Show filters
84 Total Results
Displaying 41-50 of 84
Sort by:
Attacker Value
Unknown

CVE-2019-8352

Disclosure Date: May 20, 2019 (last updated November 27, 2024)
By default, BMC PATROL Agent through 11.3.01 uses a static encryption key for encrypting/decrypting user credentials sent over the network to managed PATROL Agent services. If an attacker were able to capture this network traffic, they could decrypt these credentials and use them to execute code or escalate privileges on the network.
Attacker Value
Unknown

CVE-2018-18862

Disclosure Date: March 21, 2019 (last updated November 27, 2024)
BMC Remedy Mid-Tier 7.1.00 and 9.1.02.003 for BMC Remedy AR System has Incorrect Access Control in ITAM forms, as demonstrated by TLS%3APLR-Configuration+Details/Default+Admin+View/, AST%3AARServerConnection/Default+Admin+View/, and AR+System+Administration%3A+Server+Information/Default+Admin+View/.
0
Attacker Value
Unknown

CVE-2018-20735

Disclosure Date: January 17, 2019 (last updated November 08, 2023)
An issue was discovered in BMC PATROL Agent through 11.3.01. It was found that the PatrolCli application can allow for lateral movement and escalation of privilege inside a Windows Active Directory environment. It was found that by default the PatrolCli / PATROL Agent application only verifies if the password provided for the given username is correct; it does not verify the permissions of the user on the network. This means if you have PATROL Agent installed on a high value target (domain controller), you can use a low privileged domain user to authenticate with PatrolCli and then connect to the domain controller and run commands as SYSTEM. This means any user on a domain can escalate to domain admin through PATROL Agent. NOTE: the vendor disputes this because they believe it is adequate to prevent this escalation by means of a custom, non-default configuration
0
Attacker Value
Unknown

CVE-2018-19505

Disclosure Date: January 03, 2019 (last updated November 27, 2024)
Remedy AR System Server in BMC Remedy 7.1 may fail to set the correct user context in certain impersonation scenarios, which can allow a user to act with the identity of a different user, because userdata.js in the WOI:WorkOrderConsole component allows a username substitution involving a UserData_Init call.
0
Attacker Value
Unknown

CVE-2015-9257

Disclosure Date: March 24, 2018 (last updated November 26, 2024)
BMC Remedy Action Request (AR) System 9.0 before 9.0.00 Service Pack 2 hot fix 1 has persistent XSS.
0
Attacker Value
Unknown

CVE-2017-18228

Disclosure Date: March 12, 2018 (last updated November 26, 2024)
Remedy Mid Tier in BMC Remedy AR System 9.1 allows XSS via the ATTKey parameter in an arsys/servlet/AttachServlet request.
0
Attacker Value
Unknown

CVE-2017-18223

Disclosure Date: March 10, 2018 (last updated November 26, 2024)
BMC Remedy AR System before 9.1 SP3, when Remedy AR Authentication is enabled, allows attackers to obtain administrative access.
0
Attacker Value
Unknown

CVE-2016-6598

Disclosure Date: January 30, 2018 (last updated November 26, 2024)
BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting file storage service (FileStorageService) on port 9010. This service contains a method that allows uploading a file to an arbitrary path on the machine that is running Track-It!. This can be used to upload a file to the web root and achieve code execution as NETWORK SERVICE or SYSTEM.
0
Attacker Value
Unknown

CVE-2016-6599

Disclosure Date: January 30, 2018 (last updated November 26, 2024)
BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting configuration service (ConfigurationService) on port 9010. This service contains a method that can be used to retrieve a configuration file that contains the application database name, username and password as well as the domain administrator username and password. These are encrypted with a fixed key and IV ("NumaraIT") using the DES algorithm. The domain administrator username and password can only be obtained if the Self-Service component is enabled, which is the most common scenario in enterprise deployments.
0
Attacker Value
Unknown

CVE-2014-9514

Disclosure Date: August 28, 2017 (last updated November 26, 2024)
Cross-site scripting (XSS) vulnerability in BMC Footprints Service Core 11.5.
0