Filtered by vendor Arubanetworks Subscriptions
Filtered by product Edgeconnect Enterprise Subscriptions
Total 25 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-30505 1 Arubanetworks 1 Edgeconnect Enterprise 2023-07-07 8.8 High
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
CVE-2023-30504 1 Arubanetworks 1 Edgeconnect Enterprise 2023-07-07 8.8 High
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
CVE-2023-30503 1 Arubanetworks 1 Edgeconnect Enterprise 2023-07-07 8.8 High
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
CVE-2023-30502 1 Arubanetworks 1 Edgeconnect Enterprise 2023-07-07 8.8 High
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
CVE-2023-30501 1 Arubanetworks 1 Edgeconnect Enterprise 2023-07-07 8.8 High
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.