Jaspersoft Clarity PPM version 14.3.0.298 was discovered to contain an arbitrary file upload vulnerability via the Profile Picture Upload function.
Published: Updated:
Vulnerability Type: Stack overflow
Vendor(s): Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8
An issue was discovered in Broadcom) LSI PCI-SV92EX Soft Modem Kernel Driver through 2.2.100.1 (aka AGRSM64.sys). There is Local Privilege Escalation to SYSTEM via a Stack Overflow in RTLCopyMemory (IOCTL 0x1b2150). An attacker can exploit this to elevate privileges from a medium-integrity process to SYSTEM. This can also be used to bypass kernel-level protections such as AV or PPL, because exploit code runs with high-integrity privileges and can be used in coordinated BYOVD (bring your own vulnerable driver) ransomware campaigns.
Published: Updated:
Vulnerability Type: Buffer overflow
Vendor(s): Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.4
In
Brocade Fabric OS before v9.2.0a, a local authenticated privileged user
can trigger a buffer overflow condition, leading to a kernel panic with
large input to buffers in the portcfgfportbuffers command.
Published: Updated:
Vulnerability Type: Design/Logic Flaw
Vendor(s): Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5
Brocade
SANnav before v2.3.0 and v2.2.2a stores SNMPv3 Authentication passwords
in plaintext. A privileged user could retrieve these credentials with
knowledge and access to these log files. SNMP
credentials could be seen in SANnav SupportSave if the capture is
performed after an SNMP configuration failure causes an SNMP
communication log dump.
Published: Updated:
Vulnerability Type: Authorization
Vendor(s): Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8
Brocade SANnav Web interface before Brocade SANnav v2.3.0 and v2.2.2a
allows remote unauthenticated users to bypass web authentication and
authorization.
Published: Updated:
Vulnerability Type: Design/Logic Flaw
Vendor(s): Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5
Possible
information exposure through log file vulnerability where sensitive
fields are recorded in the configuration log without masking on Brocade
SANnav before v2.3.0 and 2.2.2a. Notes:
To access the logs, the local attacker must have access to an already collected Brocade SANnav "supportsave"
outputs.
Published: Updated:
Vulnerability Type: Design/Logic Flaw
Vendor(s): Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5
The
firmwaredownload command on Brocade Fabric OS v9.2.0 could log the
FTP/SFTP/SCP server password in clear text in the SupportSave file when
performing a downgrade from Fabric OS v9.2.0 to any earlier version of
Fabric OS.
Published: Updated:
Vulnerability Type: Input validation
Vendor(s): Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8
Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection
Published: Updated:
Vulnerability Type: Design/Logic Flaw
Vendor(s): Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5
Broadcom RAID Controller web interface is vulnerable due to exposure of sensitive password information in the URL as a URL search parameter
Published: Updated:
Vulnerability Type: Design/Logic Flaw
Vendor(s): Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8
Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP strict-transport-security policy
Published: Updated:
Vulnerability Type: Privilege escalation
Vendor(s): Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8
Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI
Published: Updated:
Vulnerability Type: Privilege escalation
Vendor(s): Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8
Broadcom RAID Controller is vulnerable to Privilege escalation by taking advantage of the Session prints in the log file
Published: Updated:
Vulnerability Type: Design/Logic Flaw
Vendor(s): Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5
Broadcom RAID Controller web interface is vulnerable to exposure of private keys used for CIM stored with insecure file permissions
Published: Updated:
Vulnerability Type: Design/Logic Flaw
Vendor(s): Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers
Published: Updated:
Vulnerability Type: Input validation
Vendor(s): Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8
Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation
Published: Updated:
Vulnerability Type: Default configuration
Vendor(s): Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute
Published: Updated:
Vulnerability Type: Authentication flaw
Vendor(s): Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5
Broadcom RAID Controller Web server (nginx) is serving private server-side files without any authentication on Linux
Published: Updated:
Vulnerability Type: Authentication flaw
Vendor(s): Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5
Broadcom RAID Controller Web server (nginx) is serving private files without any authentication
Published: Updated:
Vulnerability Type: Code injection
Vendor(s): Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5
Broadcom RAID Controller web interface doesn’t enforce SSL cipher ordering by server
Published: Updated:
Vulnerability Type: Input validation
Vendor(s): Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5
Broadcom RAID Controller web interface is vulnerable due to Improper permissions on the log file