CVE-2019-11651
02.10.2019, 21:15
Reflected XSS on Micro Focus Enterprise Developer and Enterprise Server, all versions prior to version 3.0 Patch Update 20, version 4.0 Patch Update 12, and version 5.0 Patch Update 2. The vulnerability could be exploited to redirect a user to a malicious page or forge certain types of web requests.
Vendor | Product | Version |
---|---|---|
microfocus | enterprise_developer | 3.0 |
microfocus | enterprise_developer | 3.0:patch_1 |
microfocus | enterprise_developer | 3.0:patch_10 |
microfocus | enterprise_developer | 3.0:patch_11 |
microfocus | enterprise_developer | 3.0:patch_12 |
microfocus | enterprise_developer | 3.0:patch_13 |
microfocus | enterprise_developer | 3.0:patch_14 |
microfocus | enterprise_developer | 3.0:patch_15 |
microfocus | enterprise_developer | 3.0:patch_16 |
microfocus | enterprise_developer | 3.0:patch_17 |
microfocus | enterprise_developer | 3.0:patch_18 |
microfocus | enterprise_developer | 3.0:patch_19 |
microfocus | enterprise_developer | 3.0:patch_2 |
microfocus | enterprise_developer | 3.0:patch_3 |
microfocus | enterprise_developer | 3.0:patch_4 |
microfocus | enterprise_developer | 3.0:patch_5 |
microfocus | enterprise_developer | 3.0:patch_6 |
microfocus | enterprise_developer | 3.0:patch_7 |
microfocus | enterprise_developer | 3.0:patch_8 |
microfocus | enterprise_developer | 3.0:patch_9 |
microfocus | enterprise_developer | 4.0 |
microfocus | enterprise_developer | 4.0:patch_1 |
microfocus | enterprise_developer | 4.0:patch_10 |
microfocus | enterprise_developer | 4.0:patch_11 |
microfocus | enterprise_developer | 4.0:patch_2 |
microfocus | enterprise_developer | 4.0:patch_3 |
microfocus | enterprise_developer | 4.0:patch_4 |
microfocus | enterprise_developer | 4.0:patch_5 |
microfocus | enterprise_developer | 4.0:patch_6 |
microfocus | enterprise_developer | 4.0:patch_7 |
microfocus | enterprise_developer | 4.0:patch_8 |
microfocus | enterprise_developer | 4.0:patch_9 |
microfocus | enterprise_developer | 5.0 |
microfocus | enterprise_developer | 5.0:patch_1 |
microfocus | enterprise_server | 3.0 |
microfocus | enterprise_server | 3.0:patch_1 |
microfocus | enterprise_server | 3.0:patch_10 |
microfocus | enterprise_server | 3.0:patch_11 |
microfocus | enterprise_server | 3.0:patch_12 |
microfocus | enterprise_server | 3.0:patch_13 |
microfocus | enterprise_server | 3.0:patch_14 |
microfocus | enterprise_server | 3.0:patch_15 |
microfocus | enterprise_server | 3.0:patch_16 |
microfocus | enterprise_server | 3.0:patch_17 |
microfocus | enterprise_server | 3.0:patch_18 |
microfocus | enterprise_server | 3.0:patch_19 |
microfocus | enterprise_server | 3.0:patch_2 |
microfocus | enterprise_server | 3.0:patch_3 |
microfocus | enterprise_server | 3.0:patch_4 |
microfocus | enterprise_server | 3.0:patch_5 |
microfocus | enterprise_server | 3.0:patch_6 |
microfocus | enterprise_server | 3.0:patch_7 |
microfocus | enterprise_server | 3.0:patch_8 |
microfocus | enterprise_server | 3.0:patch_9 |
microfocus | enterprise_server | 4.0 |
microfocus | enterprise_server | 4.0:patch_1 |
microfocus | enterprise_server | 4.0:patch_10 |
microfocus | enterprise_server | 4.0:patch_11 |
microfocus | enterprise_server | 4.0:patch_2 |
microfocus | enterprise_server | 4.0:patch_3 |
microfocus | enterprise_server | 4.0:patch_4 |
microfocus | enterprise_server | 4.0:patch_5 |
microfocus | enterprise_server | 4.0:patch_6 |
microfocus | enterprise_server | 4.0:patch_7 |
microfocus | enterprise_server | 4.0:patch_8 |
microfocus | enterprise_server | 4.0:patch_9 |
microfocus | enterprise_server | 5.0 |
microfocus | enterprise_server | 5.0:patch_1 |
𝑥
= Vulnerable software versions