The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of BPPM

BMC Patrol: privilege escalation via virsh
An attacker can bypass restrictions via virsh of BMC Patrol, in order to escalate his privileges...
CVE-2016-9638, VIGILANCE-VUL-21264
BMC Performance: code execution via BGS_MULTIPLE_READS
An attacker can send a malicious command to BMC Performance (BMC PATROL Agent), in order to execute code with system privileges...
BID-46151, CVE-2011-0975, QM001683974, VIGILANCE-VUL-10325, ZDI-11-039
BMC Patrol Agent: format string attack
An attacker can use a format string attack of BMC Patrol Agent in order to execute code on the service...
BID-32692, CVE-2008-5982, VIGILANCE-VUL-8300, ZDI-08-082
BMC Patrol, Performance Manager: two vulnerabilities
Two vulnerabilities affect BMC Patrol and Performance Manager...
BID-23557, BID-23559, CVE-2007-1972, CVE-2007-2136, VIGILANCE-VUL-6751, ZDI-07-019, ZDI-07-020
Our database contains other pages. You can request a free trial to read them.

Display information about BPPM: