Loading HuntDB...

Vulnerabilities

CVE-2024-38499

HIGH

CA Client Automation (ITCM) allows non-admin/non-root users to encrypt a string using CAF CLI and SD_ACMD CLI. This would allow the non admin user to access the critical encryption keys which further causes the exploitation of stored credentials. This fix doesn't allow a non-admin/non-root user to execute "caf encrypt"/"sd_acmd encrypt" commands.

Published Dec 17, 2024

CVE-2024-38813

HIGH

The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet.

Published Sep 17, 2024

CVE-2024-38812

CRITICAL

The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

Published Sep 17, 2024

CVE-2024-38496

UNKNOWN

The vulnerability allows a malicious low-privileged PAM user to access information about other PAM users and their group memberships.

Published Jul 15, 2024

CVE-2024-38495

UNKNOWN

A specific authentication strategy allows a malicious attacker to learn ids of all PAM users defined in its database.

Published Jul 15, 2024

CVE-2024-38494

UNKNOWN

This vulnerability allows a high-privileged authenticated PAM user to achieve remote command execution on the affected PAM system by sending a specially crafted HTTP request.

Published Jul 15, 2024

CVE-2024-38493

UNKNOWN

A reflected cross-site scripting (XSS) vulnerability exists in the PAM UI web interface. A remote attacker able to convince a PAM user to click on a specially crafted link to the PAM UI web interface could potentially execute arbitrary client-side code in the context of PAM UI.

Published Jul 15, 2024

CVE-2024-38492

UNKNOWN

This vulnerability allows an unauthenticated attacker to achieve remote command execution on the affected PAM system by uploading a specially crafted PAM upgrade file.

Published Jul 15, 2024

CVE-2024-38491

UNKNOWN

The vulnerability allows an unauthenticated attacker to read arbitrary information from the database.

Published Jul 15, 2024

CVE-2024-36458

UNKNOWN

The vulnerability allows a malicious low-privileged PAM user to perform server upgrade related actions.

Published Jul 15, 2024

CVE-2024-36457

UNKNOWN

The vulnerability allows an attacker to bypass the authentication requirements for a specific PAM endpoint.

Published Jul 15, 2024

CVE-2024-36456

UNKNOWN

This vulnerability allows an unauthenticated attacker to achieve remote command execution on the affected PAM system by uploading a specially crafted PAM upgrade file.

Published Jul 15, 2024

CVE-2024-36455

UNKNOWN

An improper input validation allows an unauthenticated attacker to achieve remote command execution on the affected PAM system by sending a specially crafted HTTP request.

Published Jul 15, 2024

CVE-2024-37079

CRITICAL

vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

Published Jun 18, 2024

CVE-2024-36459

UNKNOWN

A CRLF cross-site scripting vulnerability has been identified in certain configurations of the SiteMinder Web Agent for IIS Web Server and SiteMinder Web Agent for Domino Web Server. As a result, an attacker can execute arbitrary Javascript code in a client browser.

Published Jun 14, 2024

CVE-2024-22274

HIGH

The vCenter Server contains an authenticated remote code execution vulnerability. A malicious actor with administrative privileges on the vCenter appliance shell may exploit this issue to run arbitrary commands on the underlying operating system.

Published May 21, 2024

CVE-2024-2859

MEDIUM

By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account.

Published Apr 27, 2024

CVE-2024-4161

HIGH

In Brocade SANnav, before Brocade SANnav v2.3.0, syslog traffic received clear text. This could allow an unauthenticated, remote attacker to capture sensitive information.

Published Apr 25, 2024

CVE-2024-29956

MEDIUM

A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a prints the Brocade SANnav password in clear text in supportsave logs when a user schedules a switch Supportsave from Brocade SANnav.

Published Apr 18, 2024

CVE-2024-29950

HIGH

The class FileTransfer implemented in Brocade SANnav before v2.3.1, v2.3.0a, uses the ssh-rsa signature scheme, which has a SHA-1 hash. The vulnerability could allow a remote, unauthenticated attacker to perform a man-in-the-middle attack.

Published Apr 17, 2024

CVE-2023-3454

HIGH

Remote code execution (RCE) vulnerability in Brocade Fabric OS after v9.0 and before v9.2.0 could allow an attacker to execute arbitrary code and use this to gain root access to the Brocade switch.

Published Apr 04, 2024

CVE-2024-22254

HIGH

VMware ESXi contains an out-of-bounds write vulnerability. A malicious actor with privileges within the VMX process may trigger an out-of-bounds write leading to an escape of the sandbox.

