Broadcom

Brocade Sannav

54 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.18%
  • Published 09.12.2022 02:15:09
  • Last modified 21.11.2024 07:07:40

Brocade SANnav before v2.2.1 logs usernames and encoded passwords in debug-enabled logs. The vulnerability could allow an attacker with admin privilege to read sensitive information.

  • EPSS 14.14%
  • Published 18.01.2022 16:15:08
  • Last modified 21.11.2024 06:48:22

By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to m...

  • EPSS 0.48%
  • Published 18.01.2022 16:15:08
  • Last modified 07.07.2025 18:15:24

JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can prov...

  • EPSS 0.12%
  • Published 09.06.2021 16:15:08
  • Last modified 21.11.2024 05:05:27

The host SSH servers of Brocade Fabric OS before Brocade Fabric OS v7.4.2h, v8.2.1c, v8.2.2, v9.0.0, and Brocade SANnav before v2.1.1 utilize keys of less than 2048 bits, which may be vulnerable to man-in-the-middle attacks and/or insecure SSH commun...

  • EPSS 0.45%
  • Published 09.06.2021 16:15:08
  • Last modified 21.11.2024 05:05:26

Brocade SANnav before v.2.1.0a could allow remote attackers cause a denial-of-service condition due to a lack of proper validation, of the length of user-supplied data as name for custom field name.

  • EPSS 0.27%
  • Published 09.06.2021 15:15:08
  • Last modified 21.11.2024 05:05:27

Brocade SANnav before version 2.1.1 uses a hard-coded administrator account with the weak password ‘passw0rd’ if a password is not provided for PostgreSQL at install-time.

  • EPSS 0.15%
  • Published 25.09.2020 14:15:13
  • Last modified 21.11.2024 04:30:17

A vulnerability in Brocade SANnav versions before v2.1.0 could allow a remote authenticated attacker to conduct an LDAP injection. The vulnerability could allow a remote attacker to bypass the authentication process.

  • EPSS 0.28%
  • Published 25.09.2020 14:15:13
  • Last modified 21.11.2024 04:30:16

Brocade SANnav versions before v2.1.0, contain a Plaintext Password Storage vulnerability.

  • EPSS 0.35%
  • Published 08.11.2019 18:15:12
  • Last modified 21.11.2024 04:30:16

A vulnerability, in Brocade SANnav versions before v2.0, could allow remote attackers to brute-force a valid session ID. The vulnerability is due to an insufficiently random session ID for several post-authentication actions in the SANnav portal.

  • EPSS 0.03%
  • Published 08.11.2019 18:15:12
  • Last modified 21.11.2024 04:30:16

Brocade SANnav versions before v2.0, logs plain text database connection password while triggering support save.