Описание
Reflected XSS on Micro Focus Enterprise Developer and Enterprise Server, all versions prior to version 3.0 Patch Update 20, version 4.0 Patch Update 12, and version 5.0 Patch Update 2. The vulnerability could be exploited to redirect a user to a malicious page or forge certain types of web requests.
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:microfocus:enterprise_developer:3.0:-:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_1:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_10:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_11:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_12:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_13:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_14:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_15:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_16:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_17:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_18:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_19:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_2:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_3:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_4:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_5:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_6:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_7:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_8:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:3.0:patch_9:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:-:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_1:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_10:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_11:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_2:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_3:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_4:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_5:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_6:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_7:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_8:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:4.0:patch_9:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:5.0:-:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_developer:5.0:patch_1:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:-:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_1:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_10:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_11:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_12:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_13:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_14:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_15:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_16:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_17:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_18:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_19:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_2:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_3:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_4:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_5:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_6:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_7:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_8:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:3.0:patch_9:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:-:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_1:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_10:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_11:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_2:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_3:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_4:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_5:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_6:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_7:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_8:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:4.0:patch_9:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:5.0:-:*:*:*:*:*:*
cpe:2.3:a:microfocus:enterprise_server:5.0:patch_1:*:*:*:*:*:*
EPSS
Процентиль: 47%
0.0024
Низкий
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-79
Связанные уязвимости
CVSS3: 6.1
github
больше 3 лет назад
Reflected XSS on Micro Focus Enterprise Developer and Enterprise Server, all versions prior to version 3.0 Patch Update 20, version 4.0 Patch Update 12, and version 5.0 Patch Update 2. The vulnerability could be exploited to redirect a user to a malicious page or forge certain types of web requests.
EPSS
Процентиль: 47%
0.0024
Низкий
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-79