Total vulnerabilities in the database
Multiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
Software | From | Fixed in |
---|---|---|
arubanetworks / arubaos | 10.3.0.0 | 10.4.1.1 |
arubanetworks / arubaos | 10.5.0.0 | 10.5.1.1 |
hp / instantos | 6.4.0.0 | 8.6.0.24 |
hp / instantos | 8.7.0.0 | 8.10.0.11 |