Page 25 of 221 results (0.009 seconds)

CVSS: 9.0EPSS: 0%CPEs: 13EXPL: 0

Remote unauthorized command execution and unauthorized disclosure of information in Micro Focus Service Manager, versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61. This vulnerability could allow Remote unauthorized command execution and unauthorized disclosure of information. Ejecución remota de comandos no autorizados y divulgación no autorizada de información en Micro Focus Service Manager, versiones 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61. Esta vulnerabilidad podría permitir la ejecución remota de comandos no autorizados y la divulgación no autorizada de información. • https://softwaresupport.softwaregrp.com/doc/KM03452977 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The ServiceNow driver in NetIQ Identity Manager versions prior to 4.6 are susceptible to an information disclosure vulnerability. El controlador ServiceNow en las versiones del Gestor de identidades NetIQ anteriores a la 4.6 es susceptible a una vulnerabilidad de divulgación de información. • https://www.netiq.com/documentation/identity-manager-46/releasenotes_idm46/data/releasenotes_idm46.html#t433o7au0niu • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 0%CPEs: 3EXPL: 0

A DOM based XSS vulnerability has been identified in the Netstorage component of Open Enterprise Server (OES) allowing a remote attacker to execute javascript in the victims browser by tricking the victim into clicking on a specially crafted link. This affects OES versions OES2015SP1, OES2018, and OES2018SP1. Older versions may be affected but were not tested as they are out of support. Se identificó una vulnerabilidad de tipo XSS basada en DOM en el componente Netstorage de Open Enterprise Server (OES) que permite a un atacante remoto ejecutar javascript en el navegador de víctimas engañando al usuario para que haga clic en un enlace especialmente creado. Esto afecta a las versiones de OES OES2015SP1, OES2018 y OES2018SP1. • https://support.microfocus.com/kb/doc.php?id=7023828 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 11EXPL: 0

A potential security vulnerability has been identified in Micro Focus Network Automation Software 9.20, 9.21, 10.00, 10.10, 10.20, 10.30, 10.40, 10.50, 2018.05, 2018.08, 2018.11, and Micro Focus Network Operations Management (NOM) all versions. The vulnerability could be remotely exploited to Remote Code Execution. Se ha identificado una potencial vulnerabilidad de seguridad en las versiones de Micro Focus Network Automation Software 9.20, 9.21, 10.00, 10.10, 10.20, 10.30, 10.40, 10.50, 2018.05, 2018.08, 2018.11 y en todas las versiones de Micro Focus Network Operations Management (NOM). La vulnerabilidad podría ser explotada remotamente para la Ejecución Remota de Código. • https://softwaresupport.softwaregrp.com/doc/KM03407763 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An unauthenticated file upload vulnerability has been identified in the Web Client component of Micro Focus Content Manager 9.1, 9.2, and 9.3 when configured to use the ADFS authentication method. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to arbitrary locations on the Content Manager server. Se ha identificado una vulnerabilidad de subida de archivos no autenticados en el componente del cliente web de Micro Focus Content Manager, en sus versiones 9.1, 9.2 y 9.3, cuando se configuran para utilizar el método de autenticación ADFS. Esta vulnerabilidad podría ser explotada por un atacante remoto no autenticado para subir contenido a ubicaciones arbitrarias en el servidor Content Manager. • https://softwaresupport.softwaregrp.com/doc/KM03359911 • CWE-434: Unrestricted Upload of File with Dangerous Type •