List of security vulnerabilities fixed in OpManager

This page contains a list of all security vulnerabilities fixed in OpManager along with its CVE ID and fixed build number. Go to ManageEngine's Security Response Center to report vulnerabilities on ManageEngine products.

 
CVE / ZVE ID Synopsis Severity Fixed in version Link to latest build
CVE-2023-47211 Earlier, path traversal vulnerability was detected for MIB browser. This issue has now been fixed by implementing path sanitization. High 127260/ 127248/ 127194/ 127193 Download
CVE-2023-29505 Previously, a WebSocket connection was affected by a Cross-site WebSocket hijacking vulnerability. This issue has been fixed by validating the origin of the websocket request. Low 127131 / 127120 / 127109
CVE-2023-31099 Enterprise Edition: Remote code execution vulnerability was identified during the data transfer in the Enterprise Edition. This has been fixed now. High  126324
ZVE-2023-0284 OpManager : The Stored XSS vulnerability issues, that lead to JS injection, and were identified in the URL Monitors, have been fixed now. (Reported by Ranjit Pahan). Medium 126279 / 126155 / 126263
CVE-2022-43473 OpManager : Previously, there was an XML External Entity (XXE) vulnerability in UCS module. It has been fixed now. (Reported by Cisco Talos-Marcin Noga) Medium 126141 / 126154/ 126169
CVE-2022-37024 Earlier, there was a Remote Code Execution (RCE) vulnerability in IPv6 address management reported by an anonymous working with Trend Micro Zero Day Initiative. This has been fixed now. High  126120 / 126105 / 126003 / 125658
CVE-2022-38772 Earlier, there was a Remote Code Execution (RCE) vulnerability in IPv4 address management reported by an anonymous working with Trend Micro Zero Day Initiative. This has been fixed now. High  126120 / 126105 / 126003 / 125658
CVE-2022-36923 A vulnerability resulted in unauthenticated access of the user API key. This issue has been fixed now. (Reported by Anonymous working with Trend Micro Zero Day Initiative) Critical  126118 / 126104 / 126002 / 125657
CVE-2022-35404 Unauthorized creation of files lead to high resource consumption. This has been fixed now.(Reported by Tenable) Medium  125639/125655/126101
CVE-2022-29535  The SQL injection vulnerability issues identified in few default reports have been fixed now. (Reported by Anh Vu) High  125589/125604/125629
CVE-2022-27908 Earlier, an SQL injection vulnerability was noticed in the Inventory Reports module. It has been fixed now. High 125588/125603
CVE-2022-24703 Earlier, there was a stored XSS vulnerability in the Schedule name field of Schedule page. This issue is fixed now. Medium 125584
CVE-2021-43319 Remote Code Execution (RCE) vulnerability in the Ping functionality. High 125457, 125473
CVE-2021-41288 SQL injection vulnerability noticed in the Reports module. High 125437, 125455 and 125467
CVE-2021-40493 SQL injection vulnerability noticed in support diagnostics module. High 125437/125453
CVE-2021-20078 Folder deletion due to path traversal vulnerability in Remote Desktop feature Critical 125332/125347
CVE-2021-3287 Unauthenticated Remote Code Execution (RCE) vulnerability due to general bypass for the deserialization class. Critical 125220/125314
CVE-2020-28653 Unauthenticated Remote Code Execution (RCE) vulnerability in the Smart Update Manager (SUM) servlet. High 125203/125218
CVE-2020-19554 A reflected XSS vulnerability when the API key contained an XML-based XSS payload Medium 125177
CVE-2020-13818 Directory Traversal validation was being bypassed when using <cachestart>. High 125144
CVE-2020-12116 Path Traversal vulnerability High 124196/125125
CVE-2020-11946 Unauthenticated access to API key disclosure from a servlet call High 124188/125120
CVE-2020-11527 File read vulnerability in Arbitrary file High 124181
CVE-2020-10541 Remote Code Execution (RCE) vulnerability in Mail Server Settings v1 APIs High 124172
CVE-2019-17421 Incorrect file permissions on the packaged Nipper executable file Medium 124079 and 124099
CVE-2019-17602 SQL injection vulnerability High 124078/124089
CVE-2019-15106 User login bypass vulnerability in APM plugin High 124062/124070
CVE-2017-11560 HTML Injection vulnerability Medium 124033
Internal An operator user could access some restricted folders by bypassing the session. High 123241
CVE-2018-20339 XSS vulnerability in 'Alarms' and 'Notes'. High 123239
CVE-2018-20338 SQL Injection vulnerability in 'Alarms'. High 123239
CVE-2018-20173 SQL Injection vulnerability in performance monitors' graph. High 123238
CVE-2018-19921 XSS vulnerability in adding/updating domain controller. High 123237
CVE-2018-19403 Unauthenticated Remote Code Execution (RCE) vulnerability. High 123231
CVE-2018-19288 XSS vulnerability in updating 'Widgets API'. High 123223
CVE-2018-18949 SQL Injection vulnerability in 'Mail Server' settings. High 123222
CVE-2018-18980 XML external entity vulnerability in 'Business view' page. High 123214
CVE-2018-18475 Unrestricted file upload vulnerability in uploading a background image in 'Business view'. High 123214
CVE-2018-18262 XSS vulnerability in 'Add Custom Category'. High 123214
CVE-2018-12997, CVE-2018-12998 Injecting arbitrary web script or HTML via the parameter 'operation'. High 123169
CVE-2018-9088, CVE-2018-9087, CVE-2018-9089 SQL Injection vulnerability in 'FailOverHelperServlet'. High 123157
CVE-2018-10803 XSS vulnerability (Cross-site-scripting) in 'Add credentials' page. High 123122
CVE-2017-12617 Uploading JSP file to server via 'HTTP PUT' method High 123046
 
 Pricing  Get Quote