Логотип exploitDog
bind:CVE-2023-22751
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-22751

Количество 3

Количество 3

nvd логотип

CVE-2023-22751

почти 3 года назад

There are stack-based buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-9c9h-xpw6-52fj

почти 3 года назад

There are stack-based buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-01521

почти 3 года назад

Уязвимость реализации сетевого протокола PAPI операционных систем ArubaOS, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-22751

There are stack-based buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
3%
Низкий
почти 3 года назад
github логотип
GHSA-9c9h-xpw6-52fj

There are stack-based buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
3%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-01521

Уязвимость реализации сетевого протокола PAPI операционных систем ArubaOS, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
3%
Низкий
почти 3 года назад

Уязвимостей на страницу