Lucene search

K
CiscoWireless Control System

5 matches found

CVE
CVE
added 2006/06/28 10:5 p.m.37 views

CVE-2006-3285

The internal database in Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(51) uses an undocumented, hard-coded username and password, which allows remote authenticated users to read, and possibly modify, sensitive configuration data (aka bugs CSCsd15955).

7.5CVSS6.4AI score0.0103EPSS
CVE
CVE
added 2007/04/16 9:19 p.m.35 views

CVE-2007-2032

Cisco Wireless Control System (WCS) before 4.0.96.0 has a hard-coded FTP username and password for backup operations, which allows remote attackers to read and modify arbitrary files via unspecified vectors related to "properties of the FTP server," aka Bug ID CSCse93014.

7.5CVSS6.9AI score0.0111EPSS
CVE
CVE
added 2007/04/16 9:19 p.m.31 views

CVE-2007-2035

Cisco Wireless Control System (WCS) before 4.0.66.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain network organization data via a direct request for files in certain directories, aka Bug ID CSCsg04301.

7.8CVSS6.2AI score0.00546EPSS
CVE
CVE
added 2006/06/28 11:5 p.m.30 views

CVE-2006-3287

Cisco Wireless Control System (WCS) for Linux and Windows 4.0(1) and earlier uses a default administrator username "root" and password "public," which allows remote attackers to gain access (aka bug CSCse21391).

7.5CVSS7.1AI score0.01393EPSS
CVE
CVE
added 2006/06/28 11:5 p.m.28 views

CVE-2006-3286

The internal database in Cisco Wireless Control System (WCS) for Linux and Windows before 3.2(63) stores a hard-coded username and password in plaintext within unspecified files, which allows remote authenticated users to access the database (aka bug CSCsd15951).

7.5CVSS6.8AI score0.01393EPSS