Show filters
732 Total Results
Displaying 61-70 of 732
Sort by:
Attacker Value
Unknown

CVE-2024-34078

Disclosure Date: May 06, 2024 (last updated May 07, 2024)
html-sanitizer is an allowlist-based HTML cleaner. If using `keep_typographic_whitespace=False` (which is the default), the sanitizer normalizes unicode to the NFKC form at the end. Some unicode characters normalize to chevrons; this allows specially crafted HTML to escape sanitization. The problem has been fixed in 2.4.2.
0
Attacker Value
Unknown

CVE-2024-2859

Disclosure Date: April 27, 2024 (last updated February 23, 2025)
By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account.
0
Attacker Value
Unknown

CVE-2024-4173

Disclosure Date: April 25, 2024 (last updated February 07, 2025)
A vulnerability in Brocade SANnav exposes Kafka in the wan interface. The vulnerability could allow an unauthenticated attacker to perform various attacks, including DOS against the Brocade SANnav.
Attacker Value
Unknown

CVE-2024-4161

Disclosure Date: April 25, 2024 (last updated February 07, 2025)
In Brocade SANnav, before Brocade SANnav v2.3.0, syslog traffic received clear text. This could allow an unauthenticated, remote attacker to capture sensitive information.
Attacker Value
Unknown

CVE-2024-4159

Disclosure Date: April 25, 2024 (last updated February 07, 2025)
Brocade SANnav before v2.3.0a lacks protection mechanisms on port 2377/TCP and 7946/TCP, which could allow an unauthenticated attacker to sniff the SANnav Docker information.
Attacker Value
Unknown

CVE-2024-29969

Disclosure Date: April 19, 2024 (last updated February 05, 2025)
When a Brocade SANnav installation is upgraded from Brocade SANnav v2.2.2 to Brocade SANnav 2.3.0, TLS/SSL weak message authentication code ciphers are added by default for port 18082.
Attacker Value
Unknown

CVE-2024-29968

Disclosure Date: April 19, 2024 (last updated February 05, 2025)
An information disclosure vulnerability exists in Brocade SANnav before v2.3.1 and v2.3.0a when Brocade SANnav instances are configured in disaster recovery mode. SQL Table names, column names, and SQL queries are collected in DR standby Supportsave. This could allow authenticated users to access the database structure and its contents.
Attacker Value
Unknown

CVE-2024-29967

Disclosure Date: April 19, 2024 (last updated February 05, 2025)
In Brocade SANnav before Brocade SANnav v2.31 and v2.3.0a, it was observed that Docker instances inside the appliance have insecure mount points, allowing reading and writing access to sensitive files. The vulnerability could allow a sudo privileged user on the host OS to read and write access to these files.
Attacker Value
Unknown

CVE-2024-29966

Disclosure Date: April 19, 2024 (last updated February 05, 2025)
Brocade SANnav OVA before v2.3.1 and v2.3.0a contain hard-coded credentials in the documentation that appear as the appliance's root password. The vulnerability could allow an unauthenticated attacker full access to the Brocade SANnav appliance.
Attacker Value
Unknown

CVE-2024-29965

Disclosure Date: April 19, 2024 (last updated February 05, 2025)
In Brocade SANnav before v2.3.1, and v2.3.0a, it is possible to back up the appliance from the web interface or the command line interface ("SSH"). The resulting backups are world-readable. A local attacker can recover backup files, restore them to a new malicious appliance, and retrieve the passwords of all the switches.