Micro Focus Micro Focus Digital Transformation and Enterprise Software Modernization

Do you want an email whenever new security vulnerabilities are reported in any Micro Focus product?

Products by Micro Focus Sorted by Most Security Vulnerabilities since 2018

Micro Focus Service Manager16 vulnerabilities

Micro Focus Edirectory10 vulnerabilities

Micro Focus Access Manager10 vulnerabilities

Micro Focus Arcsight Logger5 vulnerabilities

Micro Focus Content Manager3 vulnerabilities

Micro Focus Sentinel2 vulnerabilities

Micro Focus Filr2 vulnerabilities

Micro Focus Data Protector2 vulnerabilities

Micro Focus Cms Server2 vulnerabilities

Micro Focus Vibe1 vulnerability

Micro Focus Acutoweb1 vulnerability

Micro Focus Client1 vulnerability

Micro Focus Groupwise1 vulnerability

Micro Focus Idol1 vulnerability

Micro Focus Imanager1 vulnerability

@microfocus Tweets

Join us for this new #SecOps webinar on May 4 to learn about key features and benefits of #ArcSight 2021.1, includi… https://t.co/HlA34RaFyo
Wed Apr 21 14:11:00 +0000 2021

IT Manager in #Education sector gives @MicroFocus ZENworks ★★★★★'s on @Gartner_PI. Read the full #UEM review...… https://t.co/oDWxjijtQG
Wed Apr 21 13:31:00 +0000 2021

Formula E #FanBoost voting has opened up! Let’s give @MitchEvans_ and @SamBirdOfficial extra power for… https://t.co/VKwh2IE8Us
Wed Apr 21 12:35:01 +0000 2021

#Serverless and #FaaS are hot topics. But you need to understand the differences—and what they mean to your data… https://t.co/9bPuIUUpSk
Wed Apr 21 12:00:05 +0000 2021

As #MicroFocus celebrates #EarthDay2021, our pledge is to encourage and inspire sustainable actions – because we be… https://t.co/PT0GiIhbfa
Wed Apr 21 08:35:01 +0000 2021

By the Year

In 2021 there have been 19 vulnerabilities in Micro Focus with an average score of 6.8 out of ten. Last year Micro Focus had 27 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Micro Focus in 2021 could surpass last years number. Last year, the average CVE base score was greater by 0.10

Year Vulnerabilities Average Score
2021 19 6.81
2020 27 6.91
2019 34 7.29
2018 37 7.68

It may take a day or so for new Micro Focus vulnerabilities to show up. Additionally vulnerabilities may be tagged under a different product or component name.

Latest Micro Focus Security Vulnerabilities

Reflected XSS vulnerability in Micro Focus Application Automation Tools Plugin - Jenkins plugin

CVE-2021-22510 6.1 - Medium - April 08, 2021

Reflected XSS vulnerability in Micro Focus Application Automation Tools Plugin - Jenkins plugin. The vulnerability affects all version 6.7 and earlier versions.

XSS

Cross-Site Request Forgery (CSRF) vulnerability in Micro Focus Application Automation Tools Plugin - Jenkins plugin

CVE-2021-22512 6.5 - Medium - April 08, 2021

Cross-Site Request Forgery (CSRF) vulnerability in Micro Focus Application Automation Tools Plugin - Jenkins plugin. The vulnerability affects version 6.7 and earlier versions. The vulnerability could allow form validation without permission checks.

Session Riding

Improper Certificate Validation vulnerability in Micro Focus Application Automation Tools Plugin - Jenkins plugin

CVE-2021-22511 6.5 - Medium - April 08, 2021

Improper Certificate Validation vulnerability in Micro Focus Application Automation Tools Plugin - Jenkins plugin. The vulnerability affects version 6.7 and earlier versions. The vulnerability could allow unconditionally disabling of SSL/TLS certificates.

Improper Certificate Validation

Missing Authorization vulnerability in Micro Focus Application Automation Tools Plugin - Jenkins plugin

CVE-2021-22513 6.5 - Medium - April 08, 2021

Missing Authorization vulnerability in Micro Focus Application Automation Tools Plugin - Jenkins plugin. The vulnerability affects version 6.7 and earlier versions. The vulnerability could allow access without permission checks.

AuthZ

Authentication bypass vulnerability in Micro Focus Operations Bridge Manager affects versions 2019.05, 2019.11, 2020.05 and 2020.10

CVE-2021-22507 9.8 - Critical - April 08, 2021

Authentication bypass vulnerability in Micro Focus Operations Bridge Manager affects versions 2019.05, 2019.11, 2020.05 and 2020.10. The vulnerability could allow remote attackers to bypass user authentication and get unauthorized access.

authentification

Cross-Site scripting vulnerability in Micro Focus Access Manager product, affects all version prior to version 5.0

CVE-2020-25840 6.1 - Medium - March 26, 2021

Cross-Site scripting vulnerability in Micro Focus Access Manager product, affects all version prior to version 5.0. The vulnerability could cause configuration destruction.

XSS

Advance configuration exposing Information Leakage vulnerability in Micro Focus Access Manager product

CVE-2021-22506 7.5 - High - March 26, 2021

Advance configuration exposing Information Leakage vulnerability in Micro Focus Access Manager product, affects all versions prior to version 5.0. The vulnerability could cause information leakage.

