6.1
CVE-2023-35978
- EPSS 0.14%
- Veröffentlicht 05.07.2023 15:15:09
- Zuletzt bearbeitet 21.11.2024 08:09:05
- Quelle security-alert@hpe.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in ArubaOS could allow an unauthenticated remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Arubanetworks ≫ Arubaos Version >= 6.5.4.0 < 8.6.0.21
Arubanetworks ≫ Mc-va-10 Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Arubanetworks ≫ Arubaos Version >= 8.7.0.0 < 8.10.0.7
Arubanetworks ≫ Mc-va-10 Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Arubanetworks ≫ Arubaos Version >= 8.11.0.0 < 8.11.1.1
Arubanetworks ≫ Mc-va-10 Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Arubanetworks ≫ Arubaos Version >= 10.4.0.0 < 10.4.0.2
Arubanetworks ≫ Mc-va-10 Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.14% | 0.347 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
security-alert@hpe.com | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.