Vulnerabilities
Vulnerable Software
Microfocus:  >> Imanager  >> 3.2.6  Security Vulnerabilities
Possible External Service Interaction attack in iManager has been discovered in OpenText™ iManager 3.2.6.0000.
CVSS Score
8.6
EPSS Score
0.002
Published
2024-11-22
Possible XSS in iManager URL for access Component has been discovered in OpenText™ iManager 3.2.6.0000.
CVSS Score
7.6
EPSS Score
0.001
Published
2024-11-22
Possible XML External Entity Injection in iManager GET parameter has been discovered in OpenText™ iManager 3.2.6.0200.
CVSS Score
7.5
EPSS Score
0.001
Published
2024-11-22
Possible Command Injection in iManager GET parameter has been discovered in OpenText™ iManager 3.2.6.0000.
CVSS Score
8.8
EPSS Score
0.013
Published
2024-11-22
Cross-Site Request Forgery vulnerability has been discovered in OpenText™ iManager 3.2.6.0200. This could lead to sensitive information disclosure.
CVSS Score
5.4
EPSS Score
0.001
Published
2024-05-28
XML External Entity injection vulnerability found in OpenText™ iManager 3.2.6.0200. This could lead to remote code execution by parsing untrusted XML payload
CVSS Score
7.8
EPSS Score
0.016
Published
2024-05-28
Server Side Request Forgery vulnerability has been discovered in OpenText™ iManager 3.2.6.0200. This could lead to senstive information disclosure by directory traversal.
CVSS Score
5.3
EPSS Score
0.0
Published
2024-05-15
Broken Authentication vulnerability discovered in OpenText™ iManager 3.2.6.0200. This vulnerability allows an attacker to manipulate certain parameters to bypass authentication.
CVSS Score
3.5
EPSS Score
0.001
Published
2024-05-15
File Upload vulnerability in unauthenticated session found in OpenText™ iManager 3.2.6.0200. The vulnerability could allow ant attacker to upload a file without authentication.
CVSS Score
5.6
EPSS Score
0.003
Published
2024-05-15
Remote Code Execution has been discovered in OpenText™ iManager 3.2.6.0200. The vulnerability can trigger remote code execution unisng unsafe java object deserialization.
CVSS Score
7.6
EPSS Score
0.015
Published
2024-05-15


Contact Us

Shodan ® - All rights reserved