Vulnerabilites related to Micro Focus - Micro Focus Fortify Software Security Center Server
CVE-2019-11649 (GCVE-0-2019-11649)
Vulnerability from cvelistv5
Published
2019-06-19 16:06
Modified
2024-09-16 23:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Remote code execution
Summary
Cross-Site Scripting vulnerability in Micro Focus Fortify Software Security Center Server, versions 17.2, 18.1, 18.2, has been identified in Micro Focus Software Security Center. The vulnerability could be exploited to execute JavaScript code in user’s browser. The vulnerability could be exploited to execute JavaScript code in user’s browser.
References
▼ | URL | Tags |
---|---|---|
https://softwaresupport.softwaregrp.com/doc/KM03461174 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Micro Focus | Micro Focus Fortify Software Security Center Server |
Version: 17.1, 18.1, 18.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:03:32.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://softwaresupport.softwaregrp.com/doc/KM03461174" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Micro Focus Fortify Software Security Center Server", "vendor": "Micro Focus", "versions": [ { "status": "affected", "version": "17.1, 18.1, 18.2" } ] } ], "datePublic": "2019-06-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-Site Scripting vulnerability in Micro Focus Fortify Software Security Center Server, versions 17.2, 18.1, 18.2, has been identified in Micro Focus Software Security Center. The vulnerability could be exploited to execute JavaScript code in user\u2019s browser. The vulnerability could be exploited to execute JavaScript code in user\u2019s browser." } ], "exploits": [ { "lang": "en", "value": "Remote code execution." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Remote code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:29", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://softwaresupport.softwaregrp.com/doc/KM03461174" } ], "source": { "discovery": "UNKNOWN" }, "title": "KM03461174 Micro Focus Fortify Software Security Center Server, CVE-2019-11649", "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2019-06-20T20:15:00.000Z", "ID": "CVE-2019-11649", "STATE": "PUBLIC", "TITLE": "KM03461174 Micro Focus Fortify Software Security Center Server, CVE-2019-11649" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Micro Focus Fortify Software Security Center Server", "version": { "version_data": [ { "version_value": "17.1, 18.1, 18.2" } ] } } ] }, "vendor_name": "Micro Focus" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-Site Scripting vulnerability in Micro Focus Fortify Software Security Center Server, versions 17.2, 18.1, 18.2, has been identified in Micro Focus Software Security Center. The vulnerability could be exploited to execute JavaScript code in user\u2019s browser. The vulnerability could be exploited to execute JavaScript code in user\u2019s browser." } ] }, "exploit": [ { "lang": "en", "value": "Remote code execution." } ], "generator": { "engine": "Vulnogram 0.0.7" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://softwaresupport.softwaregrp.com/doc/KM03461174", "refsource": "MISC", "url": "https://softwaresupport.softwaregrp.com/doc/KM03461174" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2019-11649", "datePublished": "2019-06-19T16:06:50.731771Z", "dateReserved": "2019-05-01T00:00:00", "dateUpdated": "2024-09-16T23:26:48.441Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }