Show filters
84 Total Results
Displaying 51-60 of 84
Sort by:
Attacker Value
Unknown
CVE-2017-13130
Disclosure Date: August 23, 2017 (last updated November 26, 2024)
mcmnm in BMC Patrol allows local users to gain privileges via a crafted libmcmclnx.so file in the current working directory, because it is setuid root and the RPATH variable begins with the .: substring.
0
Attacker Value
Unknown
CVE-2016-5063
Disclosure Date: May 02, 2017 (last updated November 26, 2024)
The RSCD agent in BMC Server Automation before 8.6 SP1 Patch 2 and 8.7 before Patch 3 on Windows might allow remote attackers to bypass authorization checks and make an RPC call via unspecified vectors.
0
Attacker Value
Unknown
CVE-2016-2349
Disclosure Date: December 21, 2016 (last updated November 25, 2024)
Remedy AR System Server in BMC Remedy 8.1 SP 2, 9.0, 9.0 SP 1, and 9.1 allows attackers to reset arbitrary passwords via a blank previous password.
0
Attacker Value
Unknown
CVE-2016-4322
Disclosure Date: December 13, 2016 (last updated November 25, 2024)
BMC BladeLogic Server Automation (BSA) before 8.7 Patch 3 allows remote attackers to bypass authentication and consequently read arbitrary files or possibly have unspecified other impact by leveraging a "logic flaw" in the authentication process.
0
Attacker Value
Unknown
CVE-2016-9638
Disclosure Date: December 02, 2016 (last updated November 25, 2024)
In BMC Patrol before 9.13.10.02, the binary "listguests64" is configured with the setuid bit. However, when executing it, it will look for a binary named "virsh" using the PATH environment variable. The "listguests64" program will then run "virsh" using root privileges. This allows local users to elevate their privileges to root.
0
Attacker Value
Unknown
CVE-2016-1542
Disclosure Date: June 13, 2016 (last updated November 25, 2024)
The RPC API in RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and enumerate users by sending an action packet to xmlrpc after an authorization failure.
0
Attacker Value
Unknown
CVE-2016-1543
Disclosure Date: June 13, 2016 (last updated November 25, 2024)
The RPC API in the RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and reset arbitrary user passwords by sending an action packet to xmlrpc after an authorization failure.
0
Attacker Value
Unknown
CVE-2014-8270
Disclosure Date: December 12, 2014 (last updated October 05, 2023)
BMC Track-It! 11.3 allows remote attackers to gain privileges and execute arbitrary code by creating an account whose name matches that of a local system account, then performing a password reset.
0
Attacker Value
Unknown
CVE-2014-4872
Disclosure Date: October 10, 2014 (last updated October 05, 2023)
BMC Track-It! 11.3.0.355 does not require authentication on TCP port 9010, which allows remote attackers to upload arbitrary files, execute arbitrary code, or obtain sensitive credential and configuration information via a .NET Remoting request to (1) FileStorageService or (2) ConfigurationService.
0
Attacker Value
Unknown
CVE-2014-4873
Disclosure Date: October 10, 2014 (last updated October 05, 2023)
SQL injection vulnerability in TrackItWeb/Grid/GetData in BMC Track-It! 11.3.0.355 allows remote authenticated users to execute arbitrary SQL commands via crafted POST data.
0