Brocade

Network Advisor

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 7.94%
  • Published 22.01.2019 17:29:00
  • Last modified 21.11.2024 04:10:41

A vulnerability in Brocade Network Advisor Versions before 14.3.1 could allow an unauthenticated, remote attacker to log in to the JBoss Administration interface of an affected system using an undocumented user credentials and install additional JEE ...

  • EPSS 4.08%
  • Published 22.01.2019 17:29:00
  • Last modified 21.11.2024 04:10:41

A Vulnerability in Brocade Network Advisor versions before 14.1.0 could allow a remote unauthenticated attacker to execute arbitray code. The vulnerability could also be exploited to execute arbitrary OS Commands.

  • EPSS 0.55%
  • Published 22.01.2019 17:29:00
  • Last modified 21.11.2024 04:10:41

A Vulnerability in Brocade Network Advisor versions before 14.0.3 could allow a remote unauthenticated attacker to export the current user database which includes the encrypted (not hashed) password of the systems. The attacker could gain access to t...

  • EPSS 24.06%
  • Published 14.01.2017 19:59:00
  • Last modified 20.04.2025 01:37:25

A Directory Traversal vulnerability in DashboardFileReceiveServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to upload a malicious file in a section of the file system where it can be ...

  • EPSS 10.39%
  • Published 14.01.2017 19:59:00
  • Last modified 20.04.2025 01:37:25

A Directory Traversal vulnerability in servlet SoftwareImageUpload in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to write to arbitrary files, and consequently delete the files.

  • EPSS 5.09%
  • Published 14.01.2017 19:59:00
  • Last modified 20.04.2025 01:37:25

A Directory Traversal vulnerability in CliMonitorReportServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote attackers to read arbitrary files including files with sensitive user information.