Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/openafs@1.8.6-5
Typedeb
Namespacedebian
Nameopenafs
Version1.8.6-5
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.8.9-1+deb12u1
Latest_non_vulnerable_version1.8.9-1+deb12u1
Affected_by_vulnerabilities
0
url VCID-2dzj-pdn1-gffv
vulnerability_id VCID-2dzj-pdn1-gffv
summary An authenticated user can provide a malformed ACL to the fileserver's StoreACL RPC, causing the fileserver to crash, possibly expose uninitialized memory, and possibly store garbage data in the audit log. Malformed ACLs provided in responses to client FetchACL RPCs can cause client processes to crash and possibly expose uninitialized memory into other ACLs stored on the server.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10396
reference_id
reference_type
scores
0
value 0.00154
scoring_system epss
scoring_elements 0.36125
published_at 2026-04-21T12:55:00Z
1
value 0.00154
scoring_system epss
scoring_elements 0.36176
published_at 2026-04-12T12:55:00Z
2
value 0.00154
scoring_system epss
scoring_elements 0.3615
published_at 2026-04-13T12:55:00Z
3
value 0.00154
scoring_system epss
scoring_elements 0.36193
published_at 2026-04-16T12:55:00Z
4
value 0.00154
scoring_system epss
scoring_elements 0.36177
published_at 2026-04-18T12:55:00Z
5
value 0.00154
scoring_system epss
scoring_elements 0.36272
published_at 2026-04-02T12:55:00Z
6
value 0.00154
scoring_system epss
scoring_elements 0.36305
published_at 2026-04-04T12:55:00Z
7
value 0.00154
scoring_system epss
scoring_elements 0.3614
published_at 2026-04-07T12:55:00Z
8
value 0.00154
scoring_system epss
scoring_elements 0.3619
published_at 2026-04-08T12:55:00Z
9
value 0.00154
scoring_system epss
scoring_elements 0.36208
published_at 2026-04-09T12:55:00Z
10
value 0.00154
scoring_system epss
scoring_elements 0.36213
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10396
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10396
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10396
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087406
reference_id 1087406
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087406
3
reference_url https://www.openafs.org/pages/security/OPENAFS-SA-2024-002.txt
reference_id OPENAFS-SA-2024-002.txt
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:58:56Z/
url https://www.openafs.org/pages/security/OPENAFS-SA-2024-002.txt
4
reference_url https://www.openafs.org/security
reference_id security
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:58:56Z/
url https://www.openafs.org/security
fixed_packages
0
url pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1
purl pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1
aliases CVE-2024-10396
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2dzj-pdn1-gffv
1
url VCID-3wzs-pca6-kfgu
vulnerability_id VCID-3wzs-pca6-kfgu
summary A malicious server can crash the OpenAFS cache manager and other client utilities, and possibly execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10397
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35495
published_at 2026-04-02T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.3552
published_at 2026-04-04T12:55:00Z
2
value 0.00203
scoring_system epss
scoring_elements 0.42313
published_at 2026-04-21T12:55:00Z
3
value 0.00203
scoring_system epss
scoring_elements 0.42409
published_at 2026-04-16T12:55:00Z
4
value 0.00203
scoring_system epss
scoring_elements 0.42384
published_at 2026-04-18T12:55:00Z
5
value 0.00203
scoring_system epss
scoring_elements 0.42346
published_at 2026-04-07T12:55:00Z
6
value 0.00203
scoring_system epss
scoring_elements 0.42395
published_at 2026-04-08T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.42402
published_at 2026-04-09T12:55:00Z
8
value 0.00203
scoring_system epss
scoring_elements 0.42425
published_at 2026-04-11T12:55:00Z
9
value 0.00203
scoring_system epss
scoring_elements 0.42389
published_at 2026-04-12T12:55:00Z
10
value 0.00203
scoring_system epss
scoring_elements 0.4236
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10397
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10397
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087406
reference_id 1087406
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087406
3
reference_url https://www.openafs.org/pages/security/OPENAFS-SA-2024-003.txt
reference_id OPENAFS-SA-2024-003.txt
reference_type
scores
0
value 7.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:46:42Z/
url https://www.openafs.org/pages/security/OPENAFS-SA-2024-003.txt
fixed_packages
0
url pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1
purl pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1
aliases CVE-2024-10397
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3wzs-pca6-kfgu
2
url VCID-5z4c-t4de-fkhj
vulnerability_id VCID-5z4c-t4de-fkhj
summary A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10394
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.00988
published_at 2026-04-04T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02101
published_at 2026-04-21T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02028
published_at 2026-04-12T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02025
published_at 2026-04-13T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02002
published_at 2026-04-16T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02016
published_at 2026-04-18T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.0205
published_at 2026-04-07T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02052
published_at 2026-04-08T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02069
published_at 2026-04-09T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02044
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10394
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10394
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087406
reference_id 1087406
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087406
3
reference_url https://www.openafs.org/pages/security/OPENAFS-SA-2024-001.txt
reference_id OPENAFS-SA-2024-001.txt
reference_type
scores
0
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:59:42Z/
url https://www.openafs.org/pages/security/OPENAFS-SA-2024-001.txt
4
reference_url https://www.openafs.org/security
reference_id security
reference_type
scores
0
value 8.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:59:42Z/
url https://www.openafs.org/security
fixed_packages
0
url pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1
purl pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1
aliases CVE-2024-10394
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5z4c-t4de-fkhj
Fixing_vulnerabilities
0
url VCID-3thg-8s1s-zyad
vulnerability_id VCID-3thg-8s1s-zyad
summary OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to an information disclosure vulnerability because uninitialized scalars are sent over the network to a peer.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-18602
reference_id
reference_type
scores
0
value 0.00413
scoring_system epss
scoring_elements 0.6151
published_at 2026-04-21T12:55:00Z
1
value 0.00413
scoring_system epss
scoring_elements 0.61525
published_at 2026-04-18T12:55:00Z
2
value 0.00413
scoring_system epss
scoring_elements 0.61356
published_at 2026-04-01T12:55:00Z
3
value 0.00413
scoring_system epss
scoring_elements 0.61433
published_at 2026-04-02T12:55:00Z
4
value 0.00413
scoring_system epss
scoring_elements 0.61461
published_at 2026-04-04T12:55:00Z
5
value 0.00413
scoring_system epss
scoring_elements 0.61432
published_at 2026-04-07T12:55:00Z
6
value 0.00413
scoring_system epss
scoring_elements 0.61479
published_at 2026-04-08T12:55:00Z
7
value 0.00413
scoring_system epss
scoring_elements 0.61494
published_at 2026-04-09T12:55:00Z
8
value 0.00413
scoring_system epss
scoring_elements 0.61515
published_at 2026-04-11T12:55:00Z
9
value 0.00413
scoring_system epss
scoring_elements 0.61502
published_at 2026-04-12T12:55:00Z
10
value 0.00413
scoring_system epss
scoring_elements 0.61482
published_at 2026-04-13T12:55:00Z
11
value 0.00413
scoring_system epss
scoring_elements 0.61521
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-18602
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18602
2
reference_url https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html
3
reference_url https://openafs.org/pages/security/OPENAFS-SA-2019-002.txt
reference_id
reference_type
scores
url https://openafs.org/pages/security/OPENAFS-SA-2019-002.txt
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943587
reference_id 943587
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943587
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-18602
reference_id CVE-2019-18602
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-18602
fixed_packages
0
url pkg:deb/debian/openafs@1.8.6-5
purl pkg:deb/debian/openafs@1.8.6-5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2dzj-pdn1-gffv
1
vulnerability VCID-3wzs-pca6-kfgu
2
vulnerability VCID-5z4c-t4de-fkhj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5
aliases CVE-2019-18602
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3thg-8s1s-zyad
1
url VCID-6yfs-sxke-hbat
vulnerability_id VCID-6yfs-sxke-hbat
summary OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to denial of service from unserialized data access because remote attackers can make a series of VOTE_Debug RPC calls to crash a database server within the SVOTE_Debug RPC handler.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-18601
