Show filters
230 Total Results
Displaying 1-10 of 230
Sort by:
Attacker Value
Unknown

CVE-2025-23052

Disclosure Date: January 14, 2025 (last updated January 15, 2025)
Authenticated command injection vulnerability in the command line interface of a network management service. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands as a privileged user on the underlying operating system.
0
Attacker Value
Unknown

CVE-2025-23051

Disclosure Date: January 14, 2025 (last updated January 15, 2025)
An authenticated parameter injection vulnerability exists in the web-based management interface of the AOS-8 and AOS-10 Operating Systems. Successful exploitation could allow an authenticated user to leverage parameter injection to overwrite arbitrary system files.
0
Attacker Value
Unknown

CVE-2024-54010

Disclosure Date: January 08, 2025 (last updated January 09, 2025)
A vulnerability in the firewall component of HPE Aruba Networking CX 10000 Series Switches exists. It could allow an unauthenticated adjacent attacker to conduct a packet forwarding attack against the ICMP and UDP protocol. For this attack to be successful an attacker requires a switch configuration that allows packets routing (at layer 3). Configurations that do not allow network traffic routing are not impacted. Successful exploitation could allow an attacker to bypass security policies, potentially leading to unauthorized data exposure.
0
Attacker Value
Unknown

CVE-2025-22560

Disclosure Date: January 07, 2025 (last updated January 08, 2025)
Missing Authorization vulnerability in Saoshyant.1994 Saoshyant Page Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Saoshyant Page Builder: from n/a through 3.8.
0
Attacker Value
Unknown

CVE-2024-51646

Disclosure Date: December 18, 2024 (last updated December 19, 2024)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saoshyant Saoshyant Element allows Reflected XSS.This issue affects Saoshyant Element: from n/a through 1.2.
0
Attacker Value
Unknown

CVE-2024-47464

Disclosure Date: November 05, 2024 (last updated November 06, 2024)
An authenticated Path Traversal vulnerability exists in Instant AOS-8 and AOS-10. Successful exploitation of this vulnerability allows an attacker to copy arbitrary files to a user readable location from the command line interface of the underlying operating system, which could lead to a remote unauthorized access to files.
0
Attacker Value
Unknown

CVE-2024-47463

Disclosure Date: November 05, 2024 (last updated November 06, 2024)
An arbitrary file creation vulnerability exists in the Instant AOS-8 and AOS-10 command line interface. Successful exploitation of this vulnerability could allow an authenticated remote attacker to create arbitrary files, which could lead to a remote command execution (RCE) on the underlying operating system.
0
Attacker Value
Unknown

CVE-2024-47462

Disclosure Date: November 05, 2024 (last updated November 06, 2024)
An arbitrary file creation vulnerability exists in the Instant AOS-8 and AOS-10 command line interface. Successful exploitation of this vulnerability could allow an authenticated remote attacker to create arbitrary files, which could lead to a remote command execution (RCE) on the underlying operating system.
0
Attacker Value
Unknown

CVE-2024-47461

Disclosure Date: November 05, 2024 (last updated November 06, 2024)
An authenticated command injection vulnerability exists in the Instant AOS-8 and AOS-10 command line interface. A successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying host operating system.
0
Attacker Value
Unknown

CVE-2024-47460

Disclosure Date: November 05, 2024 (last updated November 06, 2024)
Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
0