Show filters
146 Total Results
Displaying 11-20 of 146
Sort by:
Attacker Value
Unknown
CVE-2024-11482
Disclosure Date: November 29, 2024 (last updated December 21, 2024)
A vulnerability in ESM 11.6.10 allows unauthenticated access to the internal Snowservice API and enables remote code execution through command injection, executed as the root user.
0
Attacker Value
Unknown
CVE-2024-11481
Disclosure Date: November 29, 2024 (last updated December 21, 2024)
A vulnerability in ESM 11.6.10 allows unauthenticated access to the internal Snowservice API. This leads to improper handling of path traversal, insecure forwarding to an AJP backend without adequate validation, and lack of authentication for accessing internal API endpoints.
0
Attacker Value
Unknown
CVE-2024-3482
Disclosure Date: May 20, 2024 (last updated May 21, 2024)
A Stored Cross-Site Scripting (XSS) vulnerability has been identified in OpenText ArcSight Enterprise Security Manager and ArcSight Platform. The vulnerability could be remotely exploited.
0
Attacker Value
Unknown
CVE-2024-2835
Disclosure Date: May 20, 2024 (last updated May 21, 2024)
A Stored Cross-Site Scripting (XSS) vulnerability has been identified in OpenText ArcSight Enterprise Security Manager and ArcSight Platform. The vulnerability could be remotely exploited.
0
Attacker Value
Unknown
CVE-2024-0967
Disclosure Date: March 01, 2024 (last updated March 02, 2024)
A potential vulnerability has been identified in OpenText / Micro Focus ArcSight Enterprise Security Manager (ESM). The vulnerability could be remotely exploited.
0
Attacker Value
Unknown
CVE-2023-6071
Disclosure Date: November 30, 2023 (last updated December 06, 2023)
An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possible as the input isn't correctly sanitized when adding a new data source.
0
Attacker Value
Unknown
CVE-2023-6070
Disclosure Date: November 29, 2023 (last updated December 06, 2023)
A server-side request forgery vulnerability in ESM prior to version 11.6.8 allows a low privileged authenticated user to upload arbitrary content, potentially altering configuration. This is possible through the certificate validation functionality where the API accepts uploaded content and doesn't parse for invalid data
0
Attacker Value
Unknown
CVE-2023-3314
Disclosure Date: July 03, 2023 (last updated October 08, 2023)
A vulnerability arises out of a failure to comprehensively sanitize the processing of a zip file(s). Incomplete neutralization of external commands used to control the process execution of the .zip application allows an authorized user to obtain control of the .zip application to execute arbitrary commands or obtain elevation of system privileges.
0
Attacker Value
Unknown
CVE-2023-3313
Disclosure Date: July 03, 2023 (last updated October 08, 2023)
An OS common injection vulnerability exists in the ESM certificate API, whereby incorrectly neutralized special elements may have allowed an unauthorized user to execute system command injection for the purpose of privilege escalation or to execute arbitrary commands.
0
Attacker Value
Unknown
CVE-2022-24891
Disclosure Date: April 27, 2022 (last updated October 07, 2023)
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.
0