HP AirWave 8.0.6.3

CPE Details

HP AirWave 8.0.6.3
8.0.6.3
2019-09-17
11h55 +00:00
2019-09-17
11h55 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:hp:airwave:8.0.6.3:*:*:*:*:*:*:*

Informations

Vendor

hp

Product

airwave

Version

8.0.6.3

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2015-1390 2023-09-04 22h00 +00:00 Aruba AirWave before 8.0.7 allows XSS attacks agsinat an administrator.
6.1
Moyen
CVE-2015-1391 2023-09-04 22h00 +00:00 Aruba AirWave before 8.0.7 allows bypass of a CSRF protection mechanism.
8.8
Haute
CVE-2015-2201 2023-09-04 22h00 +00:00 Aruba AirWave before 7.7.14.2 and 8.x before 8.0.7 allows VisualRF remote OS command execution and file disclosure by administrative users.
7.2
Haute
CVE-2015-2202 2023-09-04 22h00 +00:00 Aruba AirWave before 7.7.14.2 and 8.x before 8.0.7 allows administrative users to escalate privileges to root on the underlying OS.
7.2
Haute
CVE-2016-8526 2018-08-06 18h00 +00:00 Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to an XML external entities (XXE). XXEs are a way to permit XML parsers to access storage that exist on external systems. If an unprivileged user is permitted to control the contents of XML files, XXE can be used as an attack vector. Because the XML parser has access to the local filesystem and runs with the permissions of the web server, it can access any file that is readable by the web server and copy it to an external system of the attacker's choosing. This could include files that contain passwords, which could then lead to privilege escalation.
8.8
Haute
CVE-2016-8527 2018-08-06 18h00 +00:00 Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to a reflected cross-site scripting (XSS). The vulnerability is present in the VisualRF component of AirWave. By exploiting this vulnerability, an attacker who can trick a logged-in AirWave administrative user into clicking a link could obtain sensitive information, such as session cookies or passwords. The vulnerability requires that an administrative users click on the malicious link while currently logged into AirWave in the same browser.
6.1
Moyen