Show filters
15 Total Results
Displaying 1-10 of 15
Sort by:
Attacker Value
Unknown
CVE-2024-8105
Disclosure Date: August 26, 2024 (last updated August 27, 2024)
A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.
0
Attacker Value
Unknown
CVE-2024-3411
Disclosure Date: April 30, 2024 (last updated July 03, 2024)
Implementations of IPMI Authenticated sessions does not provide enough randomness to protect from session hijacking, allowing an attacker to use either predictable IPMI Session ID or weak BMC Random Number to bypass security controls using spoofed IPMI packets to manage BMC device.
0
Attacker Value
Unknown
CVE-2020-5208
Disclosure Date: February 05, 2020 (last updated February 21, 2025)
It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.
0
Attacker Value
Unknown
CVE-2014-8272
Disclosure Date: December 19, 2014 (last updated October 05, 2023)
The IPMI 1.5 functionality in Dell iDRAC6 modular before 3.65, iDRAC6 monolithic before 1.98, and iDRAC7 before 1.57.57 does not properly select session ID values, which makes it easier for remote attackers to execute arbitrary commands via a brute-force attack.
0
Attacker Value
Unknown
CVE-2011-4339
Disclosure Date: December 15, 2011 (last updated October 04, 2023)
ipmievd (aka the IPMI event daemon) in OpenIPMI, as used in the ipmitool package 1.8.11 in Red Hat Enterprise Linux (RHEL) 6, Debian GNU/Linux, Fedora 16, and other products uses 0666 permissions for its ipmievd.pid PID file, which allows local users to kill arbitrary processes by writing to this file.
0
Attacker Value
Unknown
CVE-2004-2619
Disclosure Date: December 31, 2004 (last updated February 22, 2025)
ripMIME 1.3.2.3 and earlier allows remote attackers to bypass e-mail protection via a base64 MIME encoded attachment containing invalid characters that are not properly extracted.
0
Attacker Value
Unknown
CVE-2004-2620
Disclosure Date: December 31, 2004 (last updated February 22, 2025)
The MIMEH_read_headers function in ripMIME 1.3.1.0 does not properly handle trailing "\r" and "\n" characters in headers, which leads to a buffer underflow.
0
Attacker Value
Unknown
CVE-2004-0052
Disclosure Date: October 20, 2004 (last updated February 22, 2025)
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard separator characters, or use standard separators incorrectly, within MIME headers, fields, parameters, or values, which may be interpreted differently by mail clients.
0
Attacker Value
Unknown
CVE-2004-0051
Disclosure Date: October 20, 2004 (last updated February 22, 2025)
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients.
0
Attacker Value
Unknown
CVE-2004-0162
Disclosure Date: October 20, 2004 (last updated February 22, 2025)
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME encapsulation that uses RFC822 comment fields, which may be interpreted as other fields by mail clients.
0