Show filters
230 Total Results
Displaying 1-10 of 230
Sort by:
Attacker Value
Unknown
CVE-2025-23052
Disclosure Date: January 14, 2025 (last updated January 15, 2025)
Authenticated command injection vulnerability in the command line interface of a network management service. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands as a privileged user on the underlying operating system.
0
Attacker Value
Unknown
CVE-2025-23051
Disclosure Date: January 14, 2025 (last updated January 15, 2025)
An authenticated parameter injection vulnerability exists in the web-based management interface of the AOS-8 and AOS-10 Operating Systems. Successful exploitation could allow an authenticated user to leverage parameter injection to overwrite arbitrary system files.
0
Attacker Value
Unknown
CVE-2024-54010
Disclosure Date: January 08, 2025 (last updated January 09, 2025)
A vulnerability in the firewall component of HPE Aruba Networking CX 10000 Series Switches exists. It could allow an unauthenticated adjacent attacker to conduct a packet forwarding attack against the ICMP and UDP protocol. For this attack to be successful an attacker requires a switch configuration that allows packets routing (at layer 3). Configurations that do not allow network traffic routing are not impacted. Successful exploitation could allow an attacker to bypass security policies, potentially leading to unauthorized data exposure.
0
Attacker Value
Unknown
CVE-2025-22560
Disclosure Date: January 07, 2025 (last updated January 08, 2025)
Missing Authorization vulnerability in Saoshyant.1994 Saoshyant Page Builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Saoshyant Page Builder: from n/a through 3.8.
0
Attacker Value
Unknown
CVE-2024-51646
Disclosure Date: December 18, 2024 (last updated December 19, 2024)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saoshyant Saoshyant Element allows Reflected XSS.This issue affects Saoshyant Element: from n/a through 1.2.
0
Attacker Value
Unknown
CVE-2024-47464
Disclosure Date: November 05, 2024 (last updated November 06, 2024)
An authenticated Path Traversal vulnerability exists in Instant AOS-8 and AOS-10. Successful exploitation of this vulnerability allows an attacker to copy arbitrary files to a user readable location from the command line interface of the underlying operating system, which could lead to a remote unauthorized access to files.
0
Attacker Value
Unknown
CVE-2024-47463
Disclosure Date: November 05, 2024 (last updated November 06, 2024)
An arbitrary file creation vulnerability exists in the Instant AOS-8 and AOS-10 command line interface. Successful exploitation of this vulnerability could allow an authenticated remote attacker to create arbitrary files, which could lead to a remote command execution (RCE) on the underlying operating system.
0
Attacker Value
Unknown
CVE-2024-47462
Disclosure Date: November 05, 2024 (last updated November 06, 2024)
An arbitrary file creation vulnerability exists in the Instant AOS-8 and AOS-10 command line interface. Successful exploitation of this vulnerability could allow an authenticated remote attacker to create arbitrary files, which could lead to a remote command execution (RCE) on the underlying operating system.
0
Attacker Value
Unknown
CVE-2024-47461
Disclosure Date: November 05, 2024 (last updated November 06, 2024)
An authenticated command injection vulnerability exists in the Instant AOS-8 and AOS-10 command line interface. A successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying host operating system.
0
Attacker Value
Unknown
CVE-2024-47460
Disclosure Date: November 05, 2024 (last updated November 06, 2024)
Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
0