cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2012-0368,https://securityvulnerability.io/vulnerability/CVE-2012-0368,,"The administrative management interface on Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allows remote attackers to cause a denial of service (device crash) via a malformed URL in an HTTP request, aka Bug ID CSCts81997.",Cisco,"Wireless Lan Controller Software,2000 Wireless Lan Controller,2100 Wireless Lan Controller,2106 Wireless Lan Controller,2112 Wireless Lan Controller,2125 Wireless Lan Controller,2500 Wireless Lan Controller,2504 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,4402 Wireless Lan Controller,4404 Wireless Lan Controller,5508 Wireless Controller",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2012-03-01T01:00:00.000Z,0 CVE-2012-0369,https://securityvulnerability.io/vulnerability/CVE-2012-0369,,"Cisco Wireless LAN Controller (WLC) devices with software 6.0 and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allow remote attackers to cause a denial of service (device reload) via a sequence of IPv6 packets, aka Bug ID CSCtt07949.",Cisco,"Wireless Lan Controller Software,2000 Wireless Lan Controller,2100 Wireless Lan Controller,2106 Wireless Lan Controller,2112 Wireless Lan Controller,2125 Wireless Lan Controller,2500 Wireless Lan Controller,2504 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,4402 Wireless Lan Controller,4404 Wireless Lan Controller,5508 Wireless Controller",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2012-03-01T01:00:00.000Z,0 CVE-2012-0370,https://securityvulnerability.io/vulnerability/CVE-2012-0370,,"Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0 and 7.1 before 7.1.91.0, when WebAuth is enabled, allow remote attackers to cause a denial of service (device reload) via a sequence of (1) HTTP or (2) HTTPS packets, aka Bug ID CSCtt47435.",Cisco,"Wireless Lan Controller Software,2000 Wireless Lan Controller,2100 Wireless Lan Controller,2106 Wireless Lan Controller,2112 Wireless Lan Controller,2125 Wireless Lan Controller,2500 Wireless Lan Controller,2504 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,4402 Wireless Lan Controller,4404 Wireless Lan Controller,5508 Wireless Controller",,,0.0018100000452250242,false,,false,false,false,,,false,false,,2012-03-01T01:00:00.000Z,0 CVE-2012-0371,https://securityvulnerability.io/vulnerability/CVE-2012-0371,,"Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.4, when CPU-based ACLs are enabled, allow remote attackers to read or modify the configuration via unspecified vectors, aka Bug ID CSCtu56709.",Cisco,"Wireless Lan Controller Software,2000 Wireless Lan Controller,2100 Wireless Lan Controller,2106 Wireless Lan Controller,2112 Wireless Lan Controller,2125 Wireless Lan Controller,2500 Wireless Lan Controller,2504 Wireless Lan Controller,4100 Wireless Lan Controller,4400 Wireless Lan Controller,4402 Wireless Lan Controller,4404 Wireless Lan Controller,5508 Wireless Controller",,,0.0036899999249726534,false,,false,false,false,,,false,false,,2012-03-01T01:00:00.000Z,0