Information Disclosure

Authentication Bypass Vulnerability in Micro Focus Access Manager Product, affects all version prior to version 4.5.3.3

CVE-2021-22496 7.5 - High - March 25, 2021

Authentication Bypass Vulnerability in Micro Focus Access Manager Product, affects all version prior to version 4.5.3.3. The vulnerability could cause information leakage.

authentification

Micro Focus Solutions Business Manager versions prior to 11.7.1 are vulnerable to stored XSS

CVE-2019-18942 4.8 - Medium - February 26, 2021

Micro Focus Solutions Business Manager versions prior to 11.7.1 are vulnerable to stored XSS. The application reflects previously stored user input without encoding.

XSS

Micro Focus Solutions Business Manager versions prior to 11.7.1 are vulnerable to XML External Entity Processing (XXE) on certain operations.

CVE-2019-18943 8 - High - February 26, 2021

Micro Focus Solutions Business Manager versions prior to 11.7.1 are vulnerable to XML External Entity Processing (XXE) on certain operations.

XXE

Micro Focus Solutions Business Manager Application Repository versions prior to 11.7.1 are vulnerable to reflected XSS.

CVE-2019-18944 4.8 - Medium - February 26, 2021

Micro Focus Solutions Business Manager Application Repository versions prior to 11.7.1 are vulnerable to reflected XSS.

XSS

Micro Focus Solutions Business Manager Application Repository versions prior to 11.7.1 are vulnerable to privilege escalation vulnerability.

CVE-2019-18945 8 - High - February 26, 2021

Micro Focus Solutions Business Manager Application Repository versions prior to 11.7.1 are vulnerable to privilege escalation vulnerability.

Improper Privilege Management

Micro Focus Solutions Business Manager Application Repository versions prior to 11.7.1 are vulnerable to session fixation.

CVE-2019-18946 4.8 - Medium - February 26, 2021

Micro Focus Solutions Business Manager Application Repository versions prior to 11.7.1 are vulnerable to session fixation.

Session Fixation

Micro Focus Solutions Business Manager Application Repository versions prior to 11.7.1 are vulnerable to information disclosure.

CVE-2019-18947 3.5 - Low - February 26, 2021

Micro Focus Solutions Business Manager Application Repository versions prior to 11.7.1 are vulnerable to information disclosure.

Information Disclosure

Arbitrary code execution vulnerability on Micro Focus Operations Bridge Manager product

CVE-2021-22504 9.8 - Critical - February 12, 2021

Arbitrary code execution vulnerability on Micro Focus Operations Bridge Manager product, affecting versions 10.1x, 10.6x, 2018.05, 2018.11, 2019.05, 2019.11, 2020.05, 2020.10. The vulnerability could allow remote attackers to execute arbitrary code on an OBM server.

Remote Code execution vulnerability in Micro Focus Operation Bridge Reporter (OBR) product, affecting version 10.40

CVE-2021-22502 9.8 - Critical - February 08, 2021

Remote Code execution vulnerability in Micro Focus Operation Bridge Reporter (OBR) product, affecting version 10.40. The vulnerability could be exploited to allow Remote Code Execution on the OBR server.

Code Injection

Cross Site Request Forgery vulnerability in Micro Focus Application Performance Management product, affecting versions 9.40, 9.50 and 9.51

CVE-2021-22500 6.5 - Medium - February 06, 2021

Cross Site Request Forgery vulnerability in Micro Focus Application Performance Management product, affecting versions 9.40, 9.50 and 9.51. The vulnerability could be exploited by attacker to trick the users into executing actions of the attacker's choosing.

Session Riding

Persistent Cross-Site scripting vulnerability in Micro Focus Application Performance Management product

CVE-2021-22499 4.8 - Medium - February 06, 2021

Persistent Cross-Site scripting vulnerability in Micro Focus Application Performance Management product, affecting versions 9.40, 9.50 and 9.51. The vulnerability could allow persistent XSS attack.

XSS

XML External Entity Injection vulnerability in Micro Focus Application Lifecycle Management (Previously known as Quality Center) product

CVE-2021-22498 8.1 - High - January 19, 2021

XML External Entity Injection vulnerability in Micro Focus Application Lifecycle Management (Previously known as Quality Center) product. The vulnerability affects versions 12.x, 12.60 Patch 5 and earlier, 15.0.1 Patch 2 and earlier and 15.5. The vulnerability could be exploited to allow an XML External Entity Injection.

XXE

Unauthorized disclosure of sensitive information vulnerability in Micro Focus Filr product

CVE-2020-25838 6.5 - Medium - December 11, 2020

Unauthorized disclosure of sensitive information vulnerability in Micro Focus Filr product. Affecting all 3.x and 4.x versions. The vulnerability could be exploited to disclose unauthorized sensitive information.

Information Disclosure

NetIQ Identity Manager 4.8 prior to version 4.8 SP2 HF1 are affected by an injection vulnerability

CVE-2020-25839 9.8 - Critical - November 20, 2020

NetIQ Identity Manager 4.8 prior to version 4.8 SP2 HF1 are affected by an injection vulnerability. This vulnerability is fixed in NetIQ IdM 4.8 SP2 HF1.

SQL Injection

Arbitrary code execution vulnerability on Micro Focus ArcSight Logger product, affecting all version prior to 7.1.1

CVE-2020-11851 9.8 - Critical - November 17, 2020

Arbitrary code execution vulnerability on Micro Focus ArcSight Logger product, affecting all version prior to 7.1.1. The vulnerability could be remotely exploited resulting in the execution of arbitrary code.

Code Injection

Reflected Cross Site scripting vulnerability on Micro Focus Filr product, affecting version 4.2.1

CVE-2020-25832 5.4 - Medium - November 17, 2020

Reflected Cross Site scripting vulnerability on Micro Focus Filr product, affecting version 4.2.1. The vulnerability could be exploited to perform Reflected XSS attack.

XSS

Persistent cross-Site Scripting vulnerability on Micro Focus IDOL product, affecting all version prior to version 12.7

CVE-2020-25833 4.8 - Medium - November 17, 2020

Persistent cross-Site Scripting vulnerability on Micro Focus IDOL product, affecting all version prior to version 12.7. The vulnerability could be exploited to perform Persistent XSS attack.

XSS

Cross-Site Scripting vulnerability on Micro Focus ArcSight Logger product, affecting all version prior to 7.1.1

CVE-2020-11860 6.1 - Medium - November 17, 2020

Cross-Site Scripting vulnerability on Micro Focus ArcSight Logger product, affecting all version prior to 7.1.1. The vulnerability could be remotely exploited resulting in Cross-Site Scripting (XSS)

XSS

Cross-Site Scripting vulnerability on Micro Focus ArcSight Logger product, affecting version 7.1

CVE-2020-25834 6.1 - Medium - November 17, 2020

Cross-Site Scripting vulnerability on Micro Focus ArcSight Logger product, affecting version 7.1. The vulnerability could be remotely exploited resulting in Cross-Site Scripting (XSS).

XSS

Sensitive information disclosure vulnerability in Micro Focus Self Service Password Reset (SSPR) product

CVE-2020-25837 7.5 - High - November 05, 2020

Sensitive information disclosure vulnerability in Micro Focus Self Service Password Reset (SSPR) product. The vulnerability affects versions 4.4.0.0 to 4.4.0.6 and 4.5.0.1 and 4.5.0.2. In certain configurations the vulnerability could disclose sensitive information.

Information Disclosure

Arbitrary code execution vlnerability in Operation bridge Manager

CVE-2020-11854 9.8 - Critical - October 27, 2020

Arbitrary code execution vlnerability in Operation bridge Manager, Application Performance Management and Operations Bridge (containerized) vulnerability in Micro Focus products products Operation Bridge Manager, Operation Bridge (containerized) and Application Performance Management. The vulneravility affects: 1.) Operation Bridge Manager versions 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. 3.) Application Performance Management versions 9,51, 9.50 and 9.40 with uCMDB 10.33 CUP 3. The vulnerability could allow Arbitrary code execution.

authentification

Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized)

CVE-2020-11858 7.8 - High - October 27, 2020

Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility affects: 1.) Operation Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, 10.63,10.62, 10.61, 10.60, 10.12, 10.11, 10.10 and all earlier versions. 2.) Operations Bridge (containerized) versions: 2020.05, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05. 2018.02 and 2017.11. The vulnerability could allow local attackers to execute code with escalated privileges.

Arbitrary code execution vulnerability affecting multiple Micro Focus products

CVE-2020-11853 8.8 - High - October 22, 2020

Arbitrary code execution vulnerability affecting multiple Micro Focus products. 1.) Operation Bridge Manager affecting version: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versions 10.6x and 10.1x and older versions. 2.) Application Performance Management affecting versions : 9.51, 9.50 and 9.40 with uCMDB 10.33 CUP 3 3.) Data Center Automation affected version 2019.11 4.) Operations Bridge (containerized) affecting versions: 2019.11, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05, 2018.02, 2017.11 5.) Universal CMDB affecting version: 2020.05, 2019.11, 2019.05, 2019.02, 2018.11, 2018.08, 2018.05, 11, 10.33, 10.32, 10.31, 10.30 6.) Hybrid Cloud Management affecting version 2020.05 7.) Service Management Automation affecting version 2020.5 and 2020.02. The vulnerability could allow to execute arbitrary code.

Denial of service vulnerability on Micro Focus ArcSight Management Center

CVE-2020-11848 7.5 - High - August 19, 2020

Denial of service vulnerability on Micro Focus ArcSight Management Center. Affecting all versions prior to version 2.9.5. The vulnerability could cause the server to become unavailable, causing a denial of service.

DKIM key management page vulnerability on Micro Focus Secure Messaging Gateway (SMG)

CVE-2020-11852 8.8 - High - August 07, 2020

DKIM key management page vulnerability on Micro Focus Secure Messaging Gateway (SMG). Affecting all SMG Appliance running releases prior to July 2020. The vulnerability could allow a logged in user with rights to generate DKIM key information to inject system commands into the call to the DKIM system command.

Injection

Cross Site Scripting (XSS) vulnerability in Micro Focus ArcSight Management Center product

CVE-2020-11838 5.4 - Medium - June 16, 2020

Cross Site Scripting (XSS) vulnerability in Micro Focus ArcSight Management Center product, Affecting versions 2.6.1, 2.7.x, 2.8.x, 2.9.x prior to 2.9.4. The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting (XSS) or information disclosure.

XSS

Unauthorized information disclosure vulnerability in Micro Focus ArcSight Management Center product

CVE-2020-11840 4.3 - Medium - June 16, 2020

Unauthorized information disclosure vulnerability in Micro Focus ArcSight Management Center product, Affecting versions 2.6.1, 2.7.x, 2.8.x, 2.9.x prior to 2.9.4. The vulnerabilities could be remotely exploited resulting unauthorized information disclosure.

Information Disclosure

Unauthorized information disclosure vulnerability in Micro Focus ArcSight Management Center product

CVE-2020-11841 4.3 - Medium - June 16, 2020

Unauthorized information disclosure vulnerability in Micro Focus ArcSight Management Center product, Affecting versions 2.6.1, 2.7.x, 2.8.x, 2.9.x prior to 2.9.4. The vulnerabilities could be remotely exploited resulting unauthorized information disclosure.

Information Disclosure

Cross Site Scripting (XSS) vulnerability in Micro Focus ArcSight Logger product, affecting all version from 6.6.1 up to version 7.0.1

CVE-2020-11839 6.1 - Medium - June 12, 2020

Cross Site Scripting (XSS) vulnerability in Micro Focus ArcSight Logger product, affecting all version from 6.6.1 up to version 7.0.1. The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting (XSS) or information disclosure.

XSS

Incorrect Authorization vulnerability in Micro Focus Container Deployment Foundation component affects products: - Hybrid Cloud Management

CVE-2020-11844 9.8 - Critical - May 29, 2020

Incorrect Authorization vulnerability in Micro Focus Container Deployment Foundation component affects products: - Hybrid Cloud Management. Versions 2018.05 to 2019.11. - ArcSight Investigate. versions 2.4.0, 3.0.0 and 3.1.0. - ArcSight Transformation Hub. versions 3.0.0, 3.1.0, 3.2.0. - ArcSight Interset. version 6.0.0. - ArcSight ESM (when ArcSight Fusion 1.0 is installed). version 7.2.1. - Service Management Automation (SMA). versions 2018.05 to 2020.02 - Operation Bridge Suite (Containerized). Versions 2018.05 to 2020.02. - Network Operation Management. versions 2017.11 to 2019.11. - Data Center Automation Containerized. versions 2018.05 to 2019.11 - Identity Intelligence. versions 1.1.0 and 1.1.1. The vulnerability could be exploited to provide unauthorized access to the Container Deployment Foundation.

AuthZ

Cross Site Scripting vulnerability in Micro Focus Service Manager product

CVE-2020-11845 6.1 - Medium - May 19, 2020

Cross Site Scripting vulnerability in Micro Focus Service Manager product. Affecting versions 9.50, 9.51, 9.52, 9.60, 9.61, 9.62, 9.63. The vulnerability could be exploited to allow remote attackers to inject arbitrary web script or HTML.

XSS

Cross Site scripting vulnerability on Micro Focus Enterprise Server and Enterprise developer

CVE-2020-9524 5.4 - Medium - May 18, 2020

Cross Site scripting vulnerability on Micro Focus Enterprise Server and Enterprise developer, affecting all versions prior to version 5.0 Patch Update 8. The vulnerability could allow an attacker to trigger administrative actions when an administrator viewed malicious data left by the attacker (stored XSS) or followed a malicious link (reflected XSS).

XSS

Information disclosure vulnerability in Micro Focus Verastream Host Integrator (VHI) product

CVE-2020-11842 7.5 - High - May 04, 2020

Information disclosure vulnerability in Micro Focus Verastream Host Integrator (VHI) product, affecting versions earlier than 7.8 Update 1 (7.8.49 or 7.8.0.49). The vulnerability allows an unauthenticated attackers to view information they may not have been authorized to view.

Information Disclosure

Insufficiently protected credentials vulnerability on Micro Focus enterprise developer and enterprise server

CVE-2020-9523 8.8 - High - April 17, 2020

Insufficiently protected credentials vulnerability on Micro Focus enterprise developer and enterprise server, affecting all version prior to 4.0 Patch Update 16, and version 5.0 Patch Update 6. The vulnerability could allow an attacker to transmit hashed credentials for the user account running the Micro Focus Directory Server (MFDS) to an arbitrary site, compromising that account's security.

Insufficiently Protected Credentials

An SQL injection vulnerability was discovered in Micro Focus Service Manager Automation (SMA)

CVE-2020-9521 8.8 - High - March 26, 2020

An SQL injection vulnerability was discovered in Micro Focus Service Manager Automation (SMA), affecting versions 2019.08, 2019.05, 2019.02, 2018.08, 2018.05, 2018.02. The vulnerability could allow for the improper neutralization of special elements in SQL commands and may lead to the product being vulnerable to SQL injection.

SQL Injection

A stored XSS vulnerability was discovered in Micro Focus Vibe, affecting all Vibe version prior to 4.0.7

CVE-2020-9520 5.4 - Medium - March 25, 2020

A stored XSS vulnerability was discovered in Micro Focus Vibe, affecting all Vibe version prior to 4.0.7. The vulnerability could allows a remote attacker to craft and store malicious content into Vibe such that when the content is viewed by another user of the system, attacker controlled JavaScript will execute in the security context of the target users browser.

XSS

Login filter can access configuration files vulnerability in Micro Focus Service Manager (Web Tier)

CVE-2020-9518 5.3 - Medium - March 16, 2020

Login filter can access configuration files vulnerability in Micro Focus Service Manager (Web Tier), affecting versions 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. The vulnerability could be exploited to allow unauthorized access to configuration data.

Information Disclosure

HTTP methods reveled in Web services vulnerability in Micro Focus Service manager (server)

CVE-2020-9519 5.3 - Medium - March 16, 2020

HTTP methods reveled in Web services vulnerability in Micro Focus Service manager (server), affecting versions 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62, 9.63. The vulnerability could be exploited to allow exposure of configuration data.

Information Disclosure

There is an improper restriction of rendered UI layers or frames vulnerability in Micro Focus Service Manager Release Control versions 9.50 and 9.60

CVE-2020-9517 5.4 - Medium - March 09, 2020

There is an improper restriction of rendered UI layers or frames vulnerability in Micro Focus Service Manager Release Control versions 9.50 and 9.60. The vulnerability may result in the ability of malicious users to perform UI redress attacks.

