U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:a:hp:airwave:8.0.3.0:*:*:*:*:*:*:*
  • CPE Name Search: true
There are 6 matching records.
Displaying matches 1 through 6.
Vuln ID Summary CVSS Severity
CVE-2015-2202

Aruba AirWave before 7.7.14.2 and 8.x before 8.0.7 allows administrative users to escalate privileges to root on the underlying OS.

Published: September 05, 2023; 2:15:08 PM -0400
V3.1: 7.2 HIGH
V2.0:(not available)
CVE-2015-2201

Aruba AirWave before 7.7.14.2 and 8.x before 8.0.7 allows VisualRF remote OS command execution and file disclosure by administrative users.

Published: September 05, 2023; 2:15:08 PM -0400
V3.1: 7.2 HIGH
V2.0:(not available)
CVE-2015-1391

Aruba AirWave before 8.0.7 allows bypass of a CSRF protection mechanism.

Published: September 05, 2023; 2:15:07 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2015-1390

Aruba AirWave before 8.0.7 allows XSS attacks agsinat an administrator.

Published: September 05, 2023; 2:15:07 PM -0400
V3.1: 6.1 MEDIUM
V2.0:(not available)
CVE-2016-8527

Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to a reflected cross-site scripting (XSS). The vulnerability is present in the VisualRF component of AirWave. By exploiting this vulnerability, an attacker who can trick a logged-in AirWave administrative user into clicking a link could obtain sensitive information, such as session cookies or passwords. The vulnerability requires that an administrative users click on the malicious link while currently logged into AirWave in the same browser.

Published: August 06, 2018; 4:29:00 PM -0400
V3.0: 6.1 MEDIUM
V2.0: 4.3 MEDIUM
CVE-2016-8526

Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to an XML external entities (XXE). XXEs are a way to permit XML parsers to access storage that exist on external systems. If an unprivileged user is permitted to control the contents of XML files, XXE can be used as an attack vector. Because the XML parser has access to the local filesystem and runs with the permissions of the web server, it can access any file that is readable by the web server and copy it to an external system of the attacker's choosing. This could include files that contain passwords, which could then lead to privilege escalation.

Published: August 06, 2018; 4:29:00 PM -0400
V3.0: 8.8 HIGH
V2.0: 4.0 MEDIUM