Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
broadcom brocade sannav vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2020-15381
Brocade SANnav before version 2.1.1 contains an Improper Authentication vulnerability that allows cleartext transmission of authentication credentials of the jmx server.
Broadcom Sannav
5.3
CVSSv3
CVE-2020-15384
Brocade SANNav before version 2.1.1 contains an information disclosure vulnerability. Successful exploitation of internal server information in the initial login response header.
Broadcom Sannav
5.3
CVSSv3
CVE-2020-15378
The OVA version of Brocade SANnav before version 2.1.1 installation with IPv6 networking exposes the docker container ports to the network, increasing the potential attack surface.
Broadcom Sannav
6.5
CVSSv3
CVE-2022-28164
Brocade SANnav before SANnav 2.2.0 application uses the Blowfish symmetric encryption algorithm for the storage of passwords. This could allow an authenticated malicious user to decrypt stored account passwords.
Broadcom Sannav
9.8
CVSSv3
CVE-2020-15377
Webtools in Brocade SANnav before version 2.1.1 allows unauthenticated users to make requests to arbitrary hosts due to a misconfiguration; this is commonly referred to as Server-Side Request Forgery (SSRF).
Broadcom Sannav
5.4
CVSSv3
CVE-2020-15385
Brocade SANnav before version 2.1.1 allows an authenticated malicious user to list directories, and list files without permission. As a result, users without permission can see folders, and hidden files, and can create directories without permission.
Broadcom Sannav
8.8
CVSSv3
CVE-2022-28165
A vulnerability in the role-based access control (RBAC) functionality of the Brocade SANNav prior to 2.2.0 could allow an authenticated, remote malicious user to access resources that they should not be able to access and perform actions that they should not be able to perform. T...
Broadcom Sannav
7.4
CVSSv3
CVE-2020-15387
The host SSH servers of Brocade Fabric OS before Brocade Fabric OS v7.4.2h, v8.2.1c, v8.2.2, v9.0.0, and Brocade SANnav before v2.1.1 utilize keys of less than 2048 bits, which may be vulnerable to man-in-the-middle attacks and/or insecure SSH communications.
Broadcom Brocade Sannav
Broadcom Fabric Operating System
Broadcom Fabric Operating System 7.4.2
Broadcom Fabric Operating System 7.4.2a
Broadcom Fabric Operating System 7.4.2b
Broadcom Fabric Operating System 7.4.2c
Broadcom Fabric Operating System 7.4.2d
Broadcom Fabric Operating System 7.4.2f
Broadcom Fabric Operating System 7.4.2g
Broadcom Fabric Operating System 8.2.1
Broadcom Fabric Operating System 8.2.1a
Broadcom Fabric Operating System 8.2.1b
NA
CVE-2024-29969
When a Brocade SANnav installation is upgraded from Brocade SANnav v2.2.2 to Brocade SANnav 2.3.0, TLS/SSL weak message authentication code ciphers are added by default for port 18082.
NA
CVE-2024-29956
A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a prints the Brocade SANnav password in clear text in supportsave logs when a user schedules a switch Supportsave from Brocade SANnav.
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27975
CVE-2024-2961
CVE-2024-20380
XML injection
HTML injection
CVE-2024-29204
CVE-2023-51795
memory leak
CVE-2024-3470
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »