9.8
CVE-2024-3483
- EPSS 0.17%
- Veröffentlicht 15.05.2024 17:15:12
- Zuletzt bearbeitet 21.01.2025 17:24:19
- Quelle security@opentext.com
- Teams Watchlist Login
- Unerledigt Login
Remote Code Execution has been discovered in OpenText™ iManager 3.2.6.0200. The vulnerability can trigger command injection and insecure deserialization issues.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microfocus ≫ Imanager Version >= 3.0 <= 3.2.6
Microfocus ≫ Imanager Version3.2.6 Updatepatch1
Microfocus ≫ Imanager Version3.2.6 Updatepatch2
Microfocus ≫ Imanager Version3.2.6 Updatepatch3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.17% | 0.388 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
security@opentext.com | 7.8 | 1.1 | 6 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.