Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2002-07-03 |
Product | Aironet ap340 | Last view | 2012-08-06 |
Version | 11.21 | Type | Hardware |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:h:cisco:aironet_ap340 |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2012-08-06 | CVE-2012-1350 | Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426. |
5 | 2002-07-03 | CVE-2002-0545 | Cisco Aironet before 11.21 with Telnet enabled allows remote attackers to cause a denial of service (reboot) via a series of login attempts with invalid usernames and passwords. |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
5238 | Cisco Aironet Telnet Invalid Username/Password DoS |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2012-08-17 | Name: The remote device is missing a vendor-supplied security patch. File: cisco_ios_CSCtc12426.nasl - Type: ACT_GATHER_INFO |
2002-06-05 | Name: The remote wireless access point has a denial of service vulnerability. File: cisco_aironet_dos.nasl - Type: ACT_KILL_HOST |