Known Vulnerabilities for Opentext Extended Ecm by Opentext

Listed below are 7 of the newest known vulnerabilities associated with "Opentext Extended Ecm" by "Opentext".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-45928 json A remote OScript execution issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). Multiple endpoints al... 8.8 - HIGH 2023-01-18 2023-01-25
CVE-2022-45927 json An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The Java application server can be used to by... 8.8 - HIGH 2023-01-18 2023-01-30
CVE-2022-45926 json An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The endpoint notify.localizeEmailTemplate all... 8.8 - HIGH 2023-01-18 2023-01-26
CVE-2022-45925 json An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The action xmlexport accepts the parameter re... 7.5 - HIGH 2023-01-18 2023-01-26
CVE-2022-45924 json An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The endpoint itemtemplate.createtemplate2 all... 8.1 - HIGH 2023-01-18 2023-01-26
CVE-2022-45923 json An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The Common Gateway Interface (CGI) program cs... 8.8 - HIGH 2023-01-18 2023-01-30
CVE-2022-45922 json An issue was discovered in OpenText Content Suite Platform 22.1 (16.2.19.1803). The request handler for ll.KeepAliveSession s... 8.8 - HIGH 2023-01-18 2023-01-26
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report