Page 9 of 62 results (0.011 seconds)

CVSS: 7.5EPSS: 33%CPEs: 11EXPL: 2

The RPC API in RSCD agent in BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x on Linux and UNIX allows remote attackers to bypass authorization and enumerate users by sending an action packet to xmlrpc after an authorization failure. El agente RPC API en RSCD en BMC BladeLogic Server Automation (BSA) 8.2.x, 8.3.x, 8.5.x, 8.6.x y 8.7.x en Linux y UNIX permite a atacantes remotos eludir la autorización y enumerar usuarios mandando un paquete de acción a xmlrpc después de un fallo de autorización. BMC BladeLogic version 8.3.00.64 suffers from a remote command execution vulnerability. • https://www.exploit-db.com/exploits/43902 https://www.exploit-db.com/exploits/43939 http://packetstormsecurity.com/files/136461/BMC-Server-Automation-BSA-RSCD-Agent-User-Enumeration.html http://www.securityfocus.com/archive/1/537909/100/0/threaded https://selfservice.bmc.com/casemgmt/sc_KnowledgeArticle?sfdcid=kA214000000dBpnCAE&type=Solution https://www.insinuator.net/2016/03/bmc-bladelogic-cve-2016-1542-and-cve-2016-1543 https://insinuator.net/2016/03/bmc-bladelogic-cve-2016-1542-and-cve-2016-1 • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

AR System Mid Tier in the AR System Mid Tier component before 9.0 SP1 for BMC Remedy AR System Server allows remote authenticated users to "navigate" to arbitrary files via the __report parameter of the BIRT viewer servlet. AR System Mid Tier en el componente AR System Mid Tier versiones anteriores a 9.0 SP1 para BMC Remedy AR System Server, permite a usuarios autenticados remotos "navegar" en archivos arbitrarios por medio del parámetro __report del servlet del visor BIRT. • https://communities.bmc.com/docs/DOC-77816 https://packetstormsecurity.com/files/133688/BMC-Remedy-AR-8.1-9.0-File-Inclusion.html • CWE-269: Improper Privilege Management •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

The BIRT Engine servlet in the AR System Mid Tier component before 9.0 SP1 for BMC Remedy AR System Server allows remote authenticated users to "navigate" to arbitrary local files via the __imageid parameter. El servlet BIRT Engine en el componente AR System Mid Tier versión anterior a 9.0 SP1, para BMC Remedy AR System Server, permite a usuarios autenticados remotos "navegar" en archivos locales arbitrarios por medio del parámetro __imageid. • https://communities.bmc.com/docs/DOC-77816 https://packetstormsecurity.com/files/133689/BMC-Remedy-AR-8.1-9.0-File-Inclusion.html • CWE-269: Improper Privilege Management •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

BMC Track-It! 11.3 allows remote attackers to gain privileges and execute arbitrary code by creating an account whose name matches that of a local system account, then performing a password reset. BMC Track-It! 11.3 permite a atacantes remotos ganar privilegios y ejecutar código arbitrario mediante la ceración de una cuenta cuya nombre coincide con él de una cuenta de sistema local, posteriormente realizando una recalibración de la contraseña. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of BMC Track-It!. • http://support.numarasoftware.com/support/articles.asp?how=%20AND%20&mode=detail&kcriteria=7508&ID=7654 http://www.zerodayinitiative.com/advisories/ZDI-14-419 https://www.zerodayinitiative.com/advisories/ZDI-14-419 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

BMC Track-It! 11.3.0.355 allows remote authenticated users to read arbitrary files by visiting the TrackItWeb/Attachment page. BMC Track-It! 11.3.0.355 permite a usuarios remotos autenticados leer ficheros arbitrarios mediante la visita a la página TrackItWeb/Attachment. BMC Track-it! • https://www.exploit-db.com/exploits/34924 http://packetstormsecurity.com/files/128594/BMC-Track-it-Remote-Code-Execution-SQL-Injection.html http://www.kb.cert.org/vuls/id/121036 https://raw.githubusercontent.com/pedrib/PoC/master/generic/bmc-track-it-11.3.txt • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •