{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T01:37:53.227","vulnerabilities":[{"cve":{"id":"CVE-2019-11997","sourceIdentifier":"security-alert@hpe.com","published":"2020-01-16T19:15:11.967","lastModified":"2024-11-21T04:22:07.943","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A potential security vulnerability has been identified in HPE enhanced Internet Usage Manager (eIUM) versions 8.3 and 9.0. The vulnerability could be used for unauthorized access to information via cross site scripting. HPE has made the following software updates to resolve the vulnerability in eIUM. The eIUM 8.3 FP01 customers are advised to install eIUM83FP01Patch_QXCR1001711284.20190806-1244 patch. The eIUM 9.0 customers are advised to upgrade to eIUM 9.0 FP02 PI5 or later versions. For other versions, please, contact the product support."},{"lang":"es","value":"Se ha identificado una potencial vulnerabilidad de seguridad en HPE enhanced Internet Usage Manager (eIUM) versiones 8.3 y 9.0. La vulnerabilidad podría ser usada para el acceso no autorizado a la información por medio de un ataque de tipo cross site scripting. HPE ha realizado las siguientes actualizaciones de software para resolver la vulnerabilidad en eIUM. Se recomienda a los clientes de eIUM versión 8.3 FP01 que instalen el parche eIUM83FP01Patch_QXCR1001711284.20190806-1244. Se recomienda a los clientes de eIUM versión 9.0 que actualicen a eIUM versión 9.0 FP02 PI5 o versiones posteriores. Para otras versiones, póngase en contacto con el soporte del producto."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:enhanced_internet_usage_manager:8.3:*:*:*:*:*:*:*","matchCriteriaId":"F005524F-B3B7-4562-BD70-7359EF312FC4"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:enhanced_internet_usage_manager:9.0:*:*:*:*:*:*:*","matchCriteriaId":"6651F69C-E3FE-4B63-AB7C-639032DEE8D1"}]}]}],"references":[{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03975en_us","source":"security-alert@hpe.com","tags":["Vendor Advisory"]},{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03975en_us","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}