Open Redirect

Cross-Site Request Forgery vulnerability in all Micro Focus ArcSight Logger affecting all product versions below version 7.0

CVE-2019-11657 8.8 - High - December 17, 2019

Cross-Site Request Forgery vulnerability in all Micro Focus ArcSight Logger affecting all product versions below version 7.0. The vulnerability could be exploited to perform CSRF attack.

Session Riding

Unauthorized file download vulnerability in all supported versions of Micro Focus AcuToWeb

CVE-2019-17087 7.5 - High - December 11, 2019

Unauthorized file download vulnerability in all supported versions of Micro Focus AcuToWeb. The vulnerability could be exploited to enumerate and download files from the filesystem of the system running AcuToWeb, with the privileges of the account AcuToWeb is running under.

Information Disclosure

XXE attack vulnerability on Micro Focus Operations Agent, affected version 12.0, 12.01, 12.02, 12.03, 12.04, 12.05, 12.06, 12.10, 12.11

CVE-2019-17085 6.5 - Medium - November 18, 2019

XXE attack vulnerability on Micro Focus Operations Agent, affected version 12.0, 12.01, 12.02, 12.03, 12.04, 12.05, 12.06, 12.10, 12.11. The vulnerability could be exploited to do an XXE attack on Operations Agent.

XXE

Man-in-the-middle vulnerability in Micro Focus Self Service Password Reset, affecting all versions prior to 4.4.0.4

CVE-2019-11674 5.9 - Medium - October 22, 2019

Man-in-the-middle vulnerability in Micro Focus Self Service Password Reset, affecting all versions prior to 4.4.0.4. The vulnerability could exploit invalid certificate validation and may result in a man-in-the-middle attack.

Improper Certificate Validation

Reflected XSS on Micro Focus Enterprise Developer and Enterprise Server

CVE-2019-11651 6.1 - Medium - October 02, 2019

Reflected XSS on Micro Focus Enterprise Developer and Enterprise Server, all versions prior to version 3.0 Patch Update 20, version 4.0 Patch Update 12, and version 5.0 Patch Update 2. The vulnerability could be exploited to redirect a user to a malicious page or forge certain types of web requests.

XSS

Allow changes to some table by non-SysAdmin in Micro Focus Service Manager product versions 9.30

CVE-2019-11661 8.3 - High - September 18, 2019

Allow changes to some table by non-SysAdmin in Micro Focus Service Manager product versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. This vulnerability could be exploited to allow unauthorized access and modification of data.

Class and method names in error message in Micro Focus Service Manager product versions 9.30

CVE-2019-11662 4.3 - Medium - September 18, 2019

Class and method names in error message in Micro Focus Service Manager product versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. This vulnerability could be exploited in some special cases to allow information exposure through an error message.

Generation of Error Message Containing Sensitive Information

Clear text credentials are used to access managers app in Tomcat in Micro Focus Service Manager product versions 9.30

CVE-2019-11663 6.5 - Medium - September 18, 2019

Clear text credentials are used to access managers app in Tomcat in Micro Focus Service Manager product versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. The vulnerability could be exploited to allow sensitive data exposure.

Insufficiently Protected Credentials

Clear text password in browser in Micro Focus Service Manager product versions 9.30

CVE-2019-11664 6.5 - Medium - September 18, 2019

Clear text password in browser in Micro Focus Service Manager product versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. The vulnerability could be exploited to allow sensitive data exposure.

Insufficiently Protected Credentials

Data exposure in Micro Focus Service Manager product versions 9.30

CVE-2019-11665 7.5 - High - September 17, 2019

Data exposure in Micro Focus Service Manager product versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. The vulnerability could be exploited to allow sensitive data exposure.

Insecure deserialization of untrusted data in Micro Focus Service Manager product versions 9.30

CVE-2019-11666 8.8 - High - September 17, 2019

Insecure deserialization of untrusted data in Micro Focus Service Manager product versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. The vulnerability could be exploited to allow insecure deserialization of untrusted data.

Marshaling, Unmarshaling

Unauthorized access to contact information in Micro Focus Service Manager, versions 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62

CVE-2019-11667 7.5 - High - September 17, 2019

Unauthorized access to contact information in Micro Focus Service Manager, versions 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. The vulnerability could be exploited to allow unauthorized access to private data.

Privileges manipulation in Micro Focus Data Protector, versions 10.00, 10.01, 10.02, 10.03, 10.04, 10.10, 10.20, 10.30, 10.40

CVE-2019-11660 7.8 - High - September 13, 2019

Privileges manipulation in Micro Focus Data Protector, versions 10.00, 10.01, 10.02, 10.03, 10.04, 10.10, 10.20, 10.30, 10.40. This vulnerability could be exploited by a low-privileged user to execute a custom binary with higher privileges.

Untrusted Path

HTTP cookie in Micro Focus Service manager, Versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62

CVE-2019-11668 7.5 - High - September 10, 2019

HTTP cookie in Micro Focus Service manager, Versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. And Micro Focus Service Manager Chat Server, versions 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. And Micro Focus Service Manager Chat Service 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62.

Modifiable read only check box In Micro Focus Service Manager, versions 9.60p1, 9.61, 9.62

CVE-2019-11669 7.5 - High - September 10, 2019

Modifiable read only check box In Micro Focus Service Manager, versions 9.60p1, 9.61, 9.62. This vulnerability could be exploited to allow unauthorized modification of data.

