📦 Sannav
by Broadcom
🔍 What is Sannav?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This SQL injection vulnerability in Brocade SANnav allows attackers to execute arbitrary SQL commands through multiple Zone management endpoints. It affects Brocade SANnav installations before version...
CVE-2020-15377 is a Server-Side Request Forgery (SSRF) vulnerability in Brocade SANnav Webtools that allows unauthenticated attackers to make requests to arbitrary internal or external hosts. This aff...
A vulnerability in Brocade SANnav migration scripts before version 3.0 allows sensitive database information to be captured in support save files. Attackers with access to these files can extract data...
Brocade SANnav versions before v2.2.0.2 and v2.1.1.8 store SCP server passwords in log files using only Base64 encoding, which provides no real security. Attackers who gain access to these log files c...
This vulnerability allows authenticated remote attackers to bypass role-based access controls in Brocade SANNav, enabling unauthorized access to resources and actions. It affects Brocade SANNav instal...
A vulnerability in Brocade SANnav's update-reports-purge-settings.sh script logs the database password to system audit logs. This allows authenticated attackers with access to audit logs to obtain the...
Brocade SANnav versions before 2.4.0b log the Fabric OS Switch admin password in clear text within support save logs and heap dump files during out-of-memory conditions. This vulnerability allows remo...
This vulnerability exposes the Password-Based Encryption (PBE) key in plaintext within system audit logs during migration operations in Brocade SANnav. Only remote authenticated attackers with privile...