Bmc

Control-m

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 07.08.2025 20:15:28
  • Zuletzt bearbeitet 01.12.2025 22:15:48

BMC Control-M/Server 9.0.21.300 displays cleartext database credentials in process lists and logs. An authenticated attacker with shell access could observe these credentials and use them to log in to the database server. For example, when Control-M/...

  • EPSS 0.03%
  • Veröffentlicht 18.03.2024 10:15:20
  • Zuletzt bearbeitet 06.03.2025 14:25:09

BMC Control-M branches 9.0.20 and 9.0.21 upon user login load all Dynamic Link Libraries (DLL) from a directory that grants Write and Read permissions to all users. Leveraging it leads to loading of a potentially malicious libraries, which will exe...

  • EPSS 0.11%
  • Veröffentlicht 18.03.2024 10:15:20
  • Zuletzt bearbeitet 06.03.2025 14:25:09

Lack of input sanitization in BMC Control-M branches 9.0.20 and 9.0.21 allows logged-in users for manipulation of generated web pages via injection of HTML code. This might lead to a successful phishing attack for example by tricking users into us...

  • EPSS 0.07%
  • Veröffentlicht 18.03.2024 10:15:19
  • Zuletzt bearbeitet 06.03.2025 14:25:09

Improper authorization in the report management and creation module of BMC Control-M branches 9.0.20 and 9.0.21 allows logged-in users to read and make unauthorized changes to any reports available within the application, even without proper permissi...

  • EPSS 0.07%
  • Veröffentlicht 31.07.2023 23:15:10
  • Zuletzt bearbeitet 21.11.2024 08:14:45

BMC Control-M through 9.0.20.200 allows SQL injection via the /RF-Server/report/deleteReport report-id parameter. This is fixed in 9.0.21 (and is also fixed by a patch for 9.0.20.200).

Exploit
  • EPSS 0.08%
  • Veröffentlicht 25.02.2023 20:15:11
  • Zuletzt bearbeitet 11.03.2025 21:15:40

A SQL injection vulnerability in BMC Control-M before 9.0.20.214 allows attackers to execute arbitrary SQL commands via the memname JSON field.