisco 4200 Wireless Lan Controller,Cisco 4400 Wireless Lan Controller,Cisco 2000 Wireless Lan Controller,Cisco 2100 Wireless Lan Controller,Catalyst 3750g,Cisco 1500 Wireless Lan Controller,Cisco 4100 Wireless Lan Controller",,,0.00675999978557229,false,,false,false,false,,,false,false,,2009-07-29T17:00:00.000Z,0 CVE-2009-1164,https://securityvulnerability.io/vulnerability/CVE-2009-1164,,"The administrative web interface on the Cisco Wireless LAN Controller (WLC) platform 4.2 before 4.2.205.0 and 5.x before 5.2.178.0, as used in Cisco 1500 Series, 2000 Series, 2100 Series, 4100 Series, 4200 Series, and 4400 Series Wireless Services Modules (WiSM), WLC Modules for Integrated Services Routers, and Catalyst 3750G Integrated Wireless LAN Controllers, allows remote attackers to cause a denial of service (device reload) via a malformed response to a (1) HTTP or (2) HTTPS authentication request, aka Bug ID CSCsx03715.",Cisco,"Cisco 4200 Wireless Lan Controller,Cisco 4400 Wireless Lan Controller,Cisco 2000 Wireless Lan Controller,Cisco 2100 Wireless Lan Controller,Catalyst 3750g,Cisco 1500 Wireless Lan Controller,Cisco 4100 Wireless Lan Controller",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2009-07-29T17:00:00.000Z,0 CVE-2007-2038,https://securityvulnerability.io/vulnerability/CVE-2007-2038,,"The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.193.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1) crafted SNAP packets, (2) malformed 802.11 traffic, or (3) packets with certain header length values, aka Bug ID CSCsg36361.",Cisco,"2000 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,2100 Wireless Lan Controller",,,0.013410000130534172,false,,false,false,false,,,false,false,,2007-04-16T21:00:00.000Z,0