Information exposure in Micro Focus Content Manager, versions 9.1, 9.2 and 9.3

CVE-2019-11658 4.3 - Medium - August 30, 2019

Information exposure in Micro Focus Content Manager, versions 9.1, 9.2 and 9.3. This vulnerability when configured to use an Oracle database, allows valid system users to gain access to a limited subset of records they would not normally be able to access when the system is in an undisclosed abnormal state.

Information Disclosure

Path traversal vulnerability in Micro Focus Verastream Host Integrator (VHI), versions 7.7 SP2 and earlier, The vulnerability

CVE-2019-11654 7.5 - High - August 23, 2019

Path traversal vulnerability in Micro Focus Verastream Host Integrator (VHI), versions 7.7 SP2 and earlier, The vulnerability allows remote unauthenticated attackers to read arbitrary files.

Directory traversal

A potential authorization bypass issue was found in Micro Focus Self Service Password Reset (SSPR) versions prior to: 4.4.0.3

CVE-2019-11652 9.8 - Critical - August 14, 2019

A potential authorization bypass issue was found in Micro Focus Self Service Password Reset (SSPR) versions prior to: 4.4.0.3, 4.3.0.6, and 4.2.0.6. Upgrade to Micro Focus Self Service Password Reset (SSPR) SSPR versions 4.4.0.3, 4.3.0.6, or 4.2.0.6 as appropriate.

Remote Access Control Bypass in Micro Focus Content Manager

CVE-2019-11653 5.4 - Medium - August 07, 2019

Remote Access Control Bypass in Micro Focus Content Manager. versions 9.1, 9.2, 9.3. The vulnerability could be exploited to manipulate data stored during another users CheckIn request.

A potential Man in the Middle attack (MITM) was found in NetIQ Advanced Authentication Framework versions prior to 6.0.

CVE-2019-11650 5.9 - Medium - July 10, 2019

A potential Man in the Middle attack (MITM) was found in NetIQ Advanced Authentication Framework versions prior to 6.0.

A potential XSS exists in Self Service Password Reset, in Micro Focus NetIQ Software all versions prior to version 4.4

CVE-2019-11647 6.1 - Medium - June 24, 2019

A potential XSS exists in Self Service Password Reset, in Micro Focus NetIQ Software all versions prior to version 4.4. The vulnerability could be exploited to enable an XSS attack.

XSS

Cross-Site Scripting vulnerability in Micro Focus Fortify Software Security Center Server

CVE-2019-11649 5.4 - Medium - June 19, 2019

Cross-Site Scripting vulnerability in Micro Focus Fortify Software Security Center Server, versions 17.2, 18.1, 18.2, has been identified in Micro Focus Software Security Center. The vulnerability could be exploited to execute JavaScript code in users browser. The vulnerability could be exploited to execute JavaScript code in users browser.

XSS

Micro Focus Solution Business Manager versions prior to 11.4.2 is susceptible to open redirect.

CVE-2019-3477 6.1 - Medium - June 07, 2019

Micro Focus Solution Business Manager versions prior to 11.4.2 is susceptible to open redirect.

Open Redirect

Remote unauthorized command execution and unauthorized disclosure of information in Micro Focus Service Manager

CVE-2019-11646 8.8 - High - June 03, 2019

Remote unauthorized command execution and unauthorized disclosure of information in Micro Focus Service Manager, versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61. This vulnerability could allow Remote unauthorized command execution and unauthorized disclosure of information.

A DOM based XSS vulnerability has been identified in the Netstorage component of Open Enterprise Server (OES)

CVE-2019-3490 6.1 - Medium - May 02, 2019

A DOM based XSS vulnerability has been identified in the Netstorage component of Open Enterprise Server (OES) allowing a remote attacker to execute javascript in the victims browser by tricking the victim into clicking on a specially crafted link. This affects OES versions OES2015SP1, OES2018, and OES2018SP1. Older versions may be affected but were not tested as they are out of support.

XSS

A potential security vulnerability has been identified in Micro Focus Network Automation Software 9.20

CVE-2019-3493 8.8 - High - April 29, 2019

A potential security vulnerability has been identified in Micro Focus Network Automation Software 9.20, 9.21, 10.00, 10.10, 10.20, 10.30, 10.40, 10.50, 2018.05, 2018.08, 2018.11, and Micro Focus Network Operations Management (NOM) all versions. The vulnerability could be remotely exploited to Remote Code Execution.

Code Injection

An unauthenticated file upload vulnerability has been identified in the Web Client component of Micro Focus Content Manager 9.1

CVE-2019-3489 7.5 - High - April 01, 2019

An unauthenticated file upload vulnerability has been identified in the Web Client component of Micro Focus Content Manager 9.1, 9.2, and 9.3 when configured to use the ADFS authentication method. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to arbitrary locations on the Content Manager server.

Unrestricted File Upload

Information leakage issue in Micro Focus Solutions Business Manager (SBM) (formerly Serena Business Manager (SBM)) versions prior to 11.5.

CVE-2018-19643 7.5 - High - March 27, 2019

Information leakage issue in Micro Focus Solutions Business Manager (SBM) (formerly Serena Business Manager (SBM)) versions prior to 11.5.

Information Disclosure

Reflected cross site script issue in Micro Focus Solutions Business Manager (SBM) (formerly Serena Business Manager (SBM)) versions prior to 11.5.

CVE-2018-19644 6.1 - Medium - March 27, 2019

Reflected cross site script issue in Micro Focus Solutions Business Manager (SBM) (formerly Serena Business Manager (SBM)) versions prior to 11.5.

