11 results (0.005 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Missing Authorization vulnerability in Aruba.It Aruba HiSpeed Cache allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Aruba HiSpeed Cache: from n/a through 2.0.12. The Aruba HiSpeed Cache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ahsc_tool_bar_purge() function in versions up to, and including, 2.0.12. This makes it possible for authenticated attackers, with subscriber-level access and above, to purge cache. • https://patchstack.com/database/vulnerability/aruba-hispeed-cache/wordpress-aruba-hispeed-cache-plugin-2-0-12-broken-access-control-vulnerability?_s_id=cve • CWE-862: Missing Authorization •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Aruba.It Aruba HiSpeed Cache.This issue affects Aruba HiSpeed Cache: from n/a through 2.0.6. Exposición de información confidencial a una vulnerabilidad de actor no autorizado en Aruba.It Aruba HiSpeed Cache. Este problema afecta a Aruba HiSpeed Cache: desde n/a hasta 2.0.6. The Aruba HiSpeed Cache plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0.6 via the plugin's log file. This makes it possible for unauthenticated attackers to extract sensitive data including debug and trace information. • https://patchstack.com/database/vulnerability/aruba-hispeed-cache/wordpress-aruba-hispeed-cache-plugin-2-0-6-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

A remote denial of service (DoS) vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x: 6.5.4.18 and below; Aruba Instant 8.3.x: 8.3.0.14 and below; Aruba Instant 8.4.x: All versions; Aruba Instant 8.5.x: 8.5.0.11 and below; Aruba Instant 8.6.x: 8.6.0.7 and below; Aruba Instant 8.7.x: 8.7.1.1 and below. Aruba has released patches for Aruba Instant that address this security vulnerability. Se ha detectado una vulnerabilidad de denegación de servicio (DoS) remota en algunos productos Aruba Instant Access Point (IAP) en versiones: Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 y posteriores; Aruba Instant 6.5.x: 6.5.4.18 y posteriores; Aruba Instant 8.3.x: 8.3.0.14 y posteriores; Aruba Instant 8.4.x: Todas las versiones; Aruba Instant 8.5.x: 8.5.0.11 e inferior; Aruba Instant 8.6.x: 8.6.0.7 e inferior; Aruba Instant 8.7.x: 8.7.1.1 e inferior. Aruba ha publicado parches para Aruba Instant que solucionan esta vulnerabilidad de seguridad • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt •

CVSS: 6.1EPSS: 0%CPEs: 5EXPL: 0

A remote cross-site scripting (XSS) vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.13 and below; Aruba Instant 6.5.x: 6.5.4.13 and below; Aruba Instant 8.3.x: 8.3.0.7 and below; Aruba Instant 8.4.x: 8.4.0.5 and below; Aruba Instant 8.5.x: 8.5.0.0 and below. Aruba has released patches for Aruba Instant that address this security vulnerability. Se ha detectado una vulnerabilidad de tipo cross-site scripting (XSS) remotos en algunos productos Aruba Instant Access Point (IAP) en versiones: Aruba Instant 6.4.x: 6.4.4.8-4.2.4.13 y posteriores; Aruba Instant 6.5.x: 6.5.4.13 y posteriores; Aruba Instant 8.3.x: 8.3.0.7 y posteriores; Aruba Instant 8.4.x: 8.4.0.5 y posteriores; Aruba Instant 8.5.x: 8.5.0.0 y posteriores. Aruba ha publicado parches para Aruba Instant que solucionan esta vulnerabilidad de seguridad • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 2%CPEs: 18EXPL: 0

Aruba Mobility Controller 2.4.8.x-FIPS, 2.5.x, 3.1.x, 3.2.x, 3.3.1.x, and 3.3.2.x allows remote attackers to cause a denial of service (device crash) via a malformed Extensible Authentication Protocol (EAP) frame. Aruba Mobility Controller v2.4.8.x-FIPS, v2.5.x, v3.1.x, v3.2.x, v3.3.1.x, y v3.3.2.x permite a atacantes remotos provocar una denegación de servicio (caída del dispositivo) mediante una trama deformada del protocolo de autenticación extensible (EAP - Extensible Authentication Protocol). • http://secunia.com/advisories/33057 http://securityreason.com/securityalert/4728 http://www.arubanetworks.com/support/alerts/aid-12808.asc http://www.securityfocus.com/archive/1/499014/100/0/threaded http://www.securityfocus.com/bid/32694 http://www.securitytracker.com/id?1021362 • CWE-399: Resource Management Errors •