Page 3 of 58 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

A privilege escalation vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, could allow a local authenticated user to escalate its privilege to root using switch commands “supportlink”, “firmwaredownload”, “portcfgupload, license, and “fosexec”. Una vulnerabilidad de escalada de privilegios en Brocade Fabric OS CLI versiones anteriores a Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, podría permitir a un usuario local autenticado escalar su privilegio a root usando los comandos del switch "supportlink", "firmwaredownload", "portcfgupload, license, y "fosexec" • https://security.netapp.com/advisory/ntap-20230127-0007 https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2084 •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

An information disclosure vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, 7.4.2.j could allow a local authenticated attacker to read sensitive files using switch commands “configshow” and “supportlink”. Una vulnerabilidad de divulgación de información en Brocade Fabric OS CLI versiones anteriores a Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, 7.4.2.j, podría permitir a un atacante local autenticado leer archivos confidenciales usando los comandos del switch "configshow" y "supportlink" • https://security.netapp.com/advisory/ntap-20230127-0006 https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2083 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

A vulnerability in fab_seg.c.h libraries of all Brocade Fabric OS versions before Brocade Fabric OS v9.1.1, v9.0.1e, v8.2.3c, v8.2.0_cbn5, 7.4.2j could allow local authenticated attackers to exploit stack-based buffer overflows and execute arbitrary code as the root user account. Una vulnerabilidad en las bibliotecas fab_seg.c.h de todas las versiones de Brocade Fabric OS versiones anteriores a Brocade Fabric OS v9.1.1, v9.0.1e, v8.2.3c, v8.2.0_cbn5, 7.4.2j, podría permitir a atacantes locales autenticados explotar desbordamientos de búfer en la región stack de la memoria y ejecutar código arbitrario como cuenta de usuario root • https://security.netapp.com/advisory/ntap-20230127-0009 https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2080 • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

A vulnerability in Brocade Fabric OS CLI before Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5 could allow a local authenticated attacker to export out sensitive files with “seccryptocfg”, “configupload”. Una vulnerabilidad en Brocade Fabric OS CLI versiones anteriores a Brocade Fabric OS v9.1.0, 9.0.1e, 8.2.3c, 8.2.0cbn5, podría permitir a un atacante local autenticado exportar archivos confidenciales con "seccryptocfg", "configupload" • https://security.netapp.com/advisory/ntap-20230127-0005 https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2079 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Several commands in Brocade Fabric OS before Brocade Fabric OS v.9.0.1e, and v9.1.0 use unsafe string functions to process user input. Authenticated local attackers could abuse these vulnerabilities to exploit stack-based buffer overflows, allowing arbitrary code execution as the root user account. Varios comandos en Brocade Fabric OS versiones anteriores a Brocade Fabric OS v.9.0.1e, y v9.1.0, usan funciones de cadena no seguras para procesar la entrada del usuario. Los atacantes locales autenticados podrían abusar de estas vulnerabilidades para explotar los desbordamientos de búfer en la región stack de la memoria, permitiendo una ejecución de código arbitrario como la cuenta de usuario root • https://security.netapp.com/advisory/ntap-20230127-0010 https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2078 • CWE-787: Out-of-bounds Write •