Логотип exploitDog
bind:CVE-2023-22779
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-22779

Количество 3

Количество 3

nvd логотип

CVE-2023-22779

почти 3 года назад

There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-98m5-rjgx-wv8j

больше 2 лет назад

There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-07004

почти 3 года назад

Уязвимость операционной системы ArubaOS, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-22779

There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
1%
Низкий
почти 3 года назад
github логотип
GHSA-98m5-rjgx-wv8j

There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
1%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-07004

Уязвимость операционной системы ArubaOS, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
1%
Низкий
почти 3 года назад

Уязвимостей на страницу