14 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

27 Jun 2022 — In Brocade SANnav before Brocade SANnav v2.2.0.2 and Brocade SANnav2.1.1.8, encoded scp-server passwords are stored using Base64 encoding, which could allow an attacker able to access log files to easily decode the passwords. En Brocade SANnav versiones anteriores a Brocade SANnav versión 2.2.0.2 y Brocade SANnav versión 2.1.1.8, las contraseñas codificadas del servidor scp son almacenadas usando codificación Base64, lo que podría permitir a un atacante capaz de acceder a los archivos de registro descifrar ... • https://security.netapp.com/advisory/ntap-20220627-0003 • CWE-922: Insecure Storage of Sensitive Information •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

27 Jun 2022 — Brocade SANnav before Brocade SANvav v. 2.2.0.2 and Brocade SANanv v.2.1.1.8 logs the Brocade Fabric OS switch password in plain text in asyncjobscheduler-manager.log Brocade SANnav versiones anteriores a Brocade SANvav versión 2.2.0.2 y Brocade SANanv versión 2.1.1.8, registra la contraseña del conmutador Brocade Fabric OS en texto plano en el archivo asyncjobscheduler-manager.log • https://security.netapp.com/advisory/ntap-20220627-0002 • CWE-522: Insufficiently Protected Credentials •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

27 Jun 2022 — In Brocade SANnav version before SANN2.2.0.2 and Brocade SANNav before 2.1.1.8, the implementation of TLS/SSL Server Supports the Use of Static Key Ciphers (ssl-static-key-ciphers) on ports 443 & 18082. En Brocade SANnav versiones anteriores a SANN2.2.0.2 y Brocade SANNav versiones anteriores a 2.1.1.8, la implementación del servidor TLS/SSL admite el uso de cifrados de clave estática (ssl-static-key-ciphers) en los puertos 443 y 18082 • https://security.netapp.com/advisory/ntap-20220627-0001 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

09 May 2022 — An information exposure through log file vulnerability in Brocade SANNav versions before Brocade SANnav 2.2.0 could allow an authenticated, local attacker to view sensitive information such as ssh passwords in filetansfer.log in debug mode. To exploit this vulnerability, the attacker would need to have valid user credentials and turn on debug mode. Una vulnerabilidad de exposición de información a través de archivos de registro en Brocade SANNav versiones anteriores a Brocade SANnav 2.2.0, podría permitir a... • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1840 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 0

09 May 2022 — Brocade SANnav before version SANnav 2.2.0 logs the REST API Authentication token in plain text. Brocade SANnav versiones hasta SANnav 2.2.0, registra el token de autenticación de la API REST en texto plano • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1841 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

06 May 2022 — A vulnerability in the role-based access control (RBAC) functionality of the Brocade SANNav before 2.2.0 could allow an authenticated, remote attacker to access resources that they should not be able to access and perform actions that they should not be able to perform. The vulnerability exists because restrictions are not performed on Server side to ensure the user has required permission before processing requests. Una vulnerabilidad en la funcionalidad de control de acceso basado en roles (RBAC) de Broca... • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1844 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

06 May 2022 — In Brocade SANnav before Brocade SANnav 2.2.0, multiple endpoints associated with Zone management are susceptible to SQL injection, allowing an attacker to run arbitrary SQL commands. En Brocade SANnav versiones anteriores a Brocade SANnav versión 2.2.0, varios endpoints asociados a la administración de zonas son susceptibles de inyección SQL, lo que permite a un atacante ejecutar comandos SQL arbitrarios • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1842 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

06 May 2022 — Brocade SANnav before SANnav 2.2.0 application uses the Blowfish symmetric encryption algorithm for the storage of passwords. This could allow an authenticated attacker to decrypt stored account passwords. La aplicación Brocade SANnav versiones anteriores a SANnav versión 2.2.0, usa el algoritmo de cifrado simétrico Blowfish para el almacenamiento de contraseñas. Esto podría permitir a un atacante autentificado descifrar las contraseñas de las cuentas almacenadas • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-1843 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

09 Jun 2021 — Brocade SANnav before version 2.1.1 allows an authenticated attacker to list directories, and list files without permission. As a result, users without permission can see folders, and hidden files, and can create directories without permission. Brocade SANNav versiones anteriores a 2.1.1, permite a un atacante autenticado listar directorios, y listar archivos sin permiso. Como resultado, los usuarios sin permiso pueden visualizar carpetas y archivos ocultos, y pueden crear directorios sin permiso • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1486 •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

09 Jun 2021 — Brocade SANNav before version 2.1.1 contains an information disclosure vulnerability. Successful exploitation of internal server information in the initial login response header. Brocade SANNav versiones anteriores a 2.1.1, contiene una vulnerabilidad de divulgación de información. Una explotación con éxito de la información interna del servidor en la encabezado de respuesta de inicio de sesión • https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2021-1485 • CWE-312: Cleartext Storage of Sensitive Information •