Filtered by vendor Baramundi
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-37605 | 1 Baramundi | 1 Enterprise Mobility Management | 2024-11-21 | N/A | 5.5 MEDIUM |
Weak Exception Handling vulnerability in baramundi software GmbH EMM Agent 23.1.50 and before allows an attacker to cause a denial of service via a crafted request to the password parameter. | |||||
CVE-2022-43747 | 1 Baramundi | 1 Management Suite | 2024-11-21 | N/A | 7.5 HIGH |
baramundi Management Agent (bMA) in baramundi Management Suite (bMS) 2021 R1 and R2 and 2022 R1 allows remote code execution. This is fixed in security update S-2022-01, which contains fixed bMA setup files for these versions. This also is fixed in baramundi Management Suite 2022 R2. | |||||
CVE-2013-3625 | 1 Baramundi | 1 Management Suite | 2024-11-21 | 7.8 HIGH | N/A |
An unspecified DLL file in Baramundi Management Suite 7.5 through 8.9 uses a hardcoded encryption key, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from a product installation elsewhere. | |||||
CVE-2013-3624 | 1 Baramundi | 1 Management Suite | 2024-11-21 | 7.8 HIGH | N/A |
The OS deployment feature in Baramundi Management Suite 7.5 through 8.9 stores credentials in cleartext on deployed machines, which allows remote attackers to obtain sensitive information by reading a file. NOTE: this ID was also incorrectly mapped to a separate issue in Oracle Outside In, but the correct ID for that issue is CVE-2013-5763. | |||||
CVE-2013-3593 | 1 Baramundi | 1 Management Suite | 2024-11-21 | 7.8 HIGH | N/A |
Baramundi Management Suite 7.5 through 8.9 uses cleartext for (1) client-server communication and (2) data storage, which allows remote attackers to obtain sensitive information by sniffing the network, and allows context-dependent attackers to obtain sensitive information by reading a file. |