The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control, allowing for an unauthenticated attacker to update and add user profiles within the application, and gain full access of the site.
Max CVSS
9.8
EPSS Score
0.04%
Published
2024-04-15
Updated
2024-04-15
A buffer overflow vulnerability exists in Symantec Data Loss Prevention version 14.0.2 and before. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a crafted document to achieve code execution.
Max CVSS
9.6
EPSS Score
0.21%
Published
2024-01-26
Updated
2024-01-31
A buffer overflow vulnerability exists in Symantec Server Management Suite version 7.9 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as SYSTEM.
Max CVSS
10.0
EPSS Score
0.21%
Published
2024-01-26
Updated
2024-01-31
A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 10.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root.
Max CVSS
10.0
EPSS Score
0.21%
Published
2024-01-26
Updated
2024-01-31
A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 9.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root.
Max CVSS
10.0
EPSS Score
0.21%
Published
2024-01-26
Updated
2024-01-31
A buffer overflow vulnerability exists in Symantec Deployment Solution version 7.9 when parsing UpdateComputer tokens. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as SYSTEM.
Max CVSS
10.0
EPSS Score
0.18%
Published
2024-01-26
Updated
2024-01-31
Brocade SANnav Web interface before Brocade SANnav v2.3.0 and v2.2.2a allows remote unauthenticated users to bypass web authentication and authorization.
Max CVSS
9.8
EPSS Score
0.19%
Published
2023-08-31
Updated
2024-03-21
Advanced Secure Gateway and Content Analysis, prior to 7.3.13.1 / 3.1.6.0, may be susceptible to a Command Injection vulnerability.
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-06-01
Updated
2023-06-06
Broadcom RAID Controller web interface is vulnerable to insufficient randomness due to improper use of ssl.rnd to setup CIM connection
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-08-15
Updated
2023-08-21
Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP strict-transport-security policy
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-08-15
Updated
2023-08-21
Broadcom RAID Controller is vulnerable to Privilege escalation to root due to creation of insecure folders by Web GUI
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-08-15
Updated
2023-08-21
Broadcom RAID Controller is vulnerable to Privilege escalation by taking advantage of the Session prints in the log file
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-08-15
Updated
2023-08-21
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not provide X-Content-Type-Options Headers
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-08-15
Updated
2023-08-21
Broadcom RAID Controller web interface is vulnerable to improper session handling of managed servers on Gateway installation
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-08-15
Updated
2023-08-21
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard cookies with Secure attribute
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-08-15
Updated
2023-08-21
Broadcom RAID Controller web interface is vulnerable due to insecure default of HTTP configuration that does not safeguard SESSIONID cookie with SameSite attribute
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-08-15
Updated
2023-08-21
Broadcom RAID Controller web interface is vulnerable due to usage of Libcurl with LSA has known vulnerabilities
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-08-15
Updated
2023-08-21
Broadcom RAID Controller web interface is vulnerable due to insecure defaults of lacking HTTP Content-Security-Policy headers
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-08-15
Updated
2023-08-21
Broadcom RAID Controller web interface is vulnerable to improper session management of active sessions on Gateway setup
Max CVSS
9.8
EPSS Score
0.09%
Published
2023-08-15
Updated
2023-08-21
Symantec Endpoint Protection (Windows) agent may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.
Max CVSS
9.8
EPSS Score
0.19%
Published
2022-12-01
Updated
2022-12-05
CA Automic Automation 12.2 and 12.3 contain an insufficient input validation vulnerability in the Automic agent that could allow a remote attacker to potentially execute arbitrary code.
Max CVSS
9.8
EPSS Score
0.40%
Published
2022-06-16
Updated
2022-06-27
CA Automic Automation 12.2 and 12.3 contain an insufficient input validation vulnerability in the Automic agent that could allow a remote attacker to potentially execute arbitrary code.
Max CVSS
9.8
EPSS Score
0.40%
Published
2022-06-16
Updated
2022-06-27
CA Automic Automation 12.2 and 12.3 contain an authentication error vulnerability in the Automic agent that could allow a remote attacker to potentially execute arbitrary commands.
Max CVSS
9.8
EPSS Score
0.21%
Published
2022-06-16
Updated
2022-06-28
In Brocade SANnav before Brocade SANnav 2.2.0, multiple endpoints associated with Zone management are susceptible to SQL injection, allowing an attacker to run arbitrary SQL commands.
Max CVSS
9.8
EPSS Score
0.14%
Published
2022-05-06
Updated
2022-05-13
XCOM Data Transport for Windows, Linux, and UNIX 11.6 releases contain a vulnerability due to insufficient input validation that could potentially allow remote attackers to execute arbitrary commands with elevated privileges.
Max CVSS
10.0
EPSS Score
0.29%
Published
2022-02-14
Updated
2022-02-19
131 vulnerabilities found
1 2 3 4 5 6
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!