cve/2023/CVE-2023-32260.md

21 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-32260](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32260)
![](https://img.shields.io/static/v1?label=Product&message=Asset%20Management%20X%20(AMX)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Hybrid%20Cloud%20Management%20X%20(HCMX)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Service%20Management%20Automation%20X%20(SMAX)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202020.05%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202021.08%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-115%20Misinterpretation%20of%20Input&color=brighgreen)
### Description
Misinterpretation of Input vulnerability in OpenText™ Service Management Automation X (SMAX), OpenText™ Asset Management X (AMX), and OpenText™ Hybrid Cloud Management X (HCMX) products. The vulnerability could allow Input data manipulation.This issue affects Service Management Automation X (SMAX) versions: 2020.05, 2020.08, 2020.11, 2021.02, 2021.05, 2021.08, 2021.11, 2022.05, 2022.11, 2023.05; Asset Management X (AMX) versions: 2021.08, 2021.11, 2022.05, 2022.11, 2023.05; and Hybrid Cloud Management X (HCMX) versions: 2020.05, 2020.08, 2020.11, 2021.02, 2021.05, 2021.08, 2021.11, 2022.05, 2022.11, 2023.05.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/NaInSec/CVE-LIST