An unauthenticated Denial-of-Service (DoS) vulnerability exists in the Radio Frequency Manager service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected service.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
5.3
EPSS Score
0.04%
Published
2024-05-01
Updated
2024-05-01
An unauthenticated Denial-of-Service (DoS) vulnerability exists in the Radio Frequency Manager service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected service.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
5.3
EPSS Score
0.04%
Published
2024-05-01
Updated
2024-05-01
An unauthenticated Denial of Service (DoS) vulnerability exists in the Auth service accessed via the PAPI protocol provided by ArubaOS. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the controller.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
5.3
EPSS Score
0.04%
Published
2024-05-01
Updated
2024-05-01
Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Management service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected service.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
5.3
EPSS Score
0.04%
Published
2024-05-01
Updated
2024-05-01
Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Management service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected service.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
5.3
EPSS Score
0.04%
Published
2024-05-01
Updated
2024-05-01
Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Management service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected service.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
5.9
EPSS Score
0.04%
Published
2024-05-01
Updated
2024-05-01
There is a buffer overflow vulnerability in the underlying Local User Authentication Database service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
9.8
EPSS Score
0.04%
Published
2024-05-01
Updated
2024-05-01
There is a buffer overflow vulnerability in the underlying Automatic Reporting service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
9.8
EPSS Score
0.04%
Published
2024-05-01
Updated
2024-05-01
An authenticated sensitive information disclosure vulnerability exists in the CLI service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to read arbitrary files in the underlying operating system.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
4.9
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
An unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
5.3
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
Unauthenticated Denial of Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
5.3
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
Unauthenticated Denial of Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
5.3
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
Unauthenticated Denial of Service (DoS) vulnerabilities exist in the Central Communications service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
5.3
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exists in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilites result in the ability to interrupt the normal operation of the affected Access Point.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
5.3
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
Multiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
7.2
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
Multiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
7.2
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
There is an arbitrary file deletion vulnerability in the Central Communications service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the affected Access Point.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
8.2
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
There is an arbitrary file deletion vulnerability in the CLI service accessed by PAPI (Aruba's Access Point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the affected Access Point
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
8.2
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
There is a command injection vulnerability in the underlying deauthentication service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
9.8
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
There are command injection vulnerabilities in the underlying Soft AP Daemon service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
9.8
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
There is a command injection vulnerability in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
9.8
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
There is a buffer overflow vulnerability in the underlying SAE (Simultaneous Authentication of Equals) service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
9.8
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
There are buffer overflow vulnerabilities in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
9.8
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
There are buffer overflow vulnerabilities in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
9.8
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Source: Hewlett Packard Enterprise (HPE)
Max CVSS
9.8
EPSS Score
0.04%
Published
2024-05-14
Updated
2024-05-15
2280 vulnerabilities found
1 2 3 4 5 6 ...... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!