Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bmc vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2008-5982
Format string vulnerability in BMC PATROL Agent prior to 3.7.30 allows remote malicious users to execute arbitrary code via format string specifiers in an invalid version number to TCP port 3181, which are not properly handled when writing a log message.
Bmc Patrol Agent 3.4.00
Bmc Patrol Agent 3.3.00
Bmc Patrol Agent 3.2.3
Bmc Patrol Agent 3.2.5
Bmc Patrol Agent 3.4.11
Bmc Patrol Agent
Bmc Patrol Agent 3.2
Bmc Patrol Agent 3.2.7
10
CVSSv2
CVE-1999-0801
BMC Patrol allows remote malicious users to gain access to an agent by spoofing frames.
Bmc Patrol Agent 3.2.3
10
CVSSv2
CVE-1999-0443
Patrol management software allows a remote malicious user to conduct a replay attack to steal the administrator password.
Bmc Patrol Agent 3.2.3
9
CVSSv2
CVE-2020-5633
Multiple NEC products (Express5800/T110j, Express5800/T110j-S, Express5800/T110j (2nd-Gen), Express5800/T110j-S (2nd-Gen), iStorage NS100Ti, and Express5800/GT110j) where Baseboard Management Controller (BMC) firmware Rev1.09 and previous versions is applied allows remote malicio...
Nec Baseboard Management Controller
8.5
CVSSv2
CVE-2022-22374
The BMC (IBM Power 9 AC922 OP910, OP920, OP930, and OP940) may be subject to a firmware downgrade attack which may affect its ability to operate its host. IBM X-Force ID: 221442.
Ibm Power 9 Ac922 Firmware Op910
Ibm Power 9 Ac922 Firmware Op920
Ibm Power 9 Ac922 Firmware Op930
Ibm Power 9 Ac922 Firmware Op940
8.5
CVSSv2
CVE-2019-19216
BMC Control-M/Agent 7.0.00.000 has an Insecure File Copy.
Bmcsoftware Control-m\\/agent 7.0.00.000
8.5
CVSSv2
CVE-2019-19217
BMC Control-M/Agent 7.0.00.000 allows OS Command Injection.
Bmcsoftware Control-m\\/agent 7.0.00.000
8.5
CVSSv2
CVE-2019-19220
BMC Control-M/Agent 7.0.00.000 allows OS Command Injection (issue 2 of 2).
Bmcsoftware Control-m\\/agent 7.0.00.000
8.5
CVSSv2
CVE-2012-4078
The Baseboard Management Controller (BMC) in Cisco Unified Computing System (UCS) does not properly handle SSH escape sequences, which allows remote authenticated users to bypass an unspecified authentication step via SSH port forwarding, aka Bug ID CSCtg17656.
Cisco Unified Computing System 1.0\\(2k\\)
Cisco Unified Computing System 1.1\\(1m\\)
Cisco Unified Computing System 1.1 Base
Cisco Unified Computing System 1.0 Base
7.8
CVSSv2
CVE-2013-4786
The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote malicious users to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.
Oracle Fujitsu M10 Firmware
Intel Intelligent Platform Management Interface 2.0
1 EDB exploit
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »