Page 5 of 34 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 19EXPL: 0

Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module. Comprobación errónea de condiciones inusuales o excepcionales en Brocade NetIron 05.8.00 y versiones posteriores hasta la versión 06.1.00 inclusive. Cuando el módulo de gestión se escanea continuamente en el puerto 22, puede permitir a los atacantes provocar una denegación de servicio (bloqueo y reinicio) del módulo de gestión. • http://www.securitytracker.com/id/1038402 https://www.brocade.com/content/dam/common/documents/content-types/security-bulletin/brocade-security-advisory-2017-315.htm • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 9.4EPSS: 49%CPEs: 1EXPL: 0

A Directory Traversal vulnerability in servlet SoftwareImageUpload in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to write to arbitrary files, and consequently delete the files. Una vulnerabilidad de salto de directorio en el servlet SoftwareImageUpload en las versiones Brocade Network Advisor liberadas anteriormente e incluyendo a la 14.0.2 podrían permitir a atacantes remotos escribir archivos arbitrarios, y consecuentemente eliminar los archivos. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Brocade Network Advisor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SoftwareImageUpload servlet. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. • http://www.securityfocus.com/bid/95692 http://www.zerodayinitiative.com/advisories/ZDI-17-051 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-179 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 95%CPEs: 1EXPL: 0

A Directory Traversal vulnerability in CliMonitorReportServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to read arbitrary files including files with sensitive user information. Una vulnerabilidad de salto de directorio en CliMonitorReportServlet en las versiones Brocade Network Advisor liberadas anteriormente e incluyendo a la 14.0.2 podrían permitir a atacantes remotos leer archivos arbitrarios incluyendo archivos con información de usuario sensible. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Brocade Network Advisor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CliMonitorReportsServlet servlet. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. • http://www.securityfocus.com/bid/95691 http://www.zerodayinitiative.com/advisories/ZDI-17-052 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-180 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.0EPSS: 0%CPEs: 1EXPL: 0

A CSRF vulnerability in Brocade Virtual Traffic Manager versions released prior to and including 11.0 could allow an attacker to trick a logged-in user into making administrative changes on the traffic manager cluster. Una vulnerabilidad CSRF en versiones Brocade Virtual Traffic Manager publicadas anteriormente e incluyendo a la 11.0 podrían permitir a un atacante engañar a un usuario conectado para que realice cambios administrativos en el clúster del gestor de tráfico. • http://www.securityfocus.com/bid/95930 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43681 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44114 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005 https://www.kb.cert.org/vuls/id/192371 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 10.0EPSS: 15%CPEs: 1EXPL: 0

A Directory Traversal vulnerability in DashboardFileReceiveServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to upload a malicious file in a section of the file system where it can be executed. Una vulnerabilidad de salto de directorio en DashboardFileReceiveServlet en las versiones Brocade Network Advisor liberadas anteriormente e incluyendo la 14.0.2 podrían permitir a atacantes remotos cargar un archivo malicioso en una sección del sistema de archivos donde puede ser ejecutado. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Brocade Network Advisor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DashboardFileReceiveServlet servlet. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. • http://www.securityfocus.com/bid/95694 http://www.zerodayinitiative.com/advisories/ZDI-17-050 https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03785en_us https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-178 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •