cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2019-4326,https://securityvulnerability.io/vulnerability/CVE-2019-4326,,"""HCL AppScan Enterprise security rules update administration section of the web application console is missing HTTP Strict-Transport-Security Header.""",HCL Software,"""hcl Appscan Enterprise """,7.5,HIGH,0.002199999988079071,false,false,false,false,,false,false,2020-10-06T17:22:45.000Z,0 CVE-2019-4325,https://securityvulnerability.io/vulnerability/CVE-2019-4325,,"""HCL AppScan Enterprise makes use of broken or risky cryptographic algorithm to store REST API user details.""",HCL Software,"""hcl Appscan Enterprise """,5.3,MEDIUM,0.0008399999933317304,false,false,false,false,,false,false,2020-10-06T17:18:43.000Z,0 CVE-2019-4323,https://securityvulnerability.io/vulnerability/CVE-2019-4323,,"""HCL AppScan Enterprise advisory API documentation is susceptible to clickjacking, which could allow an attacker to embed the contents of untrusted web pages in a frame.""",HCL Software,"""hcl Appscan Enterprise""",4.3,MEDIUM,0.0008399999933317304,false,false,false,false,,false,false,2020-07-07T14:49:46.000Z,0 CVE-2019-4324,https://securityvulnerability.io/vulnerability/CVE-2019-4324,,"""HCL AppScan Enterprise is susceptible to Cross-Site Scripting while importing a specially crafted test policy.""",HCL Software,"""hcl Appscan Enterprise""",6.1,MEDIUM,0.0008399999933317304,false,false,false,false,,false,false,2020-07-07T14:45:17.000Z,0 CVE-2019-4327,https://securityvulnerability.io/vulnerability/CVE-2019-4327,,"""HCL AppScan Enterprise uses hard-coded credentials which can be exploited by attackers to get unauthorized access to application's encrypted files.""",HCL Software,"""hcl Appscan Enterprise Edition""",7.5,HIGH,0.0016799999866634607,false,false,false,false,,false,false,2020-04-21T18:13:45.000Z,0