Show filters
84 Total Results
Displaying 11-20 of 84
Sort by:
Attacker Value
Unknown
CVE-2023-34258
Disclosure Date: May 31, 2023 (last updated October 08, 2023)
An issue was discovered in BMC Patrol before 22.1.00. The agent's configuration can be remotely queried. This configuration contains the Patrol account password, encrypted with a default AES key. This account can then be used to achieve remote code execution.
0
Attacker Value
Unknown
CVE-2023-34257
Disclosure Date: May 31, 2023 (last updated November 08, 2023)
An issue was discovered in BMC Patrol through 23.1.00. The agent's configuration can be remotely modified (and, by default, authentication is not required). Some configuration fields related to SNMP (e.g., masterAgentName or masterAgentStartLine) result in code execution when the agent is restarted. NOTE: the vendor's perspective is "These are not vulnerabilities for us as we have provided the option to implement the authentication."
0
Attacker Value
Unknown
CVE-2021-39295
Disclosure Date: April 15, 2023 (last updated October 08, 2023)
In OpenBMC 2.9, crafted IPMI messages allow an attacker to cause a denial of service to the BMC via the netipmid (IPMI lan+) interface.
0
Attacker Value
Unknown
CVE-2023-26550
Disclosure Date: February 25, 2023 (last updated October 08, 2023)
A SQL injection vulnerability in BMC Control-M before 9.0.20.214 allows attackers to execute arbitrary SQL commands via the memname JSON field.
0
Attacker Value
Unknown
CVE-2022-35729
Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Out of bounds read in firmware for OpenBMC in some Intel(R) platforms before version 0.72 may allow unauthenticated user to potentially enable denial of service via network access.
0
Attacker Value
Unknown
CVE-2022-26088
Disclosure Date: November 10, 2022 (last updated December 22, 2024)
An issue was discovered in BMC Remedy before 22.1. Email-based Incident Forwarding allows remote authenticated users to inject HTML (such as an SSRF payload) into the Activity Log by placing it in the To: field. This affects rendering that occurs upon a click in the "number of recipients" field. NOTE: the vendor's position is that "no real impact is demonstrated."
Attacker Value
Unknown
CVE-2022-2809
Disclosure Date: October 07, 2022 (last updated December 22, 2024)
A vulnerability in bmcweb of OpenBMC Project allows user to cause denial of service. When fuzzing the multipart_parser code using AFL++ with address sanitizer enabled to find smallest memory corruptions possible. It detected problem in how multipart_parser handles unclosed http headers. If long enough http header is passed in the multipart form without colon there is one byte overwrite on heap. It can be conducted multiple times in a loop to cause DoS.
0
Attacker Value
Unknown
CVE-2022-3409
Disclosure Date: October 07, 2022 (last updated December 22, 2024)
A vulnerability in bmcweb of OpenBMC Project allows user to cause denial of service. This vulnerability was identified during mitigation for CVE-2022-2809. When fuzzing the multipart_parser code using AFL++ with address sanitizer enabled to find smallest memory corruptions possible. It detected problem in how multipart_parser handles unclosed http headers. If long enough http header is passed in the multipart form without colon there is one byte overwrite on heap. It can be conducted multiple times in a loop to cause DoS.
0
Attacker Value
Unknown
CVE-2022-35865
Disclosure Date: August 03, 2022 (last updated October 08, 2023)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of BMC Track-It! 20.21.2.109. Authentication is not required to exploit this vulnerability. The specific flaw exists within the authorization of HTTP requests. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-16709.
0
Attacker Value
Unknown
CVE-2022-35864
Disclosure Date: August 03, 2022 (last updated October 08, 2023)
This vulnerability allows remote attackers to disclose sensitive information on affected installations of BMC Track-It! 20.21.02.109. Authentication is required to exploit this vulnerability. The specific flaw exists within the GetPopupSubQueryDetails endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-16690.
0