{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T04:18:05.982","vulnerabilities":[{"cve":{"id":"CVE-2018-6498","sourceIdentifier":"security@opentext.com","published":"2018-08-30T21:29:00.267","lastModified":"2024-11-21T04:10:46.813","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote Code Execution in the following products Hybrid Cloud Management Containerized Suite HCM2017.11, HCM2018.02, HCM2018.05, Operations Bridge Containerized Suite 2017.11, 2018.02, 2018.05, Data Center Automation Containerized Suite 2017.01 until 2018.05, Service Management Automation Suite 2017.11, 2018.02, 2018.05 and Network Operations Management (NOM) Suite CDF 2017.11, 2018.02, 2018.05 will allow Remote Code Execution."},{"lang":"es","value":"Ejecución remota de código en los siguientes productos: Hybrid Cloud Management Containerized Suite HCM2017.11, HCM2018.02, HCM2018.05; Operations Bridge Containerized Suite 2017.11, 2018.02, 2018.05; Data Center Automation Containerized Suite 2017.01 hasta la versión 2018.05; Service Management Automation Suite 2017.11, 2018.02, 2018.05 y Network Operations Management (NOM) Suite CDF 2017.11, 2018.02 y 2018.05 permitirá la ejecución remota de código."}],"metrics":{"cvssMetricV30":[{"source":"security@opentext.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.3},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:data_center_automation:2017.01:*:*:*:*:*:*:*","matchCriteriaId":"F8CBD371-84AA-45F2-B53C-FF2F94316FDF"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:data_center_automation:2017.05:*:*:*:*:*:*:*","matchCriteriaId":"1FA57EDB-69A7-439A-886A-06E844A45CFB"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:data_center_automation:2017.08:*:*:*:*:*:*:*","matchCriteriaId":"B7E861D6-7812-4190-A3C1-F338D544123E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:data_center_automation:2017.09:*:*:*:*:*:*:*","matchCriteriaId":"4CA11555-95A4-4086-9C67-CA4C92EA4D0A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:data_center_automation:2017.11:*:*:*:*:*:*:*","matchCriteriaId":"008EA036-C58F-4B01-AEAD-3E8E79304A68"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:data_center_automation:2018.02:*:*:*:*:*:*:*","matchCriteriaId":"34E310E2-2F0F-4942-A7CD-61616D366824"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:data_center_automation:2018.05:*:*:*:*:*:*:*","matchCriteriaId":"D1CA1EEE-301A-4DB1-ACE6-A8DC7FF101C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:hybrid_cloud_management:2017.11:*:*:*:premium:*:*:*","matchCriteriaId":"EC84CBAE-0AB4-4405-8423-A221E3BABCA4"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:hybrid_cloud_management:2017.11:*:*:*:ultimate:*:*:*","matchCriteriaId":"28F73BBD-DA6B-42A5-BDC9-F8832E475B03"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:hybrid_cloud_management:2018.02:*:*:*:premium:*:*:*","matchCriteriaId":"E52C4EA5-AE1E-476E-9AAF-FB8A6D34658A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:hybrid_cloud_management:2018.02:*:*:*:ultimate:*:*:*","matchCriteriaId":"69087F9D-D5F1-462C-8264-13DBCF50474C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:hybrid_cloud_management:2018.05:*:*:*:premium:*:*:*","matchCriteriaId":"5686CFAC-0091-4B98-9654-359AC77343EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:hybrid_cloud_management:2018.05:*:*:*:ultimate:*:*:*","matchCriteriaId":"C7E8812B-28DC-4F66-B395-73AF00E57113"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:network_operations_management:2017.11:*:*:*:*:*:*:*","matchCriteriaId":"E21E1238-6D5F-4AA5-8FE4-B818D0DBF6C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:network_operations_management:2018.02:*:*:*:*:*:*:*","matchCriteriaId":"EA8F1189-19DF-43EB-9B35-61720EE11357"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:network_operations_management:2018.05:*:*:*:premium:*:*:*","matchCriteriaId":"DF75B30C-1E8D-462E-A30A-9C17EF0B7CE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_bridge:2017.11:*:*:*:premium:*:*:*","matchCriteriaId":"34099595-3D44-4B10-AA42-5A6DC9B82F25"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_bridge:2018.02:*:*:*:premium:*:*:*","matchCriteriaId":"2D4D7844-FA36-4C63-8AD6-C40F81134DBC"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:operations_bridge:2018.05:*:*:*:premium:*:*:*","matchCriteriaId":"78756DED-D384-4F7F-99C3-6BC6293B1D28"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:service_management_automation:2017.11:*:*:*:*:*:*:*","matchCriteriaId":"5166B660-88F2-437B-96DA-F7E44E6AE9A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:service_management_automation:2018.02:*:*:*:*:*:*:*","matchCriteriaId":"2DCFB2E7-D769-4365-9B99-952907563749"},{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:service_management_automation:2018.05:*:*:*:*:*:*:*","matchCriteriaId":"3909E337-F1FC-45C8-A120-EEBDBFB0E4D0"}]}]}],"references":[{"url":"https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236632","source":"security@opentext.com"},{"url":"https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236667","source":"security@opentext.com"},{"url":"https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236669","source":"security@opentext.com"},{"url":"https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236678","source":"security@opentext.com"},{"url":"https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236725","source":"security@opentext.com"},{"url":"https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236632","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236667","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236669","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236678","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03236725","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}