CVE-2014-8270

BMC Track-It! 11.3 allows remote attackers to gain privileges and execute arbitrary code by creating an account whose name matches that of a local system account, then performing a password reset.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bmc:track-it\!:11.3:*:*:*:*:*:*:*

History

02 Aug 2023, 19:00

Type Values Removed Values Added
CPE cpe:2.3:a:bmc:bmc_track-it\!:11.3.0:*:*:*:*:*:*:* cpe:2.3:a:bmc:track-it\!:11.3:*:*:*:*:*:*:*
First Time Bmc track-it\!
References (MISC) http://www.zerodayinitiative.com/advisories/ZDI-14-419/ - (MISC) http://www.zerodayinitiative.com/advisories/ZDI-14-419/ - Third Party Advisory, VDB Entry
References (CONFIRM) http://support.numarasoftware.com/support/articles.asp?how=%20AND%20&mode=detail&kcriteria=7508&ID=7654 - (CONFIRM) http://support.numarasoftware.com/support/articles.asp?how=%20AND%20&mode=detail&kcriteria=7508&ID=7654 - Broken Link, Vendor Advisory

Information

Published : 2014-12-12 11:59

Updated : 2023-12-10 11:31


NVD link : CVE-2014-8270

Mitre link : CVE-2014-8270

CVE.ORG link : CVE-2014-8270


JSON object : View

Products Affected

bmc

  • track-it\!
CWE
CWE-264

Permissions, Privileges, and Access Controls