reference_id
reference_type
scores
0
value 0.01102
scoring_system epss
scoring_elements 0.78093
published_at 2026-04-21T12:55:00Z
1
value 0.01102
scoring_system epss
scoring_elements 0.78099
published_at 2026-04-18T12:55:00Z
2
value 0.01102
scoring_system epss
scoring_elements 0.78009
published_at 2026-04-01T12:55:00Z
3
value 0.01102
scoring_system epss
scoring_elements 0.78017
published_at 2026-04-02T12:55:00Z
4
value 0.01102
scoring_system epss
scoring_elements 0.78046
published_at 2026-04-04T12:55:00Z
5
value 0.01102
scoring_system epss
scoring_elements 0.78029
published_at 2026-04-07T12:55:00Z
6
value 0.01102
scoring_system epss
scoring_elements 0.78055
published_at 2026-04-08T12:55:00Z
7
value 0.01102
scoring_system epss
scoring_elements 0.78059
published_at 2026-04-09T12:55:00Z
8
value 0.01102
scoring_system epss
scoring_elements 0.78085
published_at 2026-04-11T12:55:00Z
9
value 0.01102
scoring_system epss
scoring_elements 0.78068
published_at 2026-04-12T12:55:00Z
10
value 0.01102
scoring_system epss
scoring_elements 0.78065
published_at 2026-04-13T12:55:00Z
11
value 0.01102
scoring_system epss
scoring_elements 0.781
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-18601
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18601
2
reference_url https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html
3
reference_url https://openafs.org/pages/security/OPENAFS-SA-2019-003.txt
reference_id
reference_type
scores
url https://openafs.org/pages/security/OPENAFS-SA-2019-003.txt
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943587
reference_id 943587
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943587
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-18601
reference_id CVE-2019-18601
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-18601
fixed_packages
0
url pkg:deb/debian/openafs@1.8.6-5
purl pkg:deb/debian/openafs@1.8.6-5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2dzj-pdn1-gffv
1
vulnerability VCID-3wzs-pca6-kfgu
2
vulnerability VCID-5z4c-t4de-fkhj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5
aliases CVE-2019-18601
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6yfs-sxke-hbat
2
url VCID-tf8j-e36c-syf8
vulnerability_id VCID-tf8j-e36c-syf8
summary OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to information leakage upon certain error conditions because uninitialized RPC output variables are sent over the network to a peer.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-18603
reference_id
reference_type
scores
0
value 0.00413
scoring_system epss
scoring_elements 0.6151
published_at 2026-04-21T12:55:00Z
1
value 0.00413
scoring_system epss
scoring_elements 0.61525
published_at 2026-04-18T12:55:00Z
2
value 0.00413
scoring_system epss
scoring_elements 0.61356
published_at 2026-04-01T12:55:00Z
3
value 0.00413
scoring_system epss
scoring_elements 0.61433
published_at 2026-04-02T12:55:00Z
4
value 0.00413
scoring_system epss
scoring_elements 0.61461
published_at 2026-04-04T12:55:00Z
5
value 0.00413
scoring_system epss
scoring_elements 0.61432
published_at 2026-04-07T12:55:00Z
6
value 0.00413
scoring_system epss
scoring_elements 0.61479
published_at 2026-04-08T12:55:00Z
7
value 0.00413
scoring_system epss
scoring_elements 0.61494
published_at 2026-04-09T12:55:00Z
8
value 0.00413
scoring_system epss
scoring_elements 0.61515
published_at 2026-04-11T12:55:00Z
9
value 0.00413
scoring_system epss
scoring_elements 0.61502
published_at 2026-04-12T12:55:00Z
10
value 0.00413
scoring_system epss
scoring_elements 0.61482
published_at 2026-04-13T12:55:00Z
11
value 0.00413
scoring_system epss
scoring_elements 0.61521
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-18603
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18603
2
reference_url https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html
3
reference_url https://openafs.org/pages/security/OPENAFS-SA-2019-001.txt
reference_id
reference_type
scores
url https://openafs.org/pages/security/OPENAFS-SA-2019-001.txt
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943587
reference_id 943587
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943587
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-18603
reference_id CVE-2019-18603
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-18603
fixed_packages
0
url pkg:deb/debian/openafs@1.8.6-5
purl pkg:deb/debian/openafs@1.8.6-5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2dzj-pdn1-gffv
1
vulnerability VCID-3wzs-pca6-kfgu
2
vulnerability VCID-5z4c-t4de-fkhj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5
aliases CVE-2019-18603
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tf8j-e36c-syf8
Risk_score2.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5