{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T01:28:28.771","vulnerabilities":[{"cve":{"id":"CVE-2020-15374","sourceIdentifier":"sirt@brocade.com","published":"2020-09-25T14:15:13.797","lastModified":"2024-11-21T05:05:26.390","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Rest API in Brocade Fabric OS v8.2.1 through v8.2.1d, and 8.2.2 versions before v8.2.2c is vulnerable to multiple instances of reflected input."},{"lang":"es","value":"La API Rest en Brocade Fabric OS versiones v8.2.1 hasta v8.2.1d y versiones 8.2.2 anteriores a v8.2.2c, es vulnerable a múltiples instancias de entrada reflejada"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1:*:*:*:*:*:*:*","matchCriteriaId":"0C91FB6C-7BF5-453E-A618-06756D3DD2FB"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1a:*:*:*:*:*:*:*","matchCriteriaId":"7CF38E78-8243-4615-A8A1-1396920F5BA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1b:*:*:*:*:*:*:*","matchCriteriaId":"84E4F075-D03B-4D98-8C9E-840D80DFFF48"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1c:*:*:*:*:*:*:*","matchCriteriaId":"CDDF78F1-A7F3-4656-AD5D-6D84F83B34F0"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.1d:*:*:*:*:*:*:*","matchCriteriaId":"DAA3D3F6-C768-4096-A2CA-8CC406A92D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2:*:*:*:*:*:*:*","matchCriteriaId":"B244FB24-0767-4DC4-9988-ED8C5D9D9A91"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2a:*:*:*:*:*:*:*","matchCriteriaId":"7DDA4E8C-F140-4E39-9A6F-7883F2822499"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2a1:*:*:*:*:*:*:*","matchCriteriaId":"441E912B-4DD8-4A04-8072-04CE30D5A436"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2b:*:*:*:*:*:*:*","matchCriteriaId":"B3B33CEA-BE17-411D-86FF-388B21E8F018"},{"vulnerable":true,"criteria":"cpe:2.3:o:broadcom:fabric_operating_system:8.2.2c:*:*:*:*:*:*:*","matchCriteriaId":"D4CB0EA0-D553-4D17-867A-0DBD5D1F6764"}]}]}],"references":[{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1084","source":"sirt@brocade.com","tags":["Vendor Advisory"]},{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2020-1084","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}