Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-11651

Опубликовано: 02 окт. 2019
Источник: nvd
CVSS3: 6.1
CVSS2: 4.3
EPSS Низкий

Описание

Reflected XSS on Micro Focus Enterprise Developer and Enterprise Server, all versions prior to version 3.0 Patch Update 20, version 4.0 Patch Update 12, and version 5.0 Patch Update 2. The vulnerability could be exploited to redirect a user to a malicious page or forge certain types of web requests.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:microfocus:enterprise_developer:3.0:-:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_1:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_10:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_11:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_12:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_13:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_14:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_15:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_16:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_17:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_18:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_19:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_2:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_3:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_4:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_5:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_6:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_7:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_8:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_9:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:-:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_1:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_10:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_11:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_2:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_3:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_4:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_5:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_6:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_7:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_8:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_9:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:5.0:-:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:5.0:patch_1:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:-:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_1:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_10:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_11:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_12:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_13:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_14:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_15:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_16:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_17:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_18:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_19:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_2:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_3:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_4:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_5:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_6:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_7:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_8:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_9:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:-:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_1:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_10:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_11:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_2:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_3:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_4:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_5:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_6:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_7:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_8:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_9:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:5.0:-:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:5.0:patch_1:*:*:*:*:*:*

EPSS

Процентиль: 47%
0.0024
Низкий

6.1 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
github
больше 3 лет назад

Reflected XSS on Micro Focus Enterprise Developer and Enterprise Server, all versions prior to version 3.0 Patch Update 20, version 4.0 Patch Update 12, and version 5.0 Patch Update 2. The vulnerability could be exploited to redirect a user to a malicious page or forge certain types of web requests.

EPSS

Процентиль: 47%
0.0024
Низкий

6.1 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-79