Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
brocade vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-33187
Brocade SANnav before v2.2.1 logs usernames and encoded passwords in debug-enabled logs. The vulnerability could allow an attacker with admin privilege to read sensitive information.
Broadcom Brocade Sannav
10
CVSSv2
CVE-2016-8205
A Directory Traversal vulnerability in DashboardFileReceiveServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote malicious users to upload a malicious file in a section of the file system where it can be executed.
Brocade Network Advisor
5
CVSSv2
CVE-2016-8207
A Directory Traversal vulnerability in CliMonitorReportServlet in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote malicious users to read arbitrary files including files with sensitive user information.
Brocade Network Advisor
NA
CVE-2023-31925
Brocade SANnav before v2.3.0 and v2.2.2a stores SNMPv3 Authentication passwords in plaintext. A privileged user could retrieve these credentials with knowledge and access to these log files. SNMP credentials could be seen in SANnav SupportSave if the capture is performed after an...
Broadcom Brocade Sannav
5
CVSSv2
CVE-2020-15379
Brocade SANnav before v.2.1.0a could allow remote attackers cause a denial-of-service condition due to a lack of proper validation, of the length of user-supplied data as name for custom field name.
Broadcom Brocade Sannav
6.4
CVSSv2
CVE-2016-8206
A Directory Traversal vulnerability in servlet SoftwareImageUpload in the Brocade Network Advisor versions released prior to and including 14.0.2 could allow remote malicious users to write to arbitrary files, and consequently delete the files.
Brocade Network Advisor
5
CVSSv2
CVE-2019-16208
Password-based encryption (PBE) algorithm, of Brocade SANnav versions before v2.0, has a weakness in generating cryptographic keys that may allow an malicious user to decrypt passwords used with several services (Radius, TACAS, etc.).
Broadcom Brocade Sannav
4.3
CVSSv2
CVE-2019-16205
A vulnerability, in Brocade SANnav versions before v2.0, could allow remote malicious users to brute-force a valid session ID. The vulnerability is due to an insufficiently random session ID for several post-authentication actions in the SANnav portal.
Broadcom Brocade Sannav
2.1
CVSSv2
CVE-2019-16206
The authentication mechanism, in Brocade SANnav versions before v2.0, logs plaintext account credentials at the ‘trace’ and the 'debug' logging level; which could allow a local authenticated malicious user to access sensitive information.
Broadcom Brocade Sannav
4.6
CVSSv2
CVE-2019-16207
Brocade SANnav versions before v2.0 use a hard-coded password, which could allow local authenticated malicious users to access a back-end database and gain privileges.
Broadcom Brocade Sannav
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »