Page 4 of 62 results (0.006 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

BMC Remedy 9.1SP3 is affected by authenticated code execution. Authenticated users that have the right to create reports can use BIRT templates to run code. BMC Remedy versión 9.1SP3, está afectado por una ejecución del código autenticado. Unos usuarios autenticados que presentan derecho a crear informes pueden usar plantillas BIRT para ejecutar código • http://bmc.com http://remedy.com https://docs.bmc.com/docs/ars91/en/9-1-00-fixes-available-for-remedy-ar-system-security-vulnerabilities-800555806.html https://seclists.org/fulldisclosure/2017/Oct/52 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

BMC Remedy Mid Tier 9.1SP3 is affected by log hijacking. Remote logging can be accessed by unauthenticated users, allowing for an attacker to hijack the system logs. This data can include user names and HTTP data. BMC Remedy Mid Tier versión 9.1SP3, está afectado por un secuestro de registros. Unos usuarios no autenticados remotos pueden ser accedidos al registro, permitiendo a un atacante apropiarse de los registros del sistema. • http://bmc.com http://remedy.com https://docs.bmc.com/docs/ars91/en/9-1-00-fixes-available-for-remedy-ar-system-security-vulnerabilities-800555806.html https://seclists.org/fulldisclosure/2017/Oct/52 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

BMC Remedy Mid Tier 9.1SP3 is affected by cross-site scripting (XSS). A DOM-based cross-site scripting vulnerability was discovered in a legacy utility. BMC Remedy Mid Tier versión 9.1SP3, está afectado por una vulnerabilidad de tipo cross-site scripting (XSS). Se detectó una vulnerabilidad de tipo cross-site scripting basada en DOM en una utilidad heredada • http://bmc.com http://remedy.com https://docs.bmc.com/docs/ars91/en/9-1-00-fixes-available-for-remedy-ar-system-security-vulnerabilities-800555806.html https://seclists.org/fulldisclosure/2017/Oct/52 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

BMC Remedy Mid Tier 9.1SP3 is affected by remote and local file inclusion. Due to the lack of restrictions on what can be targeted, the system can be vulnerable to attacks such as system fingerprinting, internal port scanning, Server Side Request Forgery (SSRF), or remote code execution (RCE). BMC Remedy Mid Tier versión 9.1SP3, está afectado por la inclusión de archivos locales y remotos. Debido a una falta de restricciones sobre lo que puede ser atacado, el sistema puede ser vulnerable a ataques como el sistema de huellas dactilares, el escaneo de puertos internos, un Server Side Request Forgery (SSRF) o una ejecución de código remota (RCE) • http://bmc.com http://remedy.com https://docs.bmc.com/docs/ars91/en/9-1-00-fixes-available-for-remedy-ar-system-security-vulnerabilities-800555806.html https://seclists.org/fulldisclosure/2017/Oct/52 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 6.5EPSS: 1%CPEs: 4EXPL: 2

BMC Smart Reporting 7.3 20180418 allows authenticated XXE within the import functionality. One can import a malicious XML file and perform XXE attacks to download local files from the server, or do DoS attacks with XML expansion attacks. XXE with direct response and XXE OOB are allowed. BMC Smart Reporting versión 7.3 20180418, permite un ataque de tipo XXE autenticado dentro de la funcionalidad import. Se puede importar un archivo XML malicioso y realizar ataques de tipo XXE para desencadenar archivos locales del servidor, o hacer ataques de tipo DoS con ataques de expansión XML. • http://packetstormsecurity.com/files/155552/BMC-Smart-Reporting-7.3-20180418-XML-Injection.html http://seclists.org/fulldisclosure/2019/Dec/7 https://docs.bmc.com/docs/itsm90/export-and-import-repository-509983929.html • CWE-434: Unrestricted Upload of File with Dangerous Type CWE-611: Improper Restriction of XML External Entity Reference •