Show filters
128 Total Results
Displaying 21-30 of 128
Sort by:
Attacker Value
Unknown

CVE-2023-31428

Disclosure Date: August 02, 2023 (last updated February 14, 2025)
Brocade Fabric OS before Brocade Fabric OS v9.1.1c, v9.2.0 contains a vulnerability in the command line that could allow a local user to dump files under user's home directory using grep.
Attacker Value
Unknown

CVE-2023-31427

Disclosure Date: August 01, 2023 (last updated February 14, 2025)
Brocade Fabric OS versions before Brocade Fabric OS v9.1.1c, and v9.2.0 Could allow an authenticated, local user with knowledge of full path names inside Brocade Fabric OS to execute any command regardless of assigned privilege. Starting with Fabric OS v9.1.0, “root” account access is disabled.
Attacker Value
Unknown

CVE-2023-31426

Disclosure Date: August 01, 2023 (last updated October 08, 2023)
The Brocade Fabric OS Commands “configupload” and “configdownload” before Brocade Fabric OS v9.1.1c, v8.2.3d, v9.2.0 print scp, sftp, ftp servers passwords in supportsave. This could allow a remote authenticated attacker to access sensitive information.
Attacker Value
Unknown

CVE-2023-31429

Disclosure Date: August 01, 2023 (last updated September 18, 2024)
Brocade Fabric OS before Brocade Fabric OS 9.1.1c, 9.2.0 contains a vulnerability when using various commands such as “chassisdistribute”, “reboot”, “rasman”, errmoduleshow, errfilterset, hassiscfgperrthreshold, supportshowcfgdisable and supportshowcfgenable commands that can cause the content of shell interpreted variables to be printed in the terminal.
Attacker Value
Unknown

CVE-2023-31425

Disclosure Date: August 01, 2023 (last updated February 14, 2025)
A vulnerability in the fosexec command of Brocade Fabric OS after Brocade Fabric OS v9.1.0 and, before Brocade Fabric OS v9.1.1 could allow a local authenticated user to perform privilege escalation to root by breaking the rbash shell. Starting with Fabric OS v9.1.0, “root” account access is disabled.
Attacker Value
Unknown

CVE-2023-27538

Disclosure Date: March 30, 2023 (last updated March 28, 2024)
An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.
Attacker Value
Unknown

CVE-2023-27537

Disclosure Date: March 30, 2023 (last updated March 28, 2024)
A double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate "handles". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free.
Attacker Value
Unknown

CVE-2023-27534

Disclosure Date: March 30, 2023 (last updated March 28, 2024)
A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.
Attacker Value
Unknown

CVE-2023-28531

Disclosure Date: March 17, 2023 (last updated October 08, 2023)
ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.
Attacker Value
Unknown

CVE-2022-33186

Disclosure Date: December 08, 2022 (last updated October 08, 2023)
A vulnerability in Brocade Fabric OS software v9.1.1, v9.0.1e, v8.2.3c, v7.4.2j, and earlier versions could allow a remote unauthenticated attacker to execute on a Brocade Fabric OS switch commands capable of modifying zoning, disabling the switch, disabling ports, and modifying the switch IP address.