Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
Typeapk
Namespacealpine
Namefirefox-esr
Version60.7.0-r0
Qualifiers
arch x86
distroversion v3.17
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version60.7.1-r0
Latest_non_vulnerable_version102.1.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2z7p-2uj3-2qfb
vulnerability_id VCID-2z7p-2uj3-2qfb
summary If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of it on the main thread and any worker threads. *Note: users need to update to macOS 10.14.5 in order to take advantage of this change.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9815.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9815.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9815
reference_id
reference_type
scores
0
value 0.0102
scoring_system epss
scoring_elements 0.77265
published_at 2026-04-18T12:55:00Z
1
value 0.0102
scoring_system epss
scoring_elements 0.77227
published_at 2026-04-12T12:55:00Z
2
value 0.0102
scoring_system epss
scoring_elements 0.77224
published_at 2026-04-13T12:55:00Z
3
value 0.0102
scoring_system epss
scoring_elements 0.77263
published_at 2026-04-16T12:55:00Z
4
value 0.0102
scoring_system epss
scoring_elements 0.77162
published_at 2026-04-01T12:55:00Z
5
value 0.0102
scoring_system epss
scoring_elements 0.77169
published_at 2026-04-02T12:55:00Z
6
value 0.0102
scoring_system epss
scoring_elements 0.77198
published_at 2026-04-04T12:55:00Z
7
value 0.0102
scoring_system epss
scoring_elements 0.77179
published_at 2026-04-07T12:55:00Z
8
value 0.0102
scoring_system epss
scoring_elements 0.77212
published_at 2026-04-08T12:55:00Z
9
value 0.0102
scoring_system epss
scoring_elements 0.7722
published_at 2026-04-09T12:55:00Z
10
value 0.0102
scoring_system epss
scoring_elements 0.77248
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9815
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712624
reference_id 1712624
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712624
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-9815
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2z7p-2uj3-2qfb
1
url VCID-5zmj-5xkc-zkgc
vulnerability_id VCID-5zmj-5xkc-zkgc
summary A vulnerability exists in the Windows sandbox where an uninitialized value in memory can be leaked to a renderer from a broker when making a call to access an otherwise unavailable file. This results in the potential leaking of information stored at that memory location. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11694.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11694.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11694
reference_id
reference_type
scores
0
value 0.00398
scoring_system epss
scoring_elements 0.60628
published_at 2026-04-18T12:55:00Z
1
value 0.00398
scoring_system epss
scoring_elements 0.60618
published_at 2026-04-11T12:55:00Z
2
value 0.00398
scoring_system epss
scoring_elements 0.60603
published_at 2026-04-12T12:55:00Z
3
value 0.00398
scoring_system epss
scoring_elements 0.60582
published_at 2026-04-13T12:55:00Z
4
value 0.00398
scoring_system epss
scoring_elements 0.60623
published_at 2026-04-16T12:55:00Z
5
value 0.00398
scoring_system epss
scoring_elements 0.60458
published_at 2026-04-01T12:55:00Z
6
value 0.00398
scoring_system epss
scoring_elements 0.60534
published_at 2026-04-02T12:55:00Z
7
value 0.00398
scoring_system epss
scoring_elements 0.6056
published_at 2026-04-04T12:55:00Z
8
value 0.00398
scoring_system epss
scoring_elements 0.60529
published_at 2026-04-07T12:55:00Z
9
value 0.00398
scoring_system epss
scoring_elements 0.60578
published_at 2026-04-08T12:55:00Z
10
value 0.00398
scoring_system epss
scoring_elements 0.60594
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11694
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712620
reference_id 1712620
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712620
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-11694
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5zmj-5xkc-zkgc
2
url VCID-7ej9-whhw-97hn
vulnerability_id VCID-7ej9-whhw-97hn
summary A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9819.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9819.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9819
reference_id
reference_type
scores
0
value 0.00554
scoring_system epss
scoring_elements 0.68126
published_at 2026-04-18T12:55:00Z
1
value 0.00554
scoring_system epss
scoring_elements 0.68085
published_at 2026-04-08T12:55:00Z
2
value 0.00554
scoring_system epss
scoring_elements 0.68099
published_at 2026-04-09T12:55:00Z
3
value 0.00554
scoring_system epss
scoring_elements 0.68124
published_at 2026-04-11T12:55:00Z
4
value 0.00554
scoring_system epss
scoring_elements 0.68111
published_at 2026-04-12T12:55:00Z
5
value 0.00554
scoring_system epss
scoring_elements 0.68077
published_at 2026-04-13T12:55:00Z
6
value 0.00554
scoring_system epss
scoring_elements 0.68114
published_at 2026-04-16T12:55:00Z
7
value 0.00554
scoring_system epss
scoring_elements 0.68014
published_at 2026-04-01T12:55:00Z
8
value 0.00554
scoring_system epss
scoring_elements 0.68035
published_at 2026-04-02T12:55:00Z
9
value 0.00554
scoring_system epss
scoring_elements 0.68055
published_at 2026-04-04T12:55:00Z
10
value 0.00554
scoring_system epss
scoring_elements 0.68033
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9819
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712628
reference_id 1712628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712628
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
24
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
