PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 496

of 25

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

Jaspersoft Clarity PPM version 14.3.0.298 was discovered to contain an arbitrary file upload vulnerability via the Profile Picture Upload function.

Published:   Updated:

Vulnerability Type: Stack overflow

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

An issue was discovered in Broadcom) LSI PCI-SV92EX Soft Modem Kernel Driver through 2.2.100.1 (aka AGRSM64.sys). There is Local Privilege Escalation to SYSTEM via a Stack Overflow in RTLCopyMemory (IOCTL 0x1b2150). An attacker can exploit this to elevate privileges from a medium-integrity process to SYSTEM. This can also be used to bypass kernel-level protections such as AV or PPL, because exploit code runs with high-integrity privileges and can be used in coordinated BYOVD (bring your own vulnerable driver) ransomware campaigns.

Published:   Updated:

Vulnerability Type: Buffer overflow

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.4

In Brocade Fabric OS before v9.2.0a, a local authenticated privileged user can trigger a buffer overflow condition, leading to a kernel panic with large input to buffers in the portcfgfportbuffers command.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

Brocade SANnav before v2.3.0 and v2.2.2a stores SNMPv3 Authentication passwords in plaintext. A privileged user could retrieve these credentials with knowledge and access to these log files. SNMP credentials could be seen in SANnav SupportSave if the capture is performed after an SNMP configuration failure causes an SNMP communication log dump.

Published:   Updated:

Vulnerability Type: Authorization

Vendor(s):  Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Brocade SANnav Web interface before Brocade SANnav v2.3.0 and v2.2.2a allows remote unauthenticated users to bypass web authentication and authorization.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

Possible information exposure through log file vulnerability where sensitive fields are recorded in the configuration log without masking on Brocade SANnav before v2.3.0 and 2.2.2a. Notes: To access the logs, the local attacker must have access to an already collected Brocade SANnav "supportsave" outputs.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

The firmwaredownload command on Brocade Fabric OS v9.2.0 could log the FTP/SFTP/SCP server password in clear text in the SupportSave file when performing a downgrade from Fabric OS v9.2.0 to any earlier version of Fabric OS.

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

Broadcom RAID Controller web interface is vulnerable due to exposure of sensitive password information in the URL as a URL search parameter

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP strict-transport-security policy

Published:   Updated:

Vulnerability Type: Privilege escalation

Vendor(s):  Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI

Published:   Updated:

Vulnerability Type: Privilege escalation

Vendor(s):  Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Broadcom RAID Controller is vulnerable to Privilege escalation by taking advantage of the Session prints in the log file

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

Broadcom RAID Controller web interface is vulnerable to exposure of private keys used for CIM stored with insecure file permissions

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation

Published:   Updated:

Vulnerability Type: Default configuration

Vendor(s):  Broadcom
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute

Published:   Updated:

Vulnerability Type: Authentication flaw

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

Broadcom RAID Controller Web server (nginx) is serving private server-side files without any authentication on Linux

Published:   Updated:

Vulnerability Type: Authentication flaw

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

Broadcom RAID Controller Web server (nginx) is serving private files without any authentication

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

Broadcom RAID Controller web interface doesn’t enforce SSL cipher ordering by server

Published:   Updated:

Vulnerability Type: Input validation

Vendor(s):  Broadcom
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

Broadcom RAID Controller web interface is vulnerable due to Improper permissions on the log file

of 25