{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T03:35:06.481","vulnerabilities":[{"cve":{"id":"CVE-2019-4149","sourceIdentifier":"psirt@us.ibm.com","published":"2019-09-05T15:15:12.907","lastModified":"2024-11-21T04:43:14.430","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Business Automation Workflow V18.0.0.0 through V18.0.0.2 and IBM Business Process Manager V8.6.0.0 through V8.6.0.0 Cumulative Fix 2018.03, V8.5.7.0 through V8.5.7.0 Cumulative Fix 2017.06, and V8.5.6.0 through V8.5.6.0 CF2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 158415."},{"lang":"es","value":"IBM Business Automation Workflow versión 18.0.0.0 hasta la versión 18.0.0.2 e IBM Business Process Manager  versión 8.6.0.0 hasta la versión 8.6.0.0 Cumulative Fix 2018.03, versión 8.5.7.0 hasta la versión 8.5.7.0 Cumulative Fix 2017.06, y versión 8.5.6.0 hasta la versión 8.5.6.0 CF2 es vulnerable a Cross-Site Scripting (XSS). Esta vulnerabilidad permite a los usuarios incrustar código JavaScript arbitrario en la interfaz de usuario web, lo que altera la funcionalidad prevista que puede conducir a la divulgación de credenciales dentro de una sesión de confianza. ID de IBM X-Force: 158415."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV30":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:*:*:*:*","versionStartIncluding":"18.0.0.0","versionEndIncluding":"18.0.0.2","matchCriteriaId":"1B8A1C8F-793A-4F66-8217-70E16C5C832B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:-:*:*:*:*:*:*","matchCriteriaId":"EE77FBBD-0033-4DDC-BBFC-8927C96A2DE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:cf1:*:*:*:*:*:*","matchCriteriaId":"6131DC1F-CBA6-4025-B5A5-98307274FA33"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:cf2:*:*:*:*:*:*","matchCriteriaId":"439A4F14-76E6-4A21-A23C-D3DA243585A9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:-:*:*:*:*:*:*","matchCriteriaId":"1874008E-86F5-4A15-B4D1-14AB666166ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:cf201706:*:*:*:*:*:*","matchCriteriaId":"D2B1150A-E780-42BF-8D9E-77258C1D869A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:-:*:*:*:*:*:*","matchCriteriaId":"04D332A0-BEA8-4E22-A37C-1AC76B36ACDB"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:cf201712:*:*:*:*:*:*","matchCriteriaId":"F7B13D9D-E6BC-4621-A3F2-57F501DC97B7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:business_process_manager:8.6.0.0:cf201803:*:*:*:*:*:*","matchCriteriaId":"71A849EF-53B1-4402-85BE-D75E4765AEAB"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/158415","source":"psirt@us.ibm.com","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/docview.wss?uid=ibm10885104","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/158415","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://www.ibm.com/support/docview.wss?uid=ibm10885104","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}