CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “broadcom”

410 vulnerabilities found for “broadcom”

Page 1 of 21

CVE-2025-22248
HIGH7.5

The bitnami/pgpool Docker image, and the bitnami/postgres-ha k8s chart, under default configurations, comes with an 'repmgr' user that allows unauthenticated access to the database inside the cluster. The PGPOOL_SR_CHECK_USER is the user that Pgpool itself uses to perform streaming replication checks against nodes, and should not be at trust level. This allows to log into a PostgreSQL database using the repgmr user without authentication. If Pgpool is exposed externally, a potential attacker could use this user to get access to the service. This is also present within the bitnami/postgres-ha Kubernetes Helm chart.

broadcom / bitnami+1
Network
Published May 13, 2025
Page 1 of 21
CVE-2024-23616
CRITICAL10.0

A buffer overflow vulnerability exists in Symantec Server Management Suite version 7.9 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as SYSTEM.

broadcom / symantec_server_management_suite
Network
Published Jan 26, 2024
CVE-2024-23617
CRITICAL9.6

A buffer overflow vulnerability exists in Symantec Data Loss Prevention version 14.0.2 and before. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a crafted document to achieve code execution.

broadcom / symantec_data_center_security_server
Network
Published Jan 26, 2024
CVE-2023-23953
HIGH7.8

Advanced Secure Gateway and Content Analysis, prior to 7.3.13.1 / 3.1.6.0, may be susceptible to an Elevation of Privilege vulnerability.

broadcom / advanced_secure_gateway+1
Local
Published Jun 1, 2023
CVE-2023-23952
CRITICAL9.8

Advanced Secure Gateway and Content Analysis, prior to 7.3.13.1 / 3.1.6.0, may be susceptible to a Command Injection vulnerability.

broadcom / advanced_secure_gateway+1
Network
Published Jun 1, 2023
CVE-2023-23955
HIGH8.1

Advanced Secure Gateway and Content Analysis, prior to 7.3.13.1 / 3.1.6.0, may be susceptible to a Server-Side Request Forgery vulnerability.

broadcom / advanced_secure_gateway+1
Network
Published Jun 1, 2023
CVE-2023-23954
MEDIUM5.4

Advanced Secure Gateway and Content Analysis, prior to 7.3.13.1 / 3.1.6.0, may be susceptible to a Stored Cross-Site Scripting vulnerability.

broadcom / advanced_secure_gateway+1
Network
Published Jun 1, 2023
CVE-2023-23950
MEDIUM6.1

User’s supplied input (usually a CRLF sequence) can be used to split a returning response into two responses.

broadcom / symantec_identity_governance_and_administration+4
Network
Published Jan 26, 2023
CVE-2023-23951
MEDIUM6.1

Ability to enumerate the Oracle LDAP attributes for the current user by modifying the query used by the application

broadcom / symantec_identity_governance_and_administration+4
Network
Published Jan 26, 2023
CVE-2023-23949
MEDIUM5.4

An authenticated user can supply malicious HTML and JavaScript code that will be executed in the client browser.

broadcom / symantec_identity_governance_and_administration+4
Network
Published Jan 26, 2023
CVE-2021-42774
CRITICAL9.8

Broadcom Emulex HBA Manager/One Command Manager versions before 11.4.425.0 and 12.8.542.31, if not installed in Strictly Local Management mode, have a buffer overflow vulnerability in the remote firmware download feature that could allow remote unauthenticated users to perform various attacks. In non-secure mode, the user is unauthenticated.

broadcom / emulex_hba_manager+1
Network
Published Nov 12, 2021
CVE-2021-42775
CRITICAL9.1

Broadcom Emulex HBA Manager/One Command Manager versions before 11.4.425.0 and 12.8.542.31, if not installed in Strictly Local Management mode, have a vulnerability in the remote firmware download feature that could allow a user to place or replace an arbitrary file on the remote host. In non-secure mode, the user is unauthenticated.

broadcom / emulex_hba_manager+1
Network
Published Nov 12, 2021
CVE-2021-42773
HIGH7.5

Broadcom Emulex HBA Manager/One Command Manager versions before 11.4.425.0 and 12.8.542.31, if not installed in Strictly Local Management mode, could allow a user to retrieve an arbitrary file from a remote host with the GetDumpFile command. In non-secure mode, the user is unauthenticated.

broadcom / emulex_hba_manager+1
Network
Published Nov 12, 2021
CVE-2021-42772
CRITICAL9.8

Broadcom Emulex HBA Manager/One Command Manager versions before 11.4.425.0 and 12.8.542.31, if not installed in Strictly Local Management mode, have a buffer overflow vulnerability in the remote GetDumpFile command that could allow a user to attempt various attacks. In non-secure mode, the user is unauthenticated

broadcom / emulex_hba_manager+1
Network
Published Nov 3, 2021
CVE-2021-34174
MEDIUM4.6

A vulnerability exists in Broadcom BCM4352 and BCM43684 chips. Any wireless router using BCM4352 and BCM43684 will be affected, such as ASUS AX6100. An attacker may cause a Denial of Service (DoS) to any device connected to BCM4352 or BCM43684 routers via an association or reassociation frame.

broadcom / bcm4352_firmware+1
Physical
Published Jul 14, 2021
CVE-2021-30648
CRITICAL9.8

The Symantec Advanced Secure Gateway (ASG) and ProxySG web management consoles are susceptible to an authentication bypass vulnerability. An unauthenticated attacker can execute arbitrary CLI commands, view/modify the appliance configuration and policy, and shutdown/restart the appliance.

broadcom / symantec_proxysg+32
Network
Published Jun 30, 2021
CVE-2021-28246
HIGH7.8

CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. A regular user must create a malicious library in the writable RPATH, to be dynamically linked when the emtgtctl2 executable is run. The code in the library will be executed as the ehealth user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

broadcom / ehealth
Local
Published Mar 26, 2021
CVE-2021-28248
HIGH7.5

CA eHealth Performance Manager through 6.3.2.12 is affected by Improper Restriction of Excessive Authentication Attempts. An attacker is able to perform an arbitrary number of /web/frames/ authentication attempts using different passwords, and eventually gain access to a targeted account, NOTE: This vulnerability only affects products that are no longer supported by the maintainer

broadcom / ehealth
Network
Published Mar 26, 2021
CVE-2020-28421
HIGH7.8

CA Unified Infrastructure Management 20.1 and earlier contains a vulnerability in the robot (controller) component that allows local attackers to elevate privileges.

broadcom / unified_infrastructure_management
Local
Published Nov 23, 2020
CVE-2019-13656
CRITICAL9.8

An access vulnerability in CA Common Services DIA of CA Technologies Client Automation 14 and Workload Automation AE 11.3.5, 11.3.6 allows a remote attacker to execute arbitrary code.

broadcom / ca_client_automation+2
Network
Published Sep 6, 2019