📦 Control M\/agent
by Bmc
🔍 What is Control M\/agent?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows attackers to bypass Access Control Lists in Control-M/Agent by using specially crafted client certificates with NULL bytes in email addresses. Affected systems include Contro...
An authentication bypass vulnerability in Control-M/Agent allows remote attackers to authenticate using expired demo or third-party certificates instead of organization-signed certificates when defaul...
A path traversal vulnerability in Control-M/Agent allows local attackers to escalate privileges on systems running affected versions. This impacts users with access to the system running the Agent, pa...
CVE-2025-55112 allows attackers to decrypt network traffic between Control-M/Agent and Server when Blowfish encryption is configured, due to a hardcoded cryptographic key. This affects organizations u...
A stack-based buffer overflow vulnerability in Control-M/Agent allows remote attackers to potentially execute arbitrary code or crash the service when SSL/TLS communication is configured with specific...
This vulnerability allows local attackers to access sensitive SSL keys, passwords, and policy files due to overly permissive file permissions in Control-M/Agent. Affected systems include out-of-suppor...