Vulnerabilites related to Micro Focus - Micro Focus Network Automation and Micro Focus Network Operations Management (NOM)
cve-2019-3493
Vulnerability from cvelistv5
Published
2019-04-29 15:47
Modified
2024-08-04 19:12
Severity ?
EPSS score ?
Summary
A potential security vulnerability has been identified in Micro Focus Network Automation Software 9.20, 9.21, 10.00, 10.10, 10.20, 10.30, 10.40, 10.50, 2018.05, 2018.08, 2018.11, and Micro Focus Network Operations Management (NOM) all versions. The vulnerability could be remotely exploited to Remote Code Execution.
References
▼ | URL | Tags |
---|---|---|
https://softwaresupport.softwaregrp.com/doc/KM03407763 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Micro Focus | Micro Focus Network Automation and Micro Focus Network Operations Management (NOM) |
Version: network operations management all Version: network automation 9.20 9.21 10.00 10.10 10.20 10.40 10.30 10.50 2018.05 2018.08 2018.11 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.509Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://softwaresupport.softwaregrp.com/doc/KM03407763" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Micro Focus Network Automation and Micro Focus Network Operations Management (NOM)", "vendor": "Micro Focus", "versions": [ { "status": "affected", "version": "network operations management all" }, { "status": "affected", "version": "network automation 9.20 9.21 10.00 10.10 10.20 10.40 10.30 10.50 2018.05 2018.08 2018.11" } ] } ], "descriptions": [ { "lang": "en", "value": "A potential security vulnerability has been identified in Micro Focus Network Automation Software 9.20, 9.21, 10.00, 10.10, 10.20, 10.30, 10.40, 10.50, 2018.05, 2018.08, 2018.11, and Micro Focus Network Operations Management (NOM) all versions. The vulnerability could be remotely exploited to Remote Code Execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-06T16:15:46", "orgId": "f81092c5-7f14-476d-80dc-24857f90be84", "shortName": "microfocus" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://softwaresupport.softwaregrp.com/doc/KM03407763" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@microfocus.com", "ID": "CVE-2019-3493", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Micro Focus Network Automation and Micro Focus Network Operations Management (NOM)", "version": { "version_data": [ { "version_value": "network operations management all" }, { "version_value": "network automation 9.20 9.21 10.00 10.10 10.20 10.40 10.30 10.50 2018.05 2018.08 2018.11" } ] } } ] }, "vendor_name": "Micro Focus" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A potential security vulnerability has been identified in Micro Focus Network Automation Software 9.20, 9.21, 10.00, 10.10, 10.20, 10.30, 10.40, 10.50, 2018.05, 2018.08, 2018.11, and Micro Focus Network Operations Management (NOM) all versions. The vulnerability could be remotely exploited to Remote Code Execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://softwaresupport.softwaregrp.com/doc/KM03407763", "refsource": "CONFIRM", "url": "https://softwaresupport.softwaregrp.com/doc/KM03407763" } ] } } } }, "cveMetadata": { "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84", "assignerShortName": "microfocus", "cveId": "CVE-2019-3493", "datePublished": "2019-04-29T15:47:08", "dateReserved": "2018-12-31T00:00:00", "dateUpdated": "2024-08-04T19:12:09.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }