Page 7 of 33 results (0.012 seconds)

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected versions, non-root users can gain root access with a combination of shell commands and parameters. Una vulnerabilidad de escalamiento de privilegios en los productos de Brocade Fibre Channel SAN que ejecutan Brocade Fabric OS (FOS) versiones anteriores a 7.4.1d y 8.0.1b, podría permitir a un atacante autenticado elevar los privilegios de las cuentas de usuario que acceden al sistema por medio de la interfaz de línea de comandos. En versiones afectadas, los usuarios no root pueden conseguir acceso root con una combinación de comandos y parámetros de shell. • http://www.securityfocus.com/bid/98332 http://www.securitytracker.com/id/1038401 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03739en_us https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-208 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

HPE FOS before 7.4.1d and 8.x before 8.0.1 on StoreFabric B switches allows remote attackers to obtain sensitive information via unspecified vectors. HPE FOS en versiones anteriores a 7.4.1d y 8.x en versiones anteriores a 8.0.1 en interruptores StoreFabric B permite a atacantes remotos obtener información sensible a través de vectores no especificados. • http://www.securityfocus.com/bid/92480 https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05236212 • CWE-254: 7PK - Security Features •

CVSS: 5.0EPSS: 1%CPEs: 17EXPL: 0

Engenio/LSI Logic storage controllers, as used in products such as Storagetek D280, and IBM DS4100 (formerly FastT 100) and Brocade SilkWorm Switches, allow remote attackers to cause a denial of service (freeze and possible data corruption) via crafted TCP packets. • http://marc.info/?l=bugtraq&m=109435831811484&w=2 http://secunia.com/advisories/12464 http://www.securityfocus.com/bid/11108 https://exchange.xforce.ibmcloud.com/vulnerabilities/17290 •