Логотип exploitDog
bind:CVE-2023-45619
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-45619

Количество 2

Количество 2

nvd логотип

CVE-2023-45619

около 2 лет назад

There is an arbitrary file deletion vulnerability in the RSSI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-x4mj-2ggj-g28r

около 2 лет назад

There is an arbitrary file deletion vulnerability in the RSSI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-45619

There is an arbitrary file deletion vulnerability in the RSSI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.

CVSS3: 8.2
1%
Низкий
около 2 лет назад
github логотип
GHSA-x4mj-2ggj-g28r

There is an arbitrary file deletion vulnerability in the RSSI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.

CVSS3: 8.2
1%
Низкий
около 2 лет назад

Уязвимостей на страницу