Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2024-6689
Disclosure Date: July 15, 2024 (last updated July 16, 2024)
Local Privilege Escalation in MSI-Installer in baramundi Management Agent v23.1.172.0 on Windows allows a local unprivileged user to escalate privileges to SYSTEM.
0
Attacker Value
Unknown
CVE-2023-37605
Disclosure Date: October 02, 2023 (last updated March 16, 2024)
Weak Exception Handling vulnerability in baramundi software GmbH EMM Agent 23.1.50 and before allows an attacker to cause a denial of service via a crafted request to the password parameter.
0
Attacker Value
Unknown
CVE-2022-43747
Disclosure Date: October 26, 2022 (last updated May 15, 2024)
baramundi Management Agent (bMA) in baramundi Management Suite (bMS) 2021 R1 and R2 and 2022 R1 allows remote code execution. This is fixed in security update S-2022-01, which contains fixed bMA setup files for these versions. This also is fixed in baramundi Management Suite 2022 R2.
0
Attacker Value
Unknown
CVE-2013-3593
Disclosure Date: October 03, 2013 (last updated October 05, 2023)
Baramundi Management Suite 7.5 through 8.9 uses cleartext for (1) client-server communication and (2) data storage, which allows remote attackers to obtain sensitive information by sniffing the network, and allows context-dependent attackers to obtain sensitive information by reading a file.
0
Attacker Value
Unknown
CVE-2013-3625
Disclosure Date: October 03, 2013 (last updated October 05, 2023)
An unspecified DLL file in Baramundi Management Suite 7.5 through 8.9 uses a hardcoded encryption key, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from a product installation elsewhere.
0
Attacker Value
Unknown
CVE-2013-3624
Disclosure Date: October 03, 2013 (last updated October 05, 2023)
The OS deployment feature in Baramundi Management Suite 7.5 through 8.9 stores credentials in cleartext on deployed machines, which allows remote attackers to obtain sensitive information by reading a file. NOTE: this ID was also incorrectly mapped to a separate issue in Oracle Outside In, but the correct ID for that issue is CVE-2013-5763.
0