Vulnerabilities (CVE)

Filtered by vendor Arubanetworks Subscribe
Filtered by product Edgeconnect Enterprise
Total 25 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-30505 1 Arubanetworks 1 Edgeconnect Enterprise 2023-07-07 N/A 8.8 HIGH
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
CVE-2023-30504 1 Arubanetworks 1 Edgeconnect Enterprise 2023-07-07 N/A 8.8 HIGH
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
CVE-2023-30503 1 Arubanetworks 1 Edgeconnect Enterprise 2023-07-07 N/A 8.8 HIGH
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
CVE-2023-30502 1 Arubanetworks 1 Edgeconnect Enterprise 2023-07-07 N/A 8.8 HIGH
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
CVE-2023-30501 1 Arubanetworks 1 Edgeconnect Enterprise 2023-07-07 N/A 8.8 HIGH
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.