Published Mar 05, 2024

CVE-2023-31096

UNKNOWN

An issue was discovered in Broadcom) LSI PCI-SV92EX Soft Modem Kernel Driver through 2.2.100.1 (aka AGRSM64.sys). There is Local Privilege Escalation to SYSTEM via a Stack Overflow in RTLCopyMemory (IOCTL 0x1b2150). An attacker can exploit this to elevate privileges from a medium-integrity process to SYSTEM. This can also be used to bypass kernel-level protections such as AV or PPL, because exploit code runs with high-integrity privileges and can be used in coordinated BYOVD (bring your own vulnerable driver) ransomware campaigns.

Published Oct 10, 2023

CVE-2023-4324

UNKNOWN

Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP Content-Security-Policy headers

Published Aug 15, 2023

CVE-2023-4325

UNKNOWN

Broadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities

Published Aug 15, 2023

CVE-2023-4326

UNKNOWN

Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that supports obsolete SHA1-based ciphersuites

Published Aug 15, 2023

CVE-2023-4327

UNKNOWN

Broadcom RAID Controller web interface is vulnerable to exposure of sensitive data and the keys used for encryption are accessible to any local user on Linux

Published Aug 15, 2023

CVE-2023-4328

UNKNOWN

Broadcom RAID Controller web interface is vulnerable to exposure of sensitive data and the keys used for encryption are accessible to any local user on Windows

Published Aug 15, 2023

CVE-2023-4329

UNKNOWN

Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard SESSIONID cookie with SameSite attribute

Published Aug 15, 2023

CVE-2023-4331

UNKNOWN

Broadcom RAID Controller web interface is vulnerable has an insecure default TLS configuration that support obsolete and vulnerable TLS protocols

Published Aug 15, 2023

CVE-2023-4332

UNKNOWN

Broadcom RAID Controller web interface is vulnerable due to Improper permissions on the log file

Published Aug 15, 2023

CVE-2023-4333

UNKNOWN

Broadcom RAID Controller web interface doesn’t enforce SSL cipher ordering by server

Published Aug 15, 2023

CVE-2023-4334

UNKNOWN

Broadcom RAID Controller Web server (nginx) is serving private files without any authentication

Published Aug 15, 2023

CVE-2023-4335

UNKNOWN

Broadcom RAID Controller Web server (nginx) is serving private server-side files without any authentication on Linux

Published Aug 15, 2023

CVE-2023-4336

UNKNOWN

Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute

Published Aug 15, 2023

CVE-2023-4337

UNKNOWN

Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation

Published Aug 15, 2023

CVE-2023-4338

UNKNOWN

Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers

Published Aug 15, 2023

CVE-2023-4339

UNKNOWN

Broadcom RAID Controller web interface is vulnerable to exposure of private keys used for CIM stored with insecure file permissions

Published Aug 15, 2023

CVE-2023-4340

UNKNOWN

Broadcom RAID Controller is vulnerable to Privilege escalation by taking advantage of the Session prints in the log file

Published Aug 15, 2023

CVE-2023-4341

UNKNOWN

Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI

Published Aug 15, 2023

CVE-2023-4342

UNKNOWN

Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP strict-transport-security policy

Published Aug 15, 2023

CVE-2023-4343

UNKNOWN

Broadcom RAID Controller web interface is vulnerable due to exposure of sensitive password information in the URL as a URL search parameter

Published Aug 15, 2023

CVE-2023-4344

UNKNOWN

Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection

Published Aug 15, 2023

CVE-2023-4323

UNKNOWN

Broadcom RAID Controller web interface is vulnerable to improper session management of active sessions on Gateway setup

Published Aug 15, 2023

CVE-2023-4345

UNKNOWN

Broadcom RAID Controller web interface is vulnerable client-side control bypass leads to unauthorized data access for low privileged user

Published Aug 15, 2023

CVE-2021-28248

HIGH

CA eHealth Performance Manager through 6.3.2.12 is affected by Improper Restriction of Excessive Authentication Attempts. An attacker is able to perform an arbitrary number of /web/frames/ authentication attempts using different passwords, and eventually gain access to a targeted account, NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Published Mar 26, 2021

CVE-2021-28246

HIGH

CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. A regular user must create a malicious library in the writable RPATH, to be dynamically linked when the emtgtctl2 executable is run. The code in the library will be executed as the ehealth user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Published Mar 26, 2021

CVE-2019-9502

HIGH

The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. If the vendor information element data length is larger than 164 bytes, a heap buffer overflow is triggered in wlc_wpa_plumb_gtk. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.

Published Feb 03, 2020

CVE-2019-9501

HIGH

The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. By supplying a vendor information element with a data length larger than 32 bytes, a heap buffer overflow is triggered in wlc_wpa_sup_eapol. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.

Published Feb 03, 2020

CVE-2019-9500

HIGH

The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.

Published Jan 16, 2020