{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-15T03:55:30.317","vulnerabilities":[{"cve":{"id":"CVE-2022-38756","sourceIdentifier":"security@opentext.com","published":"2022-12-16T23:15:09.703","lastModified":"2025-04-18T14:15:18.953","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in Micro Focus GroupWise Web in versions prior to 18.4.2. The GW Web component makes a request to the Post Office Agent that contains sensitive information in the query parameters that could be logged by any intervening HTTP proxies."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en Micro Focus GroupWise Web en versiones anteriores a la 18.4.2. El componente web de GW realiza una solicitud al Agente de la oficina postal que contiene información confidencial en los parámetros de consulta que podrían registrar los servidores proxy HTTP que intervienen."}],"metrics":{"cvssMetricV31":[{"source":"security@opentext.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-532"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-532"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microfocus:groupwise:*:*:*:*:*:*:*:*","versionEndExcluding":"18.4.2","matchCriteriaId":"92C51C01-F218-4844-A26B-2464BB94B370"}]}]}],"references":[{"url":"http://packetstormsecurity.com/files/170768/Micro-Focus-GroupWise-Session-ID-Disclosure.html","source":"security@opentext.com"},{"url":"http://seclists.org/fulldisclosure/2023/Jan/28","source":"security@opentext.com"},{"url":"https://portal.microfocus.com/s/article/KM000012374?language=en_US","source":"security@opentext.com"},{"url":"http://packetstormsecurity.com/files/170768/Micro-Focus-GroupWise-Session-ID-Disclosure.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/fulldisclosure/2023/Jan/28","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://portal.microfocus.com/s/article/KM000012374?language=en_US","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://packetstorm.news/files/id/170768","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"},{"url":"https://seclists.org/fulldisclosure/2023/Jan/28","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}}]}