Index
Bugtraq
Pełna lista
Błędy
Sztuczki
Exploity
Dorks list
Tylko z CVE
Tylko z CWE
Bogus
Ranking
CVEMAP
Świeża lista CVE
Producenci
Produkty
Słownik CWE
Sprawdź nr. CVE
Sprawdź nr. CWE
Szukaj
W Bugtraq
W bazie CVE
Po autorze
Po nr. CVE
Po nr. CWE
Po producencie
Po produkcie
RSS
Bugtraq
CVEMAP
CVE Produkty
Tylko Błędy
Tylko Exploity
Tylko Dorks
Więcej
cIFrex
Facebook
Twitter
Donate
O bazie
Lang
Polish
English
Submit
Podatności dla
'Brocade sannav'
2021-06-09
CVE-2020-15379
CWE-20
Brocade SANnav before v.2.1.0a could allow remote attackers cause a denial-of-service condition due to a lack of proper validation, of the length of user-supplied data as name for custom field name.
CVE-2020-15382
CWE-798
Brocade SANnav before version 2.1.1 uses a hard-coded administrator account with the weak password �??passw0rd�?? if a password is not provided for PostgreSQL at install-time.
2019-11-08
CVE-2019-16210
CWE-532
Brocade SANnav versions before v2.0, logs plain text database connection password while triggering support save.
CVE-2019-16209
CWE-295
A vulnerability, in The ReportsTrustManager class of Brocade SANnav versions before v2.0, could allow an attacker to perform a man-in-the-middle attack against Secure Sockets Layer(SSL)connections.
CVE-2019-16208
CWE-327
Password-based encryption (PBE) algorithm, of Brocade SANnav versions before v2.0, has a weakness in generating cryptographic keys that may allow an attacker to decrypt passwords used with several services (Radius, TACAS, etc.).
CVE-2019-16207
CWE-798
Brocade SANnav versions before v2.0 use a hard-coded password, which could allow local authenticated attackers to access a back-end database and gain privileges.
CVE-2019-16206
CWE-532
The authentication mechanism, in Brocade SANnav versions before v2.0, logs plaintext account credentials at the ?trace? and the 'debug' logging level; which could allow a local authenticated attacker to access sensitive information.
CVE-2019-16205
CWE-330
A vulnerability, in Brocade SANnav versions before v2.0, could allow remote attackers to brute-force a valid session ID. The vulnerability is due to an insufficiently random session ID for several post-authentication actions in the SANnav portal.
>>>
Vendor:
Broadcom
39
Produkty
Proxysg
Bluetooth stack
Bcmwl5.sys wireless device driver
Widcomm bluetooth
Broadcom
Broadcom linux
Bcm4325
Bcm4329
Xcom data transport
Pipa c211 web interface
Pipa c211
Advanced secure gateway
Tcpreplay
Unified infrastructure management
Bcm4339 soc firmware
Hardmac wi-fi soc firmware
Bcm43xx wi-fi chipset firmware
Bcm4355c0 firmware
Ca api developer portal
Ca identity governance
Brocade network advisor
Bcm4335c0 firmware
Bcm43438a1 firmware
Ca client automation
Ca workload automation ae
Brocade sannav
Ca automic dollar universe
Ca automic sysload
Brcmfmac driver
Symantec messaging gateway
Sannav
Bcm2711
Brocade fabric
Symantec proxysg
Emulex hba manager
Netmaster file transfer management
Netmaster network management for tcp\/ip
Ca harvest software change manager
Fabric operating system
Copyright
2024
, cxsecurity.com
Back to Top