Show filters
84 Total Results
Displaying 31-40 of 84
Sort by:
Attacker Value
Unknown

CVE-2019-19217

Disclosure Date: April 30, 2020 (last updated February 21, 2025)
BMC Control-M/Agent 7.0.00.000 allows OS Command Injection.
Attacker Value
Unknown

CVE-2019-19218

Disclosure Date: April 30, 2020 (last updated February 21, 2025)
BMC Control-M/Agent 7.0.00.000 has Insecure Password Storage.
Attacker Value
Unknown

CVE-2019-19215

Disclosure Date: April 30, 2020 (last updated February 21, 2025)
A buffer overflow vulnerability in BMC Control-M/Agent 7.0.00.000 when the On-Do action destination is Mail and the Control-M/Agent is configured to send the email, allows remote attackers to have unspecified impact via vectors related to the configured IP address or SMTP server.
Attacker Value
Unknown

CVE-2015-5071

Disclosure Date: January 15, 2020 (last updated February 21, 2025)
AR System Mid Tier in the AR System Mid Tier component before 9.0 SP1 for BMC Remedy AR System Server allows remote authenticated users to "navigate" to arbitrary files via the __report parameter of the BIRT viewer servlet.
Attacker Value
Unknown

CVE-2015-5072

Disclosure Date: January 15, 2020 (last updated February 21, 2025)
The BIRT Engine servlet in the AR System Mid Tier component before 9.0 SP1 for BMC Remedy AR System Server allows remote authenticated users to "navigate" to arbitrary local files via the __imageid parameter.
Attacker Value
Unknown

CVE-2019-17044

Disclosure Date: October 14, 2019 (last updated November 27, 2024)
An issue was discovered in BMC Patrol Agent 9.0.10i. Weak execution permissions on the PatrolAgent SUID binary could allow an attacker with "patrol" privileges to elevate his/her privileges to the ones of the "root" user by specially crafting a shared library .so file that will be loaded during execution.
Attacker Value
Unknown

CVE-2019-17043

Disclosure Date: October 14, 2019 (last updated November 27, 2024)
An issue was discovered in BMC Patrol Agent 9.0.10i. Weak execution permissions on the best1collect.exe SUID binary could allow an attacker to elevate his/her privileges to the ones of the "patrol" user by specially crafting a shared library .so file that will be loaded during execution.
Attacker Value
Unknown

CVE-2019-16755

Disclosure Date: September 26, 2019 (last updated November 27, 2024)
BMC Remedy ITSM Suite is prone to unspecified vulnerabilities in both DWP and SmartIT components, which can permit remote attackers to perform pre-authenticated remote commands execution on the Operating System running the targeted application. Affected DWP versions: versions: 3.x to 18.x, all versions, service packs, and patches are affected by this vulnerability. Affected SmartIT versions: 1.x, 2.0, 18.05, 18.08, and 19.02, all versions, service packs, and patches are affected by this vulnerability.
Attacker Value
Unknown

CVE-2019-1010147

Disclosure Date: July 26, 2019 (last updated November 27, 2024)
Yellowfin Smart Reporting All Versions Prior to 7.3 is affected by: Incorrect Access Control - Privileges Escalation. The impact is: Victim attacked and access admin functionality through their browser and control browser. The component is: MIAdminStyles.i4. The attack vector is: Victims are typically lured to a web site under the attacker's control; the XSS vulnerability on the target domain is silently exploited without the victim's knowledge. The fixed version is: 7.4 and later.
0
Attacker Value
Unknown

CVE-2019-11216

Disclosure Date: July 15, 2019 (last updated November 27, 2024)
BMC Smart Reporting 7.3 20180418 allows authenticated XXE within the import functionality. One can import a malicious XML file and perform XXE attacks to download local files from the server, or do DoS attacks with XML expansion attacks. XXE with direct response and XXE OOB are allowed.