Show filters
561 Total Results
Displaying 211-220 of 561
Sort by:
Attacker Value
Unknown
CVE-2020-15380
Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Brocade SANnav before version 2.1.1 logs account credentials at the ‘trace’ logging level.
0
Attacker Value
Unknown
CVE-2020-15383
Disclosure Date: June 09, 2021 (last updated November 28, 2024)
Running security scans against the SAN switch can cause config and secnotify processes within the firmware before Brocade Fabric OS v9.0.0, v8.2.2d and v8.2.1e to consume all memory leading to denial of service impacts possibly including a switch panic.
0
Attacker Value
Unknown
CVE-2020-15381
Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Brocade SANnav before version 2.1.1 contains an Improper Authentication vulnerability that allows cleartext transmission of authentication credentials of the jmx server.
0
Attacker Value
Unknown
CVE-2020-15382
Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Brocade SANnav before version 2.1.1 uses a hard-coded administrator account with the weak password ‘passw0rd’ if a password is not provided for PostgreSQL at install-time.
0
Attacker Value
Unknown
CVE-2021-26314
Disclosure Date: June 08, 2021 (last updated February 22, 2025)
Potential floating point value injection in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution with incorrect floating point results, may cause the use of incorrect data from FPVI and may result in data leakage.
0
Attacker Value
Unknown
CVE-2021-26313
Disclosure Date: June 08, 2021 (last updated February 22, 2025)
Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.
0
Attacker Value
Unknown
CVE-2021-31879
Disclosure Date: April 29, 2021 (last updated February 22, 2025)
GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007.
0
Attacker Value
Unknown
CVE-2021-23133
Disclosure Date: April 13, 2021 (last updated February 22, 2025)
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.
0
Attacker Value
Unknown
CVE-2021-22890
Disclosure Date: April 01, 2021 (last updated February 22, 2025)
curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly "short-cut" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.
0
Attacker Value
Unknown
CVE-2021-22876
Disclosure Date: April 01, 2021 (last updated February 22, 2025)
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
0