Page 4 of 34 results (0.016 seconds)

CVSS: 8.1EPSS: 10%CPEs: 2EXPL: 1

A vulnerability in Brocade Network Advisor Versions before 14.3.1 could allow an unauthenticated, remote attacker to log in to the JBoss Administration interface of an affected system using an undocumented user credentials and install additional JEE applications. A remote unauthenticated user who has access to Network Advisor client libraries and able to decrypt the Jboss credentials could gain access to the Jboss web console. Una vulnerabilidad en Brocade Network Advisor Versions, en versiones anteriores a la 14.3.1, puede permitir a un usuario no autenticado iniciar sesión en la interfaz de JBoss Administration de un sistema afectado, utilizando las credenciales de un usuario no documentado e instalar aplicaciones JEE adicionales. Un usuario remoto no autenticado con acceso a librerías "Network Advisor" del cliente y capacitado para descifrar las credenciales de Jboss podría obtener acceso a la consola web de Jboss. • https://www.exploit-db.com/exploits/46887 http://packetstormsecurity.com/files/153035/Brocade-Network-Advisor-14.4.1-Unauthenticated-Remote-Code-Execution.html https://security.netapp.com/advisory/ntap-20190411-0005 https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-743 • CWE-255: Credentials Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

A Vulnerability in Brocade Network Advisor versions before 14.0.3 could allow a remote unauthenticated attacker to export the current user database which includes the encrypted (not hashed) password of the systems. The attacker could gain access to the Brocade Network Advisor System after extracting/decrypting the passwords. Una vulnerabilidad en Brocade Network Advisor, en versiones anteriores a la 14.0.3, podría permitir a un atacante remoto no autenticado exportar la base de datos del usuario actual que incluye las contraseñas cifradas (no hasheadas) de los sistemas. El atacante podría obtener acceso al sistema de Brocade Network Advisor después de extraer/descifrar las contraseñas. • https://security.netapp.com/advisory/ntap-20190411-0005 https://support.lenovo.com/us/en/product_security/LEN-25655 https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-745 •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

A Vulnerability in Brocade Network Advisor versions before 14.1.0 could allow a remote unauthenticated attacker to execute arbitray code. The vulnerability could also be exploited to execute arbitrary OS Commands. Una vulnerabilidad en Brocade Network Advisor, en versiones anteriores a la 14.1.0, podría permitir a un usuario remoto no autenticado ejecutar código arbitrario. La vulnerabilidad podría explotarse para ejecutar comandos arbitrarios del sistema operativo. • https://security.netapp.com/advisory/ntap-20190411-0005 https://support.lenovo.com/us/en/product_security/LEN-25655 https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-744 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.1EPSS: 0%CPEs: 6EXPL: 0

Cross-site scripting (XSS) vulnerability in the web-based management interface of Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) versions before 7.4.2b, 8.1.2 and 8.2.0 could allow remote attackers to execute arbitrary code or access sensitive browser-based information. Vulnerabilidad de Cross-Site Scripting (XSS) en la interfaz de gestión web de productos Brocade Fibre Channel SAN que ejecutan Brocade Fabric OS (FOS) en versiones anteriores a la 7.4.2b, 8.1.2 y la 8.2.0 podría permitir que los atacantes remotos ejecuten código arbitrario o accedan a información sensible del navegador. • https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03851en_us https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-525 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 8EXPL: 0

A vulnerability in the IPv6 stack on Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) versions before 7.4.2b, 8.1.2 and 8.2.0 could allow an attacker to cause a denial of service (CPU consumption and device hang) condition by sending crafted Router Advertisement (RA) messages to a targeted system. Una vulnerabilidad en la pila IPv6 de productos Brocade Fibre Channel SAN que ejecutan versiones de Brocade Fabric OS (FOS) anteriores a la 7.4.2b, 8.1.2 y 8.2.0 podría permitir que un atacante provoque una condición de denegación de servicio (consumo de CPU y bloqueo del dispositivo) enviando mensajes Router Advertisement (RA) manipulados a un sistema objetivo. • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-526 •