Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sannav vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2019-16208
Password-based encryption (PBE) algorithm, of Brocade SANnav versions before v2.0, has a weakness in generating cryptographic keys that may allow an malicious user to decrypt passwords used with several services (Radius, TACAS, etc.).
Broadcom Brocade Sannav
5.5
CVSSv3
CVE-2019-16210
Brocade SANnav versions before v2.0, logs plain text database connection password while triggering support save.
Broadcom Brocade Sannav
8.8
CVSSv3
CVE-2019-16212
A vulnerability in Brocade SANnav versions before v2.1.0 could allow a remote authenticated malicious user to conduct an LDAP injection. The vulnerability could allow a remote malicious user to bypass the authentication process.
Broadcom Brocade Sannav
6.5
CVSSv3
CVE-2023-31925
Brocade SANnav before v2.3.0 and v2.2.2a stores SNMPv3 Authentication passwords in plaintext. A privileged user could retrieve these credentials with knowledge and access to these log files. SNMP credentials could be seen in SANnav SupportSave if the capture is performed after an...
Broadcom Brocade Sannav
4.9
CVSSv3
CVE-2022-33187
Brocade SANnav before v2.2.1 logs usernames and encoded passwords in debug-enabled logs. The vulnerability could allow an attacker with admin privilege to read sensitive information.
Broadcom Brocade Sannav
7.4
CVSSv3
CVE-2019-16209
A vulnerability, in The ReportsTrustManager class of Brocade SANnav versions before v2.0, could allow an malicious user to perform a man-in-the-middle attack against Secure Sockets Layer(SSL)connections.
Broadcom Brocade Sannav
9.8
CVSSv3
CVE-2019-16211
Brocade SANnav versions before v2.1.0, contain a Plaintext Password Storage vulnerability.
Broadcom Brocade Sannav
5.5
CVSSv3
CVE-2019-16206
The authentication mechanism, in Brocade SANnav versions before v2.0, logs plaintext account credentials at the ‘trace’ and the 'debug' logging level; which could allow a local authenticated malicious user to access sensitive information.
Broadcom Brocade Sannav
6
CVSSv3
CVE-2020-13401
An issue exists in Docker Engine prior to 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.
Docker Engine
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Debian Debian Linux 10.0
Broadcom Sannav -
2 Github repositories
7.4
CVSSv3
CVE-2020-15387
The host SSH servers of Brocade Fabric OS before Brocade Fabric OS v7.4.2h, v8.2.1c, v8.2.2, v9.0.0, and Brocade SANnav before v2.1.1 utilize keys of less than 2048 bits, which may be vulnerable to man-in-the-middle attacks and/or insecure SSH communications.
Broadcom Brocade Sannav
Broadcom Fabric Operating System
Broadcom Fabric Operating System 7.4.2
Broadcom Fabric Operating System 7.4.2a
Broadcom Fabric Operating System 7.4.2b
Broadcom Fabric Operating System 7.4.2c
Broadcom Fabric Operating System 7.4.2d
Broadcom Fabric Operating System 7.4.2f
Broadcom Fabric Operating System 7.4.2g
Broadcom Fabric Operating System 8.2.1
Broadcom Fabric Operating System 8.2.1a
Broadcom Fabric Operating System 8.2.1b
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27977
IMAP
local users
CVE-2024-32038
CVE-2023-49963
CVE-2023-22869
CVE-2024-31497
local
CVE-2024-2961
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »