Show filters
51 Total Results
Displaying 41-50 of 51
Sort by:
Attacker Value
Unknown

CVE-2020-15387

Disclosure Date: June 09, 2021 (last updated February 22, 2025)
The host SSH servers of Brocade Fabric OS before Brocade Fabric OS v7.4.2h, v8.2.1c, v8.2.2, v9.0.0, and Brocade SANnav before v2.1.1 utilize keys of less than 2048 bits, which may be vulnerable to man-in-the-middle attacks and/or insecure SSH communications.
Attacker Value
Unknown

CVE-2020-15379

Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Brocade SANnav before v.2.1.0a could allow remote attackers cause a denial-of-service condition due to a lack of proper validation, of the length of user-supplied data as name for custom field name.
Attacker Value
Unknown

CVE-2020-15382

Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Brocade SANnav before version 2.1.1 uses a hard-coded administrator account with the weak password ‘passw0rd’ if a password is not provided for PostgreSQL at install-time.
Attacker Value
Unknown

CVE-2019-16211

Disclosure Date: September 25, 2020 (last updated February 22, 2025)
Brocade SANnav versions before v2.1.0, contain a Plaintext Password Storage vulnerability.
Attacker Value
Unknown

CVE-2019-16212

Disclosure Date: September 25, 2020 (last updated February 22, 2025)
A vulnerability in Brocade SANnav versions before v2.1.0 could allow a remote authenticated attacker to conduct an LDAP injection. The vulnerability could allow a remote attacker to bypass the authentication process.
Attacker Value
Unknown

CVE-2019-16210

Disclosure Date: November 08, 2019 (last updated November 27, 2024)
Brocade SANnav versions before v2.0, logs plain text database connection password while triggering support save.
Attacker Value
Unknown

CVE-2019-16207

Disclosure Date: November 08, 2019 (last updated November 27, 2024)
Brocade SANnav versions before v2.0 use a hard-coded password, which could allow local authenticated attackers to access a back-end database and gain privileges.
Attacker Value
Unknown

CVE-2019-16205

Disclosure Date: November 08, 2019 (last updated November 27, 2024)
A vulnerability, in Brocade SANnav versions before v2.0, could allow remote attackers to brute-force a valid session ID. The vulnerability is due to an insufficiently random session ID for several post-authentication actions in the SANnav portal.
Attacker Value
Unknown

CVE-2019-16208

Disclosure Date: November 08, 2019 (last updated November 27, 2024)
Password-based encryption (PBE) algorithm, of Brocade SANnav versions before v2.0, has a weakness in generating cryptographic keys that may allow an attacker to decrypt passwords used with several services (Radius, TACAS, etc.).
Attacker Value
Unknown

CVE-2019-16206

Disclosure Date: November 08, 2019 (last updated November 27, 2024)
The authentication mechanism, in Brocade SANnav versions before v2.0, logs plaintext account credentials at the ‘trace’ and the 'debug' logging level; which could allow a local authenticated attacker to access sensitive information.