5 results (0.009 seconds)

CVSS: 7.8EPSS: 2%CPEs: 18EXPL: 0

Aruba Mobility Controller 2.4.8.x-FIPS, 2.5.x, 3.1.x, 3.2.x, 3.3.1.x, and 3.3.2.x allows remote attackers to cause a denial of service (device crash) via a malformed Extensible Authentication Protocol (EAP) frame. Aruba Mobility Controller v2.4.8.x-FIPS, v2.5.x, v3.1.x, v3.2.x, v3.3.1.x, y v3.3.2.x permite a atacantes remotos provocar una denegación de servicio (caída del dispositivo) mediante una trama deformada del protocolo de autenticación extensible (EAP - Extensible Authentication Protocol). • http://secunia.com/advisories/33057 http://securityreason.com/securityalert/4728 http://www.arubanetworks.com/support/alerts/aid-12808.asc http://www.securityfocus.com/archive/1/499014/100/0/threaded http://www.securityfocus.com/bid/32694 http://www.securitytracker.com/id?1021362 • CWE-399: Resource Management Errors •

CVSS: 4.3EPSS: 0%CPEs: 7EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in the web interface in Aruba Mobility Controller 2.4.8.x-FIPS, 2.5.5.x, 2.5.6.x, 3.1.1.x, 3.2.0.x, and 3.3.1.x allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en la interfaz web de Aruba Mobility Controller versiones 2.4.8.x-FIPS, 2.5.5.x, 2.5.6.x, 3.1.1.x, 3.2.0.x y 3.3.1.x, permite a atacantes remotos inyectar script web o HTML arbitrarios por medio de vectores no especificados. • http://secunia.com/advisories/30262 http://www.arubanetworks.com/support/alerts/aid-051408.asc http://www.securityfocus.com/archive/1/492113/100/0/threaded http://www.securityfocus.com/bid/29240 http://www.securitytracker.com/id?1020033 https://exchange.xforce.ibmcloud.com/vulnerabilities/42433 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

Cross-site scripting (XSS) vulnerability in the login CGI program in Aruba Mobility Controller 2.5.4.18 and earlier, and 2.4.8.6-FIPS and earlier FIPS versions, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el programa CGI de autenticación del Aruba Mobility Controller 2.5.4.18 y versiones anteriores y en el 2.4.8.6-FIPS y versiones FIPS anteriores, permite a atacantes remotos la inyección de secuencias de comandos web o HTML de su elección a través de vectores sin especificar. • http://osvdb.org/36469 http://secunia.com/advisories/26192 http://www.arubanetworks.com/support/alerts/aid-070907b.asc http://www.kb.cert.org/vuls/id/680449 http://www.securityfocus.com/bid/25059 http://www.securitytracker.com/id?1018457 http://www.vupen.com/english/advisories/2007/2646 https://exchange.xforce.ibmcloud.com/vulnerabilities/35605 •

CVSS: 7.5EPSS: 22%CPEs: 6EXPL: 0

Heap-based buffer overflow in the management interfaces in (1) Aruba Mobility Controllers 200, 800, 2400, and 6000 and (2) Alcatel-Lucent OmniAccess Wireless 43xx and 6000 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via long credential strings. Un desbordamiento de búfer en la región heap de la memoria en las interfaces de administración de (1) Aruba Mobility Controllers 200, 800, 2400 y 6000 y (2) Alcatel-Lucent OmniAccess Wireless 43xx y 6000 permite a los atacantes remotos causar una denegación de servicio (bloqueo del proceso) y posiblemente ejecutar código arbitrario por medio de largas cadenas de credenciales. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052380.html http://osvdb.org/33184 http://secunia.com/advisories/24144 http://securityreason.com/securityalert/2244 http://www.kb.cert.org/vuls/id/319913 http://www.securityfocus.com/archive/1/459928/100/0/threaded http://www.securityfocus.com/bid/22538 https://exchange.xforce.ibmcloud.com/vulnerabilities/32459 •

CVSS: 7.5EPSS: 3%CPEs: 6EXPL: 0

The (1) Aruba Mobility Controllers 200, 600, 2400, and 6000 and (2) Alcatel-Lucent OmniAccess Wireless 43xx and 6000 do not properly implement authentication and privilege assignment for the guest account, which allows remote attackers to access administrative interfaces or the WLAN. Los (1) controladores Aruba Mobility versiones 200, 600, 2400 y 6000 y (2) Alcatel-Lucent OmniAccess Wireless versiones 43xx y 6000 implementan de manera inapropiada la autenticación y la asignación de privilegios para la cuenta del invitado, lo que permite a los atacantes remotos acceder a interfaces administrativas o a la WLAN. Multiple vulnerabilities were identified in Aruba AP, IAP and AMP devices. The vulnerabilities were discovered during a black box security assessment and therefore the vulnerability list should not be considered exhaustive. Several of the high severity vulnerabilities listed in this report are related to the Aruba proprietary PAPI protocol and allow remote compromise of affected devices. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052382.html http://osvdb.org/33185 http://secunia.com/advisories/24144 http://securityreason.com/securityalert/2243 http://www.kb.cert.org/vuls/id/613833 http://www.securityfocus.com/archive/1/459927/100/0/threaded http://www.securityfocus.com/bid/22538 https://exchange.xforce.ibmcloud.com/vulnerabilities/32461 • CWE-264: Permissions, Privileges, and Access Controls •