CVE-2017-18228
https://notcve.org/view.php?id=CVE-2017-18228
12 Mar 2018 — Remedy Mid Tier in BMC Remedy AR System 9.1 allows XSS via the ATTKey parameter in an arsys/servlet/AttachServlet request. Remedy Mid Tier en BMC Remedy AR System 9.1 permite Cross-Site Scripting (XSS) mediante el parámetro ATTKey en una petición arsys/servlet/AttachServlet. • https://communities.bmc.com/thread/164169 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2017-18223
https://notcve.org/view.php?id=CVE-2017-18223
10 Mar 2018 — BMC Remedy AR System before 9.1 SP3, when Remedy AR Authentication is enabled, allows attackers to obtain administrative access. BMC Remedy AR System, en versiones anteriores a la 9.1 SP3, cuando Remedy AR Authentication está habilitado, permite que los atacantes obtengan acceso administrativo. • https://communities.bmc.com/thread/165887 • CWE-287: Improper Authentication •
CVE-2016-6598 – BMC Track-It! 11.4 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2016-6598
26 Jan 2018 — BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting file storage service (FileStorageService) on port 9010. This service contains a method that allows uploading a file to an arbitrary path on the machine that is running Track-It!. This can be used to upload a file to the web root and achieve code execution as NETWORK SERVICE or SYSTEM. BMC Track-It! • https://www.exploit-db.com/exploits/43883 • CWE-284: Improper Access Control •
CVE-2016-6599 – BMC Track-It! 11.4 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2016-6599
26 Jan 2018 — BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting configuration service (ConfigurationService) on port 9010. This service contains a method that can be used to retrieve a configuration file that contains the application database name, username and password as well as the domain administrator username and password. These are encrypted with a fixed key and IV ("NumaraIT") using the DES algorithm. The domain administrator username and password can only be obtained if the Self-Service ... • https://www.exploit-db.com/exploits/43883 • CWE-255: Credentials Management Errors •
CVE-2014-9514
https://notcve.org/view.php?id=CVE-2014-9514
28 Aug 2017 — Cross-site scripting (XSS) vulnerability in BMC Footprints Service Core 11.5. Existe una vulnerabilidad de tipo Cross-Site Scripting (XSS) en BMC Footprints Service Core 11.5. • http://www.securityfocus.com/archive/1/534648 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2017-13130
https://notcve.org/view.php?id=CVE-2017-13130
23 Aug 2017 — mcmnm in BMC Patrol allows local users to gain privileges via a crafted libmcmclnx.so file in the current working directory, because it is setuid root and the RPATH variable begins with the .: substring. mcmnm en BMC Patrol permite que usuarios locales obtengan privilegios mediante un archivo libmcmclnx.so manipulado en el directorio de trabajo actual, ya que es setuid root y la variable RPATH comienza con la subcadena ".:". • https://github.com/itm4n/bmc-patrol-mcmnm-privesc • CWE-427: Uncontrolled Search Path Element •
CVE-2016-5063 – BMC BladeLogic 8.3.00.64 - Remote Command Execution
https://notcve.org/view.php?id=CVE-2016-5063
02 May 2017 — The RSCD agent in BMC Server Automation before 8.6 SP1 Patch 2 and 8.7 before Patch 3 on Windows might allow remote attackers to bypass authorization checks and make an RPC call via unspecified vectors. El agente RSCD en BMC Server Automation en la versión 8.6 SP1 Parche 2 y 8.7 anterior al Parche 3 en Windows, podría permitir a atacantes remotos evitar las comprobaciones de autorización y realizar una llamada RPC a través de vectores no especificados. BMC BladeLogic RSCD Agent version 8.3.00.64 suffers fro... • https://www.exploit-db.com/exploits/43902 • CWE-285: Improper Authorization •
CVE-2016-2349
https://notcve.org/view.php?id=CVE-2016-2349
21 Dec 2016 — Remedy AR System Server in BMC Remedy 8.1 SP 2, 9.0, 9.0 SP 1, and 9.1 allows attackers to reset arbitrary passwords via a blank previous password. Remedy AR System Server en BMC Remedy 8.1 SP 2, 9.0, 9.0 SP 1 y 9.1 permite a atacantes reiniciar contraseñas arbitrarias a través de una contraseña en blanco previa. • http://www.securityfocus.com/bid/95075 • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •
CVE-2016-9638
https://notcve.org/view.php?id=CVE-2016-9638
02 Dec 2016 — In BMC Patrol before 9.13.10.02, the binary "listguests64" is configured with the setuid bit. However, when executing it, it will look for a binary named "virsh" using the PATH environment variable. The "listguests64" program will then run "virsh" using root privileges. This allows local users to elevate their privileges to root. En BMC Patrol en versiones anteriores a 9.13.10.02 el binario "listguests64" está configurado con el bit setuid. • http://www.nes.fr/securitylab/index.php/2016/12/02/privilege-escalation-on-bmc-patrol • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2016-4322
https://notcve.org/view.php?id=CVE-2016-4322
04 Sep 2016 — BMC BladeLogic Server Automation (BSA) before 8.7 Patch 3 allows remote attackers to bypass authentication and consequently read arbitrary files or possibly have unspecified other impact by leveraging a "logic flaw" in the authentication process. Una vulnerabilidad de divulgación de información en libstagefright en Mediaserver en Android 4.x en versiones anteriores a 4.4.4, 5.0.x en versiones anteriores a 5.0.2, 5.1.x en versiones anteriores a 5.1.1, 6.x en versiones anteriores a 2016-11-01 y 7.0 en version... • http://packetstormsecurity.com/files/138600/BMC-BladeLogic-Server-Automation-For-Linux-8.7-Directory-Dump.html • CWE-287: Improper Authentication •