Show filters
561 Total Results
Displaying 271-280 of 561
Sort by:
Attacker Value
Unknown

CVE-2019-18375

Disclosure Date: April 10, 2020 (last updated November 27, 2024)
The ASG and ProxySG management consoles are susceptible to a session hijacking vulnerability. A remote attacker, with access to the appliance management interface, can hijack the session of a currently logged-in user and access the management console.
Attacker Value
Unknown

CVE-2020-1927

Disclosure Date: April 02, 2020 (last updated February 21, 2025)
In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
Attacker Value
Unknown

CVE-2020-8012 - Buffer overflow allows RCE in Nimsoft robot (controller) compon…

Disclosure Date: February 18, 2020 (last updated February 21, 2025)
CA Unified Infrastructure Management (Nimsoft/UIM) 20.1, 20.3.x, and 9.20 and below contains a buffer overflow vulnerability in the robot (controller) component. A remote attacker can execute arbitrary code.
Attacker Value
Unknown

CVE-2020-8011

Disclosure Date: February 18, 2020 (last updated February 21, 2025)
CA Unified Infrastructure Management (Nimsoft/UIM) 20.1, 20.3.x, and 9.20 and below contains a null pointer dereference vulnerability in the robot (controller) component. A remote attacker can crash the Controller service.
Attacker Value
Unknown

CVE-2020-8648

Disclosure Date: February 06, 2020 (last updated February 21, 2025)
There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.
Attacker Value
Unknown

CVE-2019-16203

Disclosure Date: February 05, 2020 (last updated February 21, 2025)
Brocade Fabric OS Versions before v8.2.2a and v8.2.1d could expose the credentials of the remote ESRS server when these credentials are given as a command line option when configuring the ESRS client.
Attacker Value
Unknown

CVE-2019-16204

Disclosure Date: February 05, 2020 (last updated February 21, 2025)
Brocade Fabric OS Versions before v7.4.2f, v8.2.2a, v8.1.2j and v8.2.1d could expose external passwords, common secrets or authentication keys used between the switch and an external server.
Attacker Value
Unknown

CVE-2019-9501

Disclosure Date: February 03, 2020 (last updated February 21, 2025)
The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. By supplying a vendor information element with a data length larger than 32 bytes, a heap buffer overflow is triggered in wlc_wpa_sup_eapol. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
Attacker Value
Unknown

CVE-2019-9502

Disclosure Date: February 03, 2020 (last updated February 21, 2025)
The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. If the vendor information element data length is larger than 164 bytes, a heap buffer overflow is triggered in wlc_wpa_plumb_gtk. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
Attacker Value
Unknown

Broadcom brcmfmac driver is vulnerable to a frame validation bypass

Disclosure Date: January 16, 2020 (last updated February 21, 2025)
The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.