List of security vulnerabilities fixed in OpUtils

This page contains a list of all security vulnerabilities fixed in OpUtils along with its CVE id and fixed build number. Go to ManageEngine's Security Response Center to report vulnerabilities on ManageEngine products.

CVE IDSynopsisSeverityFixed in versionLink to latest build
ZVE-2025-3566Previously, a Stored Cross-Site Scripting (XSS) vulnerability was identified in the IP Address Manager module of OpManager, NetFlow Analyzer, and OpUtils (versions prior to 12.8.582). This issue has now been resolved.(Reported by tuannq x ngockhanhc311).Medium128582 / 128465 / 128570Download
ZVE-2024-1132Previously, CSRF vulnerability (ZVE-2024-1132) was detected where the external users were able to utilize the network tools without authentication to perform ping or SNMP ping on network devices. This has now been fixed. (Reported by Jayateertha Guruprasad).Medium128103/128247
CVE-2023-47211Earlier, path traversal vulnerability was detected for MIB browser. This issue has now been fixed by implementing path sanitization.High127193 / 127194 / 127248 / 127260
CVE-2022-37024Earlier, there was a Remote Code Execution (RCE) vulnerability in IPv6 address management reported by an anonymous working with Trend Micro Zero Day Initiative. This has been fixed now.Critical125658 / 126105 / 126120/ 126003
CVE-2022-38772Earlier, there was a Remote Code Execution (RCE) vulnerability in IPv4 address management reported by an anonymous working with Trend Micro Zero Day Initiative. This has been fixed now.Critical125658 / 126105 / 126120 / 126003
CVE-2022-36923A vulnerability resulted in unauthenticated access of the user API key. This issue has been fixed now. (Reported by Anonymous working with Trend Micro Zero Day Initiative)Critical125657 / 126002 / 126104 / 126118
CVE-2021-44514Mishandled audit directories in very few OpUtils' modules.High125474/125490
CVE-2021-3287Unauthenticated Remote Code Execution (RCE) vulnerability due to general bypass for the deserialization class.Critical125220/125314
CVE-2020-28653Unauthenticated Remote Code Execution (RCE) vulnerability in the Smart Update Manager (SUM) servlet.High125203 / 125218
CVE-2020-13818Directory Traversal validation was being bypassed when using <cachestart>.High125144
CVE-2020-12116Path Traversal vulnerabilityHigh124196/125125
CVE-2020-11946Unauthenticated access to API key disclosure from a servlet callHigh124188/125120
CVE-2020-11527File read vulnerability in Arbitrary fileHigh124181
CVE-2020-10541The obsolete code causing Remote Code Execution (RCE) vulnerability in Mail Server Settings v1 APIs have been removed.High124172
CVE-2019-17421Incorrect file permissions on the packaged Nipper executable fileMedium124079 and 124099
InternalAn operator user could access some restricted folders by bypassing the session.High123241
CVE-2018-19403Unauthenticated Remote Code Execution (RCE) vulnerabilityHigh123231
CVE-2018-17283The 'oputilsServlet' which was previously unauthenticated has now been removed.High123196
CVE-2018-12997, CVE-2018-12998It allows remote attackers to inject arbitrary web script or HTML via the parameter 'operation' to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet.High123169