Логотип exploitDog
bind:CVE-2024-42509
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-42509

Количество 3

Количество 3

nvd логотип

CVE-2024-42509

больше 1 года назад

Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-66rq-9x8p-ghcr

больше 1 года назад

Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2024-10881

больше 1 года назад

Уязвимость интерфейса командной строки (CLI) операционных систем Instant AOS-8 и AOS-10, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-42509

Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
2%
Низкий
больше 1 года назад
github логотип
GHSA-66rq-9x8p-ghcr

Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
2%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-10881

Уязвимость интерфейса командной строки (CLI) операционных систем Instant AOS-8 и AOS-10, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 9.8
2%
Низкий
больше 1 года назад

Уязвимостей на страницу