Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microfocus vulnerabilities and exploits
(subscribe to this query)
5.4
CVSSv3
CVE-2019-11653
Remote Access Control Bypass in Micro Focus Content Manager. versions 9.1, 9.2, 9.3. The vulnerability could be exploited to manipulate data stored during another user’s CheckIn request.
Microfocus Content Manager 9.1.0
Microfocus Content Manager 9.2.0
Microfocus Content Manager 9.3.0
4.3
CVSSv3
CVE-2019-11658
Information exposure in Micro Focus Content Manager, versions 9.1, 9.2 and 9.3. This vulnerability when configured to use an Oracle database, allows valid system users to gain access to a limited subset of records they would not normally be able to access when the system is in an...
Microfocus Content Manager 9.1
Microfocus Content Manager 9.2
Microfocus Content Manager 9.3
7.5
CVSSv3
CVE-2019-11669
Modifiable read only check box In Micro Focus Service Manager, versions 9.60p1, 9.61, 9.62. This vulnerability could be exploited to allow unauthorized modification of data.
Microfocus Service Manager 9.61
Microfocus Service Manager 9.60
Microfocus Service Manager 9.62
9.8
CVSSv3
CVE-2009-5153
In Novell NetWare prior to 6.5 SP8, a stack buffer overflow in processing of CALLIT RPC calls in the NFS Portmapper daemon in PKERNEL.NLM allowed remote unauthenticated malicious users to execute code, because a length field was incorrectly trusted.
Microfocus Netware 6.5
Microfocus Netware
7.5
CVSSv3
CVE-2018-17950
Incorrect enforcement of authorization checks in eDirectory before 9.1 SP2
Microfocus Edirectory
Microfocus Edirectory 9.1
7.8
CVSSv3
CVE-2018-7687
The Micro Focus Client for OES before version 2 SP4 IR8a has a vulnerability that could allow a local malicious user to elevate privileges via a buffer overflow in ncfsd.sys.
Microfocus Client 2.0
Microfocus Client
7.2
CVSSv3
CVE-2022-38757
A vulnerability has been identified in Micro Focus ZENworks 2020 Update 3a and prior versions. This vulnerability allows administrators with rights to perform actions (e.g., install a bundle) on a set of managed devices, to be able to exercise these rights on managed devices in t...
Microfocus Zenworks 2020
Microfocus Zenworks
8.8
CVSSv3
CVE-2018-18589
A potential Remote Arbitrary Code Execution vulnerability has been identified in Micro Focus' Real User Monitoring software, versions 9.26IP, 9.30, 9.40 and 9.50. The vulnerability could be exploited to execute arbitrary code.
Microfocus Real User Monitoring 9.30
Microfocus Real User Monitoring 9.40
Microfocus Real User Monitoring 9.50
Microfocus Real User Monitoring 9.26ip
9.8
CVSSv3
CVE-2021-22507
Authentication bypass vulnerability in Micro Focus Operations Bridge Manager affects versions 2019.05, 2019.11, 2020.05 and 2020.10. The vulnerability could allow remote malicious users to bypass user authentication and get unauthorized access.
Microfocus Operations Bridge Manager 2020.05
Microfocus Operations Bridge Manager 2019.11
Microfocus Operations Bridge Manager 2019.05
Microfocus Operations Bridge Manager 2020.10
6.7
CVSSv3
CVE-2021-22521
A privileged escalation vulnerability has been identified in Micro Focus ZENworks Configuration Management, affecting version 2020 Update 1 and all prior versions. The vulnerability could be exploited to gain unauthorized system privileges.
Microfocus Zenworks Endpoint Security Management 2020
Microfocus Zenworks Configuration Management
Microfocus Zenworks Configuration Management 2020
Microfocus Zenworks Endpoint Security Management
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »