Page 4 of 31 results (0.002 seconds)

CVSS: 6.5EPSS: 0%CPEs: 8EXPL: 0

A vulnerability in the IPv6 stack on Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) versions before 7.4.2b, 8.1.2 and 8.2.0 could allow an attacker to cause a denial of service (CPU consumption and device hang) condition by sending crafted Router Advertisement (RA) messages to a targeted system. Una vulnerabilidad en la pila IPv6 de productos Brocade Fibre Channel SAN que ejecutan versiones de Brocade Fabric OS (FOS) anteriores a la 7.4.2b, 8.1.2 y 8.2.0 podría permitir que un atacante provoque una condición de denegación de servicio (consumo de CPU y bloqueo del dispositivo) enviando mensajes Router Advertisement (RA) manipulados a un sistema objetivo. • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-526 •

CVSS: 6.1EPSS: 0%CPEs: 6EXPL: 0

Cross-site scripting (XSS) vulnerability in the web-based management interface of Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) versions before 7.4.2b, 8.1.2 and 8.2.0 could allow remote attackers to execute arbitrary code or access sensitive browser-based information. Vulnerabilidad de Cross-Site Scripting (XSS) en la interfaz de gestión web de productos Brocade Fibre Channel SAN que ejecutan Brocade Fabric OS (FOS) en versiones anteriores a la 7.4.2b, 8.1.2 y la 8.2.0 podría permitir que los atacantes remotos ejecuten código arbitrario o accedan a información sensible del navegador. • https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03851en_us https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-525 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 19EXPL: 0

Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module. Comprobación errónea de condiciones inusuales o excepcionales en Brocade NetIron 05.8.00 y versiones posteriores hasta la versión 06.1.00 inclusive. Cuando el módulo de gestión se escanea continuamente en el puerto 22, puede permitir a los atacantes provocar una denegación de servicio (bloqueo y reinicio) del módulo de gestión. • http://www.securitytracker.com/id/1038402 https://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-315.htm • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 8.0EPSS: 0%CPEs: 1EXPL: 0

A CSRF vulnerability in Brocade Virtual Traffic Manager versions released prior to and including 11.0 could allow an attacker to trick a logged-in user into making administrative changes on the traffic manager cluster. Una vulnerabilidad CSRF en versiones Brocade Virtual Traffic Manager publicadas anteriormente e incluyendo a la 11.0 podrían permitir a un atacante engañar a un usuario conectado para que realice cambios administrativos en el clúster del gestor de tráfico. • http://www.securityfocus.com/bid/95930 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43681 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44114 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005 https://www.kb.cert.org/vuls/id/192371 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 10.0EPSS: 15%CPEs: 1EXPL: 0

A Directory Traversal vulnerability in DashboardFileReceiveServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to upload a malicious file in a section of the file system where it can be executed. Una vulnerabilidad de salto de directorio en DashboardFileReceiveServlet en las versiones Brocade Network Advisor liberadas anteriormente e incluyendo la 14.0.2 podrían permitir a atacantes remotos cargar un archivo malicioso en una sección del sistema de archivos donde puede ser ejecutado. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Brocade Network Advisor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DashboardFileReceiveServlet servlet. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. • http://www.securityfocus.com/bid/95694 http://www.zerodayinitiative.com/advisories/ZDI-17-050 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-178 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •