ID CVE-2019-11668
Summary HTTP cookie in Micro Focus Service manager, Versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. And Micro Focus Service Manager Chat Server, versions 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. And Micro Focus Service Manager Chat Service 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62.
References
Vulnerable Configurations
  • cpe:2.3:a:microfocus:service_manager:9.30:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager:9.30:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager:9.31:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager:9.31:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager:9.32:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager:9.32:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager:9.33:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager:9.33:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager:9.34:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager:9.34:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager:9.35:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager:9.35:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager:9.40:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager:9.40:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager:9.41:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager:9.41:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager:9.50:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager:9.50:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager:9.51:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager:9.51:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager:9.52:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager:9.52:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager:9.60:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager:9.60:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager:9.61:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager:9.61:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager:9.62:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager:9.62:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager_chat_server:9.41:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager_chat_server:9.41:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager_chat_server:9.50:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager_chat_server:9.50:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager_chat_server:9.51:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager_chat_server:9.51:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager_chat_server:9.52:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager_chat_server:9.52:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager_chat_server:9.60:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager_chat_server:9.60:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager_chat_server:9.61:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager_chat_server:9.61:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager_chat_server:9.62:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager_chat_server:9.62:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager_chat_service:9.41:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager_chat_service:9.41:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager_chat_service:9.50:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager_chat_service:9.50:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager_chat_service:9.51:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager_chat_service:9.51:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager_chat_service:9.52:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager_chat_service:9.52:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager_chat_service:9.60:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager_chat_service:9.60:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager_chat_service:9.61:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager_chat_service:9.61:*:*:*:*:*:*:*
  • cpe:2.3:a:microfocus:service_manager_chat_service:9.62:*:*:*:*:*:*:*
    cpe:2.3:a:microfocus:service_manager_chat_service:9.62:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 24-08-2020 - 17:37)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
confirm https://softwaresupport.softwaregrp.com/doc/KM03517335
Last major update 24-08-2020 - 17:37
Published 10-09-2019 - 21:15
Last modified 24-08-2020 - 17:37
Back to Top