Total vulnerabilities in the database
Multiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
Software | From | Fixed in |
---|---|---|
arubanetworks / arubaos | 10.5.0.0 | 10.5.0.0.x |
hp / instantos | 6.4.0.0 | 8.6.0.23 |
arubanetworks / arubaos | 10.3.0.0 | 10.4.0.3 |
hp / instantos | 8.11.0.0 | 8.11.2.0 |
hp / instantos | 8.10.0.0 | 8.10.0.9 |