List of security vulnerabilities fixed in OpManager Plus

This page contains a list of all security vulnerabilities fixed in OpManager Plus along with its CVE id and fixed build number. Go to ManageEngine's Security Response Center to report vulnerabilities on ManageEngine products.

 
CVE / ZVE IDSynopsisSeverityFixed in versionLink to latest build
CVE-2024-5466OpManager: A Remote Code Execution (RCE) vulnerability could be exploited by users with 'Write' access to the 'Deploy Agent' action in the UI. This has been fixed now. [Reported by Daniel Santos]High128330 / 128320 / 128188 / 128268Download
CVE-2024-6748OpManager: The SQL injection vulnerability identified in the URL Monitoring has now been fixed. [Reported by: CrisprXiang, Cokebeer, and LFY].High128318 / 128186 / 128267
CVE-2023-47211Earlier, path traversal vulnerability was detected for MIB browser. This issue has now been fixed by implementing path sanitization.High127260
ZVE-2023-0284OpManager : The Stored XSS vulnerability issues, that lead to JS injection, and were identified in the URL Monitors, have been fixed now. (Reported by Ranjit Pahan).Medium126279 / 126155 / 126263
CVE-2022-43473OpManager : Previously, there was an XML External Entity (XXE) vulnerability in UCS module. It has been fixed now.(Reported by Cisco Talos-Marcin Noga)Medium126141 / 126154/ 126169
CVE-2022-37024Earlier, there was a Remote Code Execution (RCE) vulnerability in IPv6 address management reported by an anonymous working with Trend Micro Zero Day Initiative. This has been fixed now.High126120 / 126105 / 126003 / 125658
CVE-2022-38772Earlier, there was a Remote Code Execution (RCE) vulnerability in IPv4 address management reported by an anonymous working with Trend Micro Zero Day Initiative. This has been fixed now.High126120 / 126105 / 126003 / 125658
CVE-2022-36923A vulnerability resulted in unauthenticated access of the user API key. This issue has been fixed now. (Reported by Anonymous working with Trend Micro Zero Day Initiative)Critical126118 / 126104 / 126002 / 125657
CVE-2022-35404Unauthorized creation of files lead to high resource consumption. This has been fixed now.(Reported by Tenable)Medium125639/ 125655/ 126101
CVE-2022-29535The SQL injection vulnerability issues identified in a few default reports have been fixed now. (Reported by Anh Vu)High125604
CVE-2022-27908SQL vulnerability injection noticed in Inventory Reports moduleHigh125588/125603
CVE-2021-40493SQL vulnerability injection noticed in support diagnostics moduleHigh125437/125453
CVE-2021-3287Unauthenticated Remote Code Execution (RCE) vulnerability due to general bypass for the deserialization class.Critical125220/125314
CVE-2020-12116Path Traversal vulnerabilityHigh124196/125125
CVE-2019-15106User login bypass vulnerability in APM pluginHigh124062/124070
InternalAn operator user could access some restricted folders by bypassing the session.High123241
CVE-2018-19403Unauthenticated Remote Code Execution (RCE) vulnerabilityHigh123231
Video Zone
OpManager Customer Videos
Michael Senatore, Operations Manager, Rojan Australia Pty Ltd.
  
  •  Venkatesan Veerappan, IT Consultant
     Mohd Jaffer Tawfiq Murtaja, Information Security officer from Al Ain sports club
  •  Jonathan ManageEngine Customer
     IT Admin from "Royal flying doctor service", Australia
  •  Michael Senatore, Operations Manager, Rojan Australia Pty Ltd.
     Michael - Network & Tech, ManageEngine Customer
  •  Altaleb Alshenqiti - Ministry of National Guard - Health Affairs
     Donald Stewart, IT Manager from Crest Industries
  •  John Rosser, MIS Manager - Yale Chase Equipment & Services
     David Tremont, Associate Directory of Infrastructure,USA