Filtered by vendor Arubanetworks Subscriptions
Filtered by product Edgeconnect Enterprise Subscriptions
Total 25 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-30507 1 Arubanetworks 1 Edgeconnect Enterprise 2024-08-02 4.9 Medium
Multiple authenticated path traversal vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface. Successful exploitation of these vulnerabilities result in the ability to read arbitrary files on the underlying operating system, including sensitive system files.
CVE-2023-30508 1 Arubanetworks 1 Edgeconnect Enterprise 2024-08-02 4.9 Medium
Multiple authenticated path traversal vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface. Successful exploitation of these vulnerabilities result in the ability to read arbitrary files on the underlying operating system, including sensitive system files.
CVE-2023-30502 1 Arubanetworks 1 Edgeconnect Enterprise 2024-08-02 7.2 High
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
CVE-2023-30503 1 Arubanetworks 1 Edgeconnect Enterprise 2024-08-02 7.2 High
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
CVE-2023-30504 1 Arubanetworks 1 Edgeconnect Enterprise 2024-08-02 7.2 High
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.