var-202110-1632
Vulnerability from variot
A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x.x: 6.5.4.18 and below; Aruba Instant 8.5.x.x: 8.5.0.11 and below; Aruba Instant 8.6.x.x: 8.6.0.6 and below; Aruba Instant 8.7.x.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability. Provides the only Wi-Fi solution that is easy to set up.
Aruba Instant has a command injection vulnerability, which is caused by incorrect input validation in the web interface. Attackers use the vulnerability to send elaborate HTTP requests to the application and execute arbitrary OS commands on the target system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1632", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "aruba instant", "scope": "gte", "trust": 1.0, "vendor": "arubanetworks", "version": "8.6.0.0" }, { "model": "scalance w1750d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "8.7.1.3" }, { "model": "aruba instant", "scope": "lt", "trust": 1.0, "vendor": "arubanetworks", "version": "6.5.4.19" }, { "model": "aruba instant", "scope": "lt", "trust": 1.0, "vendor": "arubanetworks", "version": "8.7.1.1" }, { "model": "aruba instant", "scope": "gte", "trust": 1.0, "vendor": "arubanetworks", "version": "6.5.4.0" }, { "model": "aruba instant", "scope": "gte", "trust": 1.0, "vendor": "arubanetworks", "version": "6.4.0.2-4.1.0.0" }, { "model": "aruba instant", "scope": "lt", "trust": 1.0, "vendor": "arubanetworks", "version": "8.5.0.12" }, { "model": "aruba instant", "scope": "gte", "trust": 1.0, "vendor": "arubanetworks", "version": "8.7.0.0" }, { "model": "aruba instant", "scope": "lt", "trust": 1.0, "vendor": "arubanetworks", "version": "8.6.0.7" }, { "model": "aruba instant", "scope": "lt", "trust": 1.0, "vendor": "arubanetworks", "version": "6.4.4.8-4.2.4.18" }, { "model": "aruba instant", "scope": "gte", "trust": 1.0, "vendor": "arubanetworks", "version": "8.5.0.0" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.1" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.2" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.3" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.4" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.5" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.6" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.7" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.8" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.9" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.10" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.11" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.12" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.13" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.14" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.15" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.16" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.17" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.4.18" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.5.0.0" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.5.0.1" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.5.0.2" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.5.0.3" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.5.0.4" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.5.0.5" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.5.0.6" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.5.0.7" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.5.0.8" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.5.0.9" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.5.0.10" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.5.0.11" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.6.0.0" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.6.0.1" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.6.0.2" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.6.0.3" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.6.0.4" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.6.0.5" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.6.0.6" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.7.0.0" }, { "model": "instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.7.1.0" }, { "model": "networks aruba instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.7.x.x" }, { "model": "networks aruba instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.4.x.x" }, { "model": "networks aruba instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "6.5.x.x" }, { "model": "networks aruba instant", "scope": "eq", "trust": 0.6, "vendor": "aruba", "version": "8.6.x.x" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-89450" }, { "db": "NVD", "id": "CVE-2021-37732" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.4.4.8-4.2.4.18", "versionStartIncluding": "6.4.0.2-4.1.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.5.4.19", "versionStartIncluding": "6.5.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.5.0.12", "versionStartIncluding": "8.5.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.6.0.7", "versionStartIncluding": "8.6.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.7.1.1", "versionStartIncluding": "8.7.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.7.1.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37732" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-412" } ], "trust": 0.6 }, "cve": "CVE-2021-37732", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2021-89450", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2021-37732", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37732", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2021-89450", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-412", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-37732", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-89450" }, { "db": "VULMON", "id": "CVE-2021-37732" }, { "db": "NVD", "id": "CVE-2021-37732" }, { "db": "CNNVD", "id": "CNNVD-202110-412" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x.x: 6.5.4.18 and below; Aruba Instant 8.5.x.x: 8.5.0.11 and below; Aruba Instant 8.6.x.x: 8.6.0.6 and below; Aruba Instant 8.7.x.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability. Provides the only Wi-Fi solution that is easy to set up. \n\r\n\r\nAruba Instant has a command injection vulnerability, which is caused by incorrect input validation in the web interface. Attackers use the vulnerability to send elaborate HTTP requests to the application and execute arbitrary OS commands on the target system", "sources": [ { "db": "NVD", "id": "CVE-2021-37732" }, { "db": "CNVD", "id": "CNVD-2021-89450" }, { "db": "VULMON", "id": "CVE-2021-37732" } ], "trust": 1.53 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37732", "trust": 2.3 }, { "db": "SIEMENS", "id": "SSA-917476", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-21-315-06", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2021-89450", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021111004", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021100720", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3874", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202110-412", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-37732", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-89450" }, { "db": "VULMON", "id": "CVE-2021-37732" }, { "db": "NVD", "id": "CVE-2021-37732" }, { "db": "CNNVD", "id": "CNNVD-202110-412" } ] }, "id": "VAR-202110-1632", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-89450" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-89450" } ] }, "last_update_date": "2023-12-18T10:57:05.198000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Aruba Instant command injection vulnerability (CNVD-2021-89450)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/300081" }, { "title": "Aruba Instant Fixes for operating system command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=166190" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=3a4aac694122a77f4f689c8a03f6ae75" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-89450" }, { "db": "VULMON", "id": "CVE-2021-37732" }, { "db": "CNNVD", "id": "CNNVD-202110-412" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37732" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.arubanetworks.com/assets/alert/aruba-psa-2021-017.txt" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37732" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021111004" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3874" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-315-06" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021100720" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/78.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-06" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-89450" }, { "db": "VULMON", "id": "CVE-2021-37732" }, { "db": "NVD", "id": "CVE-2021-37732" }, { "db": "CNNVD", "id": "CNNVD-202110-412" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-89450" }, { "db": "VULMON", "id": "CVE-2021-37732" }, { "db": "NVD", "id": "CVE-2021-37732" }, { "db": "CNNVD", "id": "CNNVD-202110-412" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-20T00:00:00", "db": "CNVD", "id": "CNVD-2021-89450" }, { "date": "2021-10-12T00:00:00", "db": "VULMON", "id": "CVE-2021-37732" }, { "date": "2021-10-12T16:15:07.423000", "db": "NVD", "id": "CVE-2021-37732" }, { "date": "2021-10-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-412" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-20T00:00:00", "db": "CNVD", "id": "CNVD-2021-89450" }, { "date": "2021-11-24T00:00:00", "db": "VULMON", "id": "CVE-2021-37732" }, { "date": "2021-11-24T21:37:33.660000", "db": "NVD", "id": "CVE-2021-37732" }, { "date": "2021-11-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-412" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-412" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Aruba Instant command injection vulnerability (CNVD-2021-89450)", "sources": [ { "db": "CNVD", "id": "CNVD-2021-89450" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-412" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.