"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-04-25 23:00:32 +00:00
parent ea79a850c4
commit a03453e489
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
6 changed files with 34 additions and 14 deletions

View File

@ -76,6 +76,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20191127-0003/",
"url": "https://security.netapp.com/advisory/ntap-20191127-0003/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20240425 [SECURITY] [DLA 3794-1] putty security update",
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20200717-0003/",
"url": "https://security.netapp.com/advisory/ntap-20200717-0003/"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20240425 [SECURITY] [DLA 3794-1] putty security update",
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html"
}
]
}

View File

@ -66,6 +66,11 @@
"refsource": "DEBIAN",
"name": "DSA-5588",
"url": "https://www.debian.org/security/2023/dsa-5588"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20240425 [SECURITY] [DLA 3794-1] putty security update",
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html"
}
]
}

View File

@ -626,6 +626,11 @@
"refsource": "FULLDISC",
"name": "20240313 APPLE-SA-03-07-2024-2 macOS Sonoma 14.4",
"url": "http://seclists.org/fulldisclosure/2024/Mar/21"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20240425 [SECURITY] [DLA 3794-1] putty security update",
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "\nBrocade SANnav before Brocade SANnav v2.3.1 lacks protection mechanisms on port 2377/TCP and 7946/TCP, which could allow an unauthenticated, remote attacker to reach Kafka APIs and send malicious data.\n\n"
"value": "\nBrocade SANnav before v2.3.0a lacks protection mechanisms on port 2377/TCP and 7946/TCP, which could allow an unauthenticated attacker to sniff the SANnav Docker information.\n\n"
}
]
},
@ -45,7 +45,7 @@
"versions": [
{
"status": "affected",
"version": "before v2.3.1"
"version": "before v2.3.0a"
}
],
"defaultStatus": "affected"
@ -79,16 +79,16 @@
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
]

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "\nA vulnerability in Brocade SANnav ova versions before Brocade SANnav v2.3.1 and v2.3.0a exposes Kafka in the wan interface.\n\nThe vulnerability could allow an unauthenticated attacker to perform various attacks, including DOS, the Brocade SANnav appliance.\n\n"
"value": "\nA vulnerability in Brocade SANnav exposes Kafka in the wan interface.\n\nThe vulnerability could allow an unauthenticated attacker to perform various attacks, including DOS against the Brocade SANnav.\n\n"
}
]
},
@ -41,7 +41,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "before v2.3.1 and v2.3.0a"
"version_value": "All Versions"
}
]
}
@ -71,16 +71,16 @@
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
}
]