{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T01:43:19.055","vulnerabilities":[{"cve":{"id":"CVE-2019-4409","sourceIdentifier":"psirt@hcl.com","published":"2019-10-18T20:15:09.723","lastModified":"2024-11-21T04:43:34.267","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HCL Traveler versions 9.x and earlier are susceptible to cross-site scripting attacks. On the Problem Report page of the Traveler servlet pages, there is a field to specify a file attachment to provide additional problem details. An invalid file name returns an error message that includes the entered file name. If the file name is not escaped in the returned error page, it could expose a cross-site scripting (XSS) vulnerability."},{"lang":"es","value":"HCL Traveler versiones 9.x y anteriores, son susceptibles a ataques de tipo cross-site scripting. En la página Problem Report de las páginas del servlet de Traveler, existe un campo para especificar un archivo adjunto que provee detalles adicionales del problema. Un nombre de archivo no válido devuelve un mensaje de error que incluye el nombre de archivo ingresado. Si el nombre del archivo no es escapado en la página de error devuelta, podría exponer una vulnerabilidad de tipo cross-site scripting (XSS)."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hcltech:traveler:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.0.0","matchCriteriaId":"FFA1411A-B0DF-45CD-9E9E-56D9BBB63F4D"}]}]}],"references":[{"url":"https://hclpnpsupport.hcltech.com/csm?id=kb_article&sysparm_article=KB0073231","source":"psirt@hcl.com","tags":["Mitigation","Patch","Vendor Advisory"]},{"url":"https://hclpnpsupport.hcltech.com/csm?id=kb_article&sysparm_article=KB0073231","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Patch","Vendor Advisory"]}]}}]}