Логотип exploitDog
bind:CVE-2023-22752
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-22752

Количество 3

Количество 3

nvd логотип

CVE-2023-22752

почти 3 года назад

There are stack-based buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-mq8g-hxpm-gp2h

почти 3 года назад

There are stack-based buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-01520

почти 3 года назад

Уязвимость реализации сетевого протокола PAPI операционных систем ArubaOS, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-22752

There are stack-based buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
3%
Низкий
почти 3 года назад
github логотип
GHSA-mq8g-hxpm-gp2h

There are stack-based buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
3%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-01520

Уязвимость реализации сетевого протокола PAPI операционных систем ArubaOS, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
3%
Низкий
почти 3 года назад

Уязвимостей на страницу