Micro Focus Arcsight Logger
By the Year
In 2024 there have been 0 vulnerabilities in Micro Focus Arcsight Logger . Last year Arcsight Logger had 2 security vulnerabilities published. Right now, Arcsight Logger is on track to have less security vulnerabilities in 2024 than it did last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 2 | 7.60 |
2022 | 2 | 6.80 |
2021 | 0 | 0.00 |
2020 | 4 | 6.85 |
2019 | 1 | 8.80 |
2018 | 0 | 0.00 |
It may take a day or so for new Arcsight Logger vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Micro Focus Arcsight Logger Security Vulnerabilities
Potential XML External Entity Injection in ArcSight Logger versions prior to 7.3.0.
CVE-2023-24470
9.1 - Critical
- June 13, 2023
Potential XML External Entity Injection in ArcSight Logger versions prior to 7.3.0.
XXE
Potential Cross-Site Scripting in ArcSight Logger versions prior to 7.3.0
CVE-2023-24469
6.1 - Medium
- June 13, 2023
Potential Cross-Site Scripting in ArcSight Logger versions prior to 7.3.0
XSS
Potential vulnerabilities have been identified in Micro Focus ArcSight Logger
CVE-2022-26331
6.1 - Medium
- August 31, 2022
Potential vulnerabilities have been identified in Micro Focus ArcSight Logger. The vulnerabilities could be remotely exploited resulting in Information Disclosure, or Self Cross-Site Scripting (XSS). This issue affects: Micro Focus ArcSight Logger versions prior to v7.2.2 version and prior versions.
XSS
Potential vulnerabilities have been identified in Micro Focus ArcSight Logger
CVE-2022-26330
7.5 - High
- August 31, 2022
Potential vulnerabilities have been identified in Micro Focus ArcSight Logger. The vulnerabilities could be remotely exploited resulting in Information Disclosure, or Self Cross-Site Scripting (XSS). This issue affects: Micro Focus ArcSight Logger versions prior to v7.2.2 version and prior versions.
Arbitrary code execution vulnerability on Micro Focus ArcSight Logger product, affecting all version prior to 7.1.1
CVE-2020-11851
9.8 - Critical
- November 17, 2020
Arbitrary code execution vulnerability on Micro Focus ArcSight Logger product, affecting all version prior to 7.1.1. The vulnerability could be remotely exploited resulting in the execution of arbitrary code.
Code Injection
Cross-Site Scripting vulnerability on Micro Focus ArcSight Logger product, affecting all version prior to 7.1.1
CVE-2020-11860
6.1 - Medium
- November 17, 2020
Cross-Site Scripting vulnerability on Micro Focus ArcSight Logger product, affecting all version prior to 7.1.1. The vulnerability could be remotely exploited resulting in Cross-Site Scripting (XSS)
XSS
Cross-Site Scripting vulnerability on Micro Focus ArcSight Logger product, affecting version 7.1
CVE-2020-25834
5.4 - Medium
- November 17, 2020
Cross-Site Scripting vulnerability on Micro Focus ArcSight Logger product, affecting version 7.1. The vulnerability could be remotely exploited resulting in Cross-Site Scripting (XSS).
XSS
Cross Site Scripting (XSS) vulnerability in Micro Focus ArcSight Logger product, affecting all version from 6.6.1 up to version 7.0.1
CVE-2020-11839
6.1 - Medium
- June 12, 2020
Cross Site Scripting (XSS) vulnerability in Micro Focus ArcSight Logger product, affecting all version from 6.6.1 up to version 7.0.1. The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting (XSS) or information disclosure.
XSS
Cross-Site Request Forgery vulnerability in all Micro Focus ArcSight Logger affecting all product versions below version 7.0
CVE-2019-11657
8.8 - High
- December 17, 2019
Cross-Site Request Forgery vulnerability in all Micro Focus ArcSight Logger affecting all product versions below version 7.0. The vulnerability could be exploited to perform CSRF attack.
Session Riding
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Micro Focus Arcsight Logger or by Micro Focus? Click the Watch button to subscribe.