XSS

Unauthenticated remote code execution issue in Micro Focus Solutions Business Manager (SBM) (formerly Serena Business Manager (SBM)) versions prior to 11.5.

CVE-2018-19641 9.8 - Critical - March 27, 2019

Unauthenticated remote code execution issue in Micro Focus Solutions Business Manager (SBM) (formerly Serena Business Manager (SBM)) versions prior to 11.5.

Code Injection

Denial of service issue in Micro Focus Solutions Business Manager (SBM) (formerly Serena Business Manager (SBM)) versions prior to 11.5.

CVE-2018-19642 7.5 - High - March 27, 2019

Denial of service issue in Micro Focus Solutions Business Manager (SBM) (formerly Serena Business Manager (SBM)) versions prior to 11.5.

Improper Input Validation

Remote arbitrary code execution in Micro Focus Data Protector, version 10.03 this vulnerability could

CVE-2019-3476 9.8 - Critical - March 25, 2019

Remote arbitrary code execution in Micro Focus Data Protector, version 10.03 this vulnerability could allow remote arbitrary code execution.

Improper Input Validation

An Authentication Bypass issue exists in Solutions Business Manager (SBM) (formerly Serena Business Manager (SBM)) versions prior to 11.5.

CVE-2018-19645 9.8 - Critical - February 12, 2019

An Authentication Bypass issue exists in Solutions Business Manager (SBM) (formerly Serena Business Manager (SBM)) versions prior to 11.5.

authentification

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access

CVE-2019-5736 8.6 - High - February 11, 2019

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

Shell injection

A potential Remote Unauthorized Access in Micro Focus Fortify Software Security Center (SSC), versions 17.10, 17.20, 18.10 this exploitation could

CVE-2018-7690 6.5 - Medium - December 13, 2018

A potential Remote Unauthorized Access in Micro Focus Fortify Software Security Center (SSC), versions 17.10, 17.20, 18.10 this exploitation could allow Remote Unauthorized Access

A potential Remote Unauthorized Access in Micro Focus Fortify Software Security Center (SSC), versions 17.10, 17.20, 18.10 this exploitation could

CVE-2018-7691 6.5 - Medium - December 13, 2018

A potential Remote Unauthorized Access in Micro Focus Fortify Software Security Center (SSC), versions 17.10, 17.20, 18.10 this exploitation could allow Remote Unauthorized Access

Cross site scripting vulnerability in iManager prior to 3.1 SP2.

CVE-2018-17949 6.1 - Medium - December 12, 2018

Cross site scripting vulnerability in iManager prior to 3.1 SP2.

XSS

Incorrect enforcement of authorization checks in eDirectory prior to 9.1 SP2

CVE-2018-17950 7.5 - High - December 12, 2018

Incorrect enforcement of authorization checks in eDirectory prior to 9.1 SP2

AuthZ

Cross site scripting vulnerability in eDirectory prior to 9.1 SP2

CVE-2018-17952 6.1 - Medium - December 12, 2018

Cross site scripting vulnerability in eDirectory prior to 9.1 SP2

XSS

An open redirect vulnerability exists in the Access Manager Identity Provider prior to 4.4 SP3.

CVE-2018-17948 6.1 - Medium - November 20, 2018

An open redirect vulnerability exists in the Access Manager Identity Provider prior to 4.4 SP3.

Open Redirect

Mitigates an XSS issue in NetIQ Access Manager versions prior to 4.4 SP3.

CVE-2018-12480 6.1 - Medium - November 15, 2018

Mitigates an XSS issue in NetIQ Access Manager versions prior to 4.4 SP3.

XSS

A potential unauthorized disclosure of data vulnerability has been identified in Micro Focus Service Manager versions: 9.30

CVE-2018-18591 6.5 - Medium - November 13, 2018

A potential unauthorized disclosure of data vulnerability has been identified in Micro Focus Service Manager versions: 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51. The vulnerability could be exploited to release unauthorized disclosure of data.

Information Disclosure

A potential remote code execution and information disclosure vulnerability exists in Micro Focus Operations Bridge containerized suite versions 2017.11

CVE-2018-18590 8.8 - High - November 07, 2018

A potential remote code execution and information disclosure vulnerability exists in Micro Focus Operations Bridge containerized suite versions 2017.11, 2018.02, 2018.05, 2018.08. This vulnerability could allow for information disclosure.

Information Disclosure

A potential Remote Arbitrary Code Execution vulnerability has been identified in Micro Focus' Real User Monitoring software

CVE-2018-18589 8.8 - High - October 23, 2018

A potential Remote Arbitrary Code Execution vulnerability has been identified in Micro Focus' Real User Monitoring software, versions 9.26IP, 9.30, 9.40 and 9.50. The vulnerability could be exploited to execute arbitrary code.

Marshaling, Unmarshaling

Incorrect handling of an invalid value for an HTTP request parameter by Directory Server (aka Enterprise Server Administration web UI) in Micro Focus Enterprise Developer and Enterprise Server 2.3 Update 2 and earlier

CVE-2018-12469 7.5 - High - October 12, 2018

Incorrect handling of an invalid value for an HTTP request parameter by Directory Server (aka Enterprise Server Administration web UI) in Micro Focus Enterprise Developer and Enterprise Server 2.3 Update 2 and earlier, 3.0 before Patch Update 12, and 4.0 before Patch Update 2 causes a null pointer dereference (CWE-476) and subsequent denial of service due to process termination.

