Show plain JSON{"id": "CVE-2019-3493", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2019-04-29T16:29:00.733", "references": [{"url": "https://softwaresupport.softwaregrp.com/doc/KM03407763", "source": "security@opentext.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "A potential security vulnerability has been identified in Micro Focus Network Automation Software 9.20, 9.21, 10.00, 10.10, 10.20, 10.30, 10.40, 10.50, 2018.05, 2018.08, 2018.11, and Micro Focus Network Operations Management (NOM) all versions. The vulnerability could be remotely exploited to Remote Code Execution."}, {"lang": "es", "value": "Se ha identificado una potencial vulnerabilidad de seguridad en las versiones de Micro Focus Network Automation Software 9.20, 9.21, 10.00, 10.10, 10.20, 10.30, 10.40, 10.50, 2018.05, 2018.08, 2018.11 y en todas las versiones de Micro Focus Network Operations Management (NOM). La vulnerabilidad podr\u00eda ser explotada remotamente para la Ejecuci\u00f3n Remota de C\u00f3digo."}], "lastModified": "2023-11-07T03:09:53.223", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:microfocus:network_automation:9.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDC7644B-286B-401D-A9EC-E5E121691495"}, {"criteria": "cpe:2.3:a:microfocus:network_automation:9.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D5681C1-C775-472B-9432-8931757D0B21"}, {"criteria": "cpe:2.3:a:microfocus:network_automation:10.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A918B90-7408-46A9-B7F7-BD61CDBA03A1"}, {"criteria": "cpe:2.3:a:microfocus:network_automation:10.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "172406ED-31E4-42C2-B000-811865DA2293"}, {"criteria": "cpe:2.3:a:microfocus:network_automation:10.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BF2DC96-0F30-4A75-AAD7-730231549525"}, {"criteria": "cpe:2.3:a:microfocus:network_automation:10.40:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42545A63-B5CA-4668-8AD0-4D341AEBE531"}, {"criteria": "cpe:2.3:a:microfocus:network_automation:10.50:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBC2D47A-E969-4E42-95DB-34859638DEA0"}, {"criteria": "cpe:2.3:a:microfocus:network_automation:2018.05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BE62C5B-6464-4096-9324-5A9CCCFFECAF"}, {"criteria": "cpe:2.3:a:microfocus:network_automation:2018.08:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6ECF3470-B13E-4CBB-A853-07879D98EE1D"}, {"criteria": "cpe:2.3:a:microfocus:network_automation:2018.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6814B971-E024-4096-86C3-8D4EA13FBE39"}, {"criteria": "cpe:2.3:a:microfocus:network_operations_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "117AE41F-8187-4FFC-83B4-61F934365C0E"}], "operator": "OR"}]}], "sourceIdentifier": "security@opentext.com"}