Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2024-4556

Disclosure Date: August 28, 2024 (last updated September 13, 2024)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in OpenText NetIQ Access Manager allows access the sensitive information. This issue affects NetIQ Access Manager before 5.0.4 and before 5.1.
Attacker Value
Unknown

CVE-2024-4555

Disclosure Date: August 28, 2024 (last updated September 13, 2024)
Improper Privilege Management vulnerability in OpenText NetIQ Access Manager allows user account impersonation in specific scenario. This issue affects NetIQ Access Manager before 5.0.4.1 and before 5.1
Attacker Value
Unknown

CVE-2024-4554

Disclosure Date: August 28, 2024 (last updated September 13, 2024)
Improper Input Validation vulnerability in OpenText NetIQ Access Manager leads to Cross-Site Scripting (XSS) attack. This issue affects NetIQ Access Manager before 5.0.4.1 and 5.1.
Attacker Value
Unknown

CVE-2020-11847

Disclosure Date: August 21, 2024 (last updated August 24, 2024)
SSH authenticated user when access the PAM server can execute an OS command to gain the full system access using bash. This issue affects Privileged Access Manager before 3.7.0.1.
Attacker Value
Unknown

CVE-2020-11846

Disclosure Date: August 21, 2024 (last updated August 24, 2024)
A vulnerability found in OpenText Privileged Access Manager that issues a token. on successful issuance of the token, a cookie gets set that allows unrestricted access to all the application resources. This issue affects Privileged Access Manager before 3.7.0.1.
Attacker Value
Unknown

CVE-2022-26326

Disclosure Date: May 02, 2022 (last updated October 07, 2023)
Potential open redirection vulnerability when URL is crafted in specific format in NetIQ Access Manager prior to 5.0.2
Attacker Value
Unknown

CVE-2022-26325

Disclosure Date: May 02, 2022 (last updated October 07, 2023)
Reflected Cross Site Scripting (XSS) vulnerability in NetIQ Access Manager prior to 5.0.2