Total vulnerabilities in the database
A vulnerability exists that allows an authenticated attacker to overwrite an arbitrary file with attacker-controlled content via the web interface. Successful exploitation of this vulnerability could lead to full compromise the underlying host operating system.
Software | From | Fixed in |
---|---|---|
arubanetworks / sd-wan | 8.7.0.0-2.3.0.0 | 8.7.0.0-2.3.0.7 |
arubanetworks / arubaos | 6.5.4.0 | 6.5.4.23 |
arubanetworks / arubaos | 8.4.0.0 | 8.6.0.18 |
arubanetworks / arubaos | 8.7.0.0 | 8.7.1.10 |
arubanetworks / arubaos | 8.8.0.0 | 8.9.0.3.x |
arubanetworks / arubaos | 10.3.0.0 | 10.3.0.0.x |