NULL Pointer Dereference

A potential Cross-Site Request Forgery (CSRF) vulnerability has been identified in ArcSight Management Center (ArcMC) in all versions prior to 2.81

CVE-2018-6504 8.8 - High - September 20, 2018

A potential Cross-Site Request Forgery (CSRF) vulnerability has been identified in ArcSight Management Center (ArcMC) in all versions prior to 2.81. This vulnerability could be exploited to allow for Cross-Site Request Forgery (CSRF).

Session Riding

Remote Code Execution in the following products Hybrid Cloud Management Containerized Suite HCM2017.11, HCM2018.02, HCM2018.05, Operations Bridge Containerized Suite 2017.11, 2018.02, 2018.05, Data Center Automation Containerized Suite 2017.01 until 2018.05, Service Management Automation Suite 2017.11, 2018.02, 2018.05 and Network Operations Management (NOM) Suite CDF 2017.11, 2018.02, 2018.05 will

CVE-2018-6498 9.8 - Critical - August 30, 2018

Remote Code Execution in the following products Hybrid Cloud Management Containerized Suite HCM2017.11, HCM2018.02, HCM2018.05, Operations Bridge Containerized Suite 2017.11, 2018.02, 2018.05, Data Center Automation Containerized Suite 2017.01 until 2018.05, Service Management Automation Suite 2017.11, 2018.02, 2018.05 and Network Operations Management (NOM) Suite CDF 2017.11, 2018.02, 2018.05 will allow Remote Code Execution.

Code Injection

Remote Code Execution in the following products Hybrid Cloud Management Containerized Suite HCM2017.11, HCM2018.02, HCM2018.05, Operations Bridge Containerized Suite 2017.11, 2018.02, 2018.05, Data Center Automation Containerized Suite 2017.01 until 2018.05, Service Management Automation Suite 2017.11, 2018.02, 2018.05, Service Virtualization (SV) with floating licenses using Any version using APLS older than 10.7, Unified Functional Testing (UFT) with floating licenses using Any version using APLS older than 10.7, Network Virtualization (NV) with floating licenses using Any version using APLS older than 10.7 and Network Operations Management (NOM) Suite CDF 2017.11, 2018.02, 2018.05 will

CVE-2018-6499 9.8 - Critical - August 30, 2018

Remote Code Execution in the following products Hybrid Cloud Management Containerized Suite HCM2017.11, HCM2018.02, HCM2018.05, Operations Bridge Containerized Suite 2017.11, 2018.02, 2018.05, Data Center Automation Containerized Suite 2017.01 until 2018.05, Service Management Automation Suite 2017.11, 2018.02, 2018.05, Service Virtualization (SV) with floating licenses using Any version using APLS older than 10.7, Unified Functional Testing (UFT) with floating licenses using Any version using APLS older than 10.7, Network Virtualization (NV) with floating licenses using Any version using APLS older than 10.7 and Network Operations Management (NOM) Suite CDF 2017.11, 2018.02, 2018.05 will allow Remote Code Execution.

Code Injection

Information leakage vulnerability in NetIQ eDirectory before 9.1.1 HF1 due to shared memory usage.

CVE-2018-7686 7.5 - High - August 09, 2018

Information leakage vulnerability in NetIQ eDirectory before 9.1.1 HF1 due to shared memory usage.

Information Disclosure

Unvalidated redirect vulnerability in in NetIQ eDirectory before 9.1.1 HF1.

CVE-2018-7692 6.1 - Medium - August 09, 2018

Unvalidated redirect vulnerability in in NetIQ eDirectory before 9.1.1 HF1.

Open Redirect

A vulnerability in the administration console of Micro Focus GroupWise prior to version 18.0.2 may

CVE-2018-12468 7.2 - High - August 01, 2018

A vulnerability in the administration console of Micro Focus GroupWise prior to version 18.0.2 may allow a remote attacker authenticated as an administrator to upload files to an arbitrary path on the server. In certain circumstances this could result in remote code execution.

Unrestricted File Upload

A SQL injection vulnerability in the web administration and quarantine components of Micro Focus Secure Messaging Gateway

CVE-2018-12464 9.8 - Critical - June 29, 2018

A SQL injection vulnerability in the web administration and quarantine components of Micro Focus Secure Messaging Gateway allows an unauthenticated remote attacker to execute arbitrary SQL statements against the database. This can be exploited to create an administrative account and used in conjunction with CVE-2018-12465 to achieve unauthenticated remote code execution. Affects Micro Focus Secure Messaging Gateway versions prior to 471. It does not affect previous versions of the product that use the GWAVA product name (i.e. GWAVA 6.5).

SQL Injection

An OS command injection vulnerability in the web administration component of Micro Focus Secure Messaging Gateway (SMG)

CVE-2018-12465 7.2 - High - June 29, 2018

An OS command injection vulnerability in the web administration component of Micro Focus Secure Messaging Gateway (SMG) allows a remote attacker authenticated as a privileged user to execute arbitrary OS commands on the SMG server. This can be exploited in conjunction with CVE-2018-12464 to achieve unauthenticated remote code execution. Affects Micro Focus Secure Messaging Gateway versions prior to 471. It does not affect previous versions of the product that used GWAVA product name (i.e. GWAVA 6.5).

Shell injection

Micro Focus Solutions Business Manager versions prior to 11.4

CVE-2018-7682 6.5 - Medium - June 22, 2018

Micro Focus Solutions Business Manager versions prior to 11.4 allows a user to invoke SBM RESTful services across domains.

Insertion of Sensitive Information into Log File

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.