Логотип exploitDog
bind:CVE-2024-26305
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-26305

Количество 3

Количество 3

nvd логотип

CVE-2024-26305

почти 2 года назад

There is a buffer overflow vulnerability in the underlying Utility daemon that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-gm2r-qgvq-g985

почти 2 года назад

There is a buffer overflow vulnerability in the underlying Utility daemon that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2024-03552

почти 2 года назад

Уязвимость реализации протокола управления точками доступа Aruba (PAPI) операционных систем ArubaOS, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-26305

There is a buffer overflow vulnerability in the underlying Utility daemon that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
16%
Средний
почти 2 года назад
github логотип
GHSA-gm2r-qgvq-g985

There is a buffer overflow vulnerability in the underlying Utility daemon that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
16%
Средний
почти 2 года назад
fstec логотип
BDU:2024-03552

Уязвимость реализации протокола управления точками доступа Aruba (PAPI) операционных систем ArubaOS, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
16%
Средний
почти 2 года назад

Уязвимостей на страницу