mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 13:36:56 +00:00
418 lines
17 KiB
JSON
418 lines
17 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2022-37888",
|
||
|
"sourceIdentifier": "security-alert@hpe.com",
|
||
|
"published": "2022-10-06T18:16:05.287",
|
||
|
"lastModified": "2022-12-12T21:25:25.587",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Se presentan vulnerabilidades de desbordamiento de b\u00fafer en m\u00faltiples servicios subyacentes que podr\u00edan conllevar a una ejecuci\u00f3n de c\u00f3digo remoto no autenticado mediante el env\u00edo de paquetes especialmente dise\u00f1ados destinados al puerto UDP de PAPI (protocolo de gesti\u00f3n de AP de Aruba Networks) (8211). Una explotaci\u00f3n con \u00e9xito de estas vulnerabilidades resulta en la capacidad de ejecutar c\u00f3digo arbitrario como un usuario privilegiado en el sistema operativo subyacente de Aruba InstantOS versiones 6.4.x: 6.4.4.8-4.2.4.20 y anteriores; Aruba InstantOS 6.5.x: 6.5.4.23 y anteriores; Aruba InstantOS 8. 6.x: 8.6.0.18 y anteriores; Aruba InstantOS 8.7.x: 8.7.1.9 y anteriores; Aruba InstantOS 8.10.x: 8.10.0.1 y anteriores; ArubaOS 10.3.x: 10.3.1.0 y anteriores; Aruba ha publicado actualizaciones para Aruba InnstantOS que abordan estas vulnerabilidades de seguridad"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "HIGH",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 9.8,
|
||
|
"baseSeverity": "CRITICAL"
|
||
|
},
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 5.9
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-120"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "10.3.0.0",
|
||
|
"versionEndExcluding": "10.3.1.1",
|
||
|
"matchCriteriaId": "F1B6376E-424F-4DBF-B00D-69C52E4B3E46"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.4.0.0",
|
||
|
"versionEndExcluding": "6.4.4.8-4.2.4.21",
|
||
|
"matchCriteriaId": "D27F5A7C-442F-45A6-A149-2037042A1629"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "6.5.0.0",
|
||
|
"versionEndExcluding": "6.5.4.24",
|
||
|
"matchCriteriaId": "6A33DE52-E905-4EBD-BA56-1DC67B7DD9FD"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "8.6.0.0",
|
||
|
"versionEndExcluding": "8.6.0.19",
|
||
|
"matchCriteriaId": "081502CC-38D4-46F9-85D0-3D1F701D5EE4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "8.7.0.0",
|
||
|
"versionEndExcluding": "8.7.1.10",
|
||
|
"matchCriteriaId": "BEA3846D-54C5-4B92-86B6-6AC482C2B357"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "8.10.0.0",
|
||
|
"versionEndExcluding": "8.10.0.2",
|
||
|
"matchCriteriaId": "B32D91E1-3034-4E05-8FBA-98EF4562F3FE"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-103:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3F45B3C8-D048-4EA8-83DF-F99BDB88894C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-114:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "AF896539-EC3B-4DA0-B955-08E9C7E897EC"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-115:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "45DC40C9-6EF5-4CE9-A74D-A042598899DF"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-120:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DBEC8F63-AFAF-4C28-81B4-DBEDC3B01339"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-121:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DF600978-50DE-4534-8063-F064BC68AC1E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-130:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F8D34B3C-71E2-44D2-AFC0-253A7B62C386"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-135:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "559619E9-DE70-4259-8F79-23CC5ACF6C5A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-204:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "16277CC2-2A9A-44D3-8BC2-C77BE2435D1F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-205:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "50B5B834-3443-4EA0-98F1-809917EF6904"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-207:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "198EA730-8E4F-4AF0-ACA2-39B6BC266422"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-214:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5E897029-8910-4D9B-841E-21B94ACC66DC"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-215:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A6A62E7C-5B33-461F-B92F-9E4E765A84A1"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-224:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DFE6FCBF-87BD-484B-BA0B-464DD7666F1A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-225:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "88193D54-C8F9-48BC-8541-E0FDECE57828"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-303:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F5F7C91F-FA10-426A-BD14-098F0D06B636"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-304:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "BC166340-BF92-447F-9468-AFB658B7FC3C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-305:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "6BB70364-2497-487D-AA82-7139B7BA81D4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-314:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0EA5831B-74AC-4189-87F8-18BC170AC10F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-315:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DAAA199F-9D74-4122-855B-1044C27B84A8"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-318:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B1070A64-2765-4F43-97DE-FD24B08CB802"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-324:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C7F50F4A-80C7-4A32-90F1-C5838ADFE8F2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-325:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "88F1C511-B9F7-4499-B33C-8B3D7551537B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-334:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "788F8BF1-1AA0-4BB9-BE5E-60575A5ED054"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-340:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "9725F571-C957-44C7-9ECB-58D888315AA6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-370:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "BDC18D01-F71E-4200-A585-AB8EDA66F00E"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-504:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5E235F24-7AAB-49A0-81DA-E3B03290CD45"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-505:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "1CB66E34-16CC-4CF4-A544-EC7C1BF47386"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-514:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "71D51F66-864C-4EEE-BC9D-5DC6E3D54D4B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-515:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "BB5C706F-F87B-4DF7-A85C-54A5229183C0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-534:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D2E4D103-8A2F-4CC9-B51C-0D4AB5F97261"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-535:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F96A1322-03A5-461C-A5A1-2102852A719D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-555:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "50F8A98B-6D70-4C8A-9379-FC66B10BAFD0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-635:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "B0219C4A-855C-4CCC-9C56-499697A91B94"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:ap-655:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "D18C831D-4D5C-4A50-8101-2CFB3D1B5210"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-103:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "56700415-4944-4364-B010-213B06526062"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-114:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "71A1AEEA-F680-4A04-93AD-B232E0E95C5D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-115:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A1BD77D5-A2E1-4AFF-AF1B-0D010DC85287"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-204:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "00E43247-386E-42EE-A5E0-F4857B59AE85"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-205:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "5E3E815C-64FF-4D1D-A029-C0257CE71740"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-207:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C5BF805A-B08D-4728-A0A2-9FC00F5AADAF"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-224:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0E75FEF6-1D57-4689-BFB5-32E390A01798"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-225:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "994278AA-D708-4A75-AE67-F67A16D1A586"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-304:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "4D1C5D34-AD4A-4994-9E53-0F062304F2EC"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-305:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "10D1E253-FAA4-42CC-8105-4D0502C85E01"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-314:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C8E4ED7F-62B7-4BB1-BE92-0CC0C7DBCD96"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-315:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "851E2D25-705C-4F51-A990-246C2E4D8F58"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-318:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E128A41C-307F-4A1D-B263-E4150059B76F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-324:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C4842D72-E733-4166-9604-4AEA6CC2E892"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-325:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "32EEA27C-3219-4D02-B2D3-973D0DAF0914"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:iap-334:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "12B5F287-EEB8-4C33-99D2-520E217D800C"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:rap-108:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7069C938-C883-4533-B043-53721566398A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:rap-109:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "4E9AA606-14EE-48DC-BE12-1A0807DFB1E2"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "065280B2-6EC1-4721-B3D7-EDE44ED4F5BD"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FBC30055-239F-4BB1-B2D1-E5E35F0D8911"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf",
|
||
|
"source": "security-alert@hpe.com",
|
||
|
"tags": [
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-014.txt",
|
||
|
"source": "security-alert@hpe.com",
|
||
|
"tags": [
|
||
|
"Mailing List",
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|