{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T23:51:17.121","vulnerabilities":[{"cve":{"id":"CVE-2019-19866","sourceIdentifier":"cve@mitre.org","published":"2020-02-21T16:15:11.637","lastModified":"2024-11-21T04:35:33.253","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Atos Unify OpenScape UC Web Client V9 before version V9 R4.31.0 and V10 before version V10 R0.6.0 allows remote attackers to obtain sensitive information. By iterating the value of conferenceId to getMailFunction in the JSON API, one can enumerate all conferences scheduled on the platform, with their numbers and access PINs."},{"lang":"es","value":"Atos Unify OpenScape UC Web Client V9 anterior a la versión V9 R4.31.0 y V10 anterior a la versión  V10 R0.6.0 permite a los atacantes remotos obtener información confidencial. Al repetir el valor de conferenceId para obtener la funciónMailFunction en la API JSON, se pueden enumerar todas las conferencias programadas en la plataforma, con sus números y PIN de acceso."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:atos:unify_openscape_uc_web_client:9.0:-:*:*:*:*:*:*","matchCriteriaId":"74E474DC-3BC1-4930-A435-F8DED4D430AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:atos:unify_openscape_uc_web_client:10.0:-:*:*:*:*:*:*","matchCriteriaId":"C9B3B67B-DBBC-41CA-B086-8CFB42FC2FF6"}]}]}],"references":[{"url":"https://networks.unify.com/security/advisories/OBSO-2002-01.pdf","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://unify.com/en/support/security-advisories","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://networks.unify.com/security/advisories/OBSO-2002-01.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://unify.com/en/support/security-advisories","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}