Page 6 of 47 results (0.003 seconds)

CVSS: 6.7EPSS: 0%CPEs: 5EXPL: 0

Brocade Fabric OS versions before v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g contain an improper input validation weakness in the command line interface when secccrypptocfg is invoked. The vulnerability could allow a local authenticated user to run arbitrary commands and perform escalation of privileges. Brocade Fabric OS versiones anteriores a v9.0.0, v8.2.2c, v8.2.1e, v8.1.2k, v8.2.0_CBN3, v7.4.2g, contienen una debilidad de comprobación inapropiada de la entrada en la interfaz de línea de comandos cuando es invocado secccrypptocfg. La vulnerabilidad podría permitir a un usuario autenticado local ejecutar comandos arbitrarios y llevar a cabo una escalada de privilegios • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1083 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Brocade Fabric OS versions before v9.0.0 and after version v8.1.0, configured in Virtual Fabric mode contain a weakness in the ldap implementation that could allow a remote ldap user to login in the Brocade Fibre Channel SAN switch with "user" privileges if it is not associated with any groups. Brocade Fabric OS versiones anteriores a v9.0.0 y posteriores a versión v8.1.0, configuradas en el modo Virtual Fabric contienen una debilidad en la implementación de ldap que podría permitir a un usuario de LDAP remoto iniciar sesión en el switch Brocade Fibre Channel SAN con privilegios de "user" si no está asociado con ningún grupo • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1158 •

CVSS: 9.8EPSS: 0%CPEs: 10EXPL: 0

Rest API in Brocade Fabric OS v8.2.1 through v8.2.1d, and 8.2.2 versions before v8.2.2c is vulnerable to multiple instances of reflected input. La API Rest en Brocade Fabric OS versiones v8.2.1 hasta v8.2.1d y versiones 8.2.2 anteriores a v8.2.2c, es vulnerable a múltiples instancias de entrada reflejada • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1084 •

CVSS: 9.8EPSS: 0%CPEs: 10EXPL: 0

Multiple buffer overflow vulnerabilities in REST API in Brocade Fabric OS versions v8.2.1 through v8.2.1d, and 8.2.2 versions before v8.2.2c could allow remote unauthenticated attackers to perform various attacks. Múltiples vulnerabilidades de desbordamiento de búfer en la API REST en Brocade Fabric OS versiones v8.2.1 hasta v8.2.1d, y versiones 8.2.2 anteriores a v8.2.2c, podrían permitir a atacantes remotos no autenticados llevar a cabo varios ataques • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1082 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

A vulnerability in the command-line interface in Brocade Fabric OS before Brocade Fabric OS v8.2.2a1, 8.2.2c, v7.4.2g, v8.2.0_CBN3, v8.2.1e, v8.1.2k, v9.0.0, could allow a local authenticated attacker to modify shell variables, which may lead to an escalation of privileges or bypassing the logging. Una vulnerabilidad en la interfaz de línea de comandos en Brocade Fabric OS antes de Brocade Fabric OS versiones v8.2.2a1, 8.2.2c, v7.4.2g, v8.2.0_CBN3, v8.2.1e, v8.1.2k, v9.0.0, podría permitir a un atacante autenticado local modificar las variables de shell, lo que puede conllevar a una escalada de privilegios o una omisión del registro • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1081 • CWE-913: Improper Control of Dynamically-Managed Code Resources •