25
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
26
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
27
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
28
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
29
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
30
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
31
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-9819
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ej9-whhw-97hn
3
url VCID-8hgj-7cb6-fbbp
vulnerability_id VCID-8hgj-7cb6-fbbp
summary A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9818.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9818.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9818
reference_id
reference_type
scores
0
value 0.00343
scoring_system epss
scoring_elements 0.57007
published_at 2026-04-18T12:55:00Z
1
value 0.00343
scoring_system epss
scoring_elements 0.57024
published_at 2026-04-11T12:55:00Z
2
value 0.00343
scoring_system epss
scoring_elements 0.57004
published_at 2026-04-12T12:55:00Z
3
value 0.00343
scoring_system epss
scoring_elements 0.5698
published_at 2026-04-13T12:55:00Z
4
value 0.00343
scoring_system epss
scoring_elements 0.57009
published_at 2026-04-16T12:55:00Z
5
value 0.00343
scoring_system epss
scoring_elements 0.56865
published_at 2026-04-01T12:55:00Z
6
value 0.00343
scoring_system epss
scoring_elements 0.56962
published_at 2026-04-02T12:55:00Z
7
value 0.00343
scoring_system epss
scoring_elements 0.56983
published_at 2026-04-04T12:55:00Z
8
value 0.00343
scoring_system epss
scoring_elements 0.56959
published_at 2026-04-07T12:55:00Z
9
value 0.00343
scoring_system epss
scoring_elements 0.5701
published_at 2026-04-08T12:55:00Z
10
value 0.00343
scoring_system epss
scoring_elements 0.57012
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9818
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712627
reference_id 1712627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712627
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-9818
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8hgj-7cb6-fbbp
4
url VCID-92qb-fqpr-27hm
vulnerability_id VCID-92qb-fqpr-27hm
summary A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9820.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9820.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9820
reference_id
reference_type
scores
0
value 0.00554
scoring_system epss
scoring_elements 0.68126
published_at 2026-04-18T12:55:00Z
1
value 0.00554
scoring_system epss
scoring_elements 0.68099
published_at 2026-04-09T12:55:00Z
2
value 0.00554
scoring_system epss
scoring_elements 0.68124
published_at 2026-04-11T12:55:00Z
3
value 0.00554
scoring_system epss
scoring_elements 0.68111
published_at 2026-04-12T12:55:00Z
4
value 0.00554
scoring_system epss
scoring_elements 0.68077
published_at 2026-04-13T12:55:00Z
5
value 0.00554
scoring_system epss
scoring_elements 0.68114
published_at 2026-04-16T12:55:00Z
6
value 0.00554
scoring_system epss
scoring_elements 0.68014
published_at 2026-04-01T12:55:00Z
7
value 0.00554
scoring_system epss
scoring_elements 0.68035
published_at 2026-04-02T12:55:00Z
8
value 0.00554
scoring_system epss
scoring_elements 0.68055
published_at 2026-04-04T12:55:00Z
9
value 0.00554
scoring_system epss
scoring_elements 0.68033
published_at 2026-04-07T12:55:00Z
10
value 0.00554
scoring_system epss
scoring_elements 0.68085
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9820
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712629
reference_id 1712629
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712629
17
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
18
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
22
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
23
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
24
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
25
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
26
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
27
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
28
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
29
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-9820
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-92qb-fqpr-27hm
5
url VCID-fx8t-41tv-hkdu
vulnerability_id VCID-fx8t-41tv-hkdu
summary
Use After Free
png_image_free in png.c in libpng has a use-after-free because png_image_free_function is called under png_safe_execute.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
5
reference_url http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7317.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7317.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-7317
reference_id
reference_type
scores
0
value 0.00565
scoring_system epss
scoring_elements 0.68477
published_at 2026-04-18T12:55:00Z
1
value 0.00565
scoring_system epss
scoring_elements 0.68464
published_at 2026-04-16T12:55:00Z
2
value 0.00565
scoring_system epss
scoring_elements 0.6836
published_at 2026-04-01T12:55:00Z
3
value 0.00565
scoring_system epss
scoring_elements 0.68426
published_at 2026-04-13T12:55:00Z
4
value 0.00565
scoring_system epss
scoring_elements 0.68458
published_at 2026-04-12T12:55:00Z
5
value 0.00565
scoring_system epss
scoring_elements 0.6847
published_at 2026-04-11T12:55:00Z
6
value 0.00565
scoring_system epss
scoring_elements 0.68444
published_at 2026-04-09T12:55:00Z
7
value 0.00565
scoring_system epss
scoring_elements 0.68427
published_at 2026-04-08T12:55:00Z
8
value 0.00565
scoring_system epss
scoring_elements 0.68376
published_at 2026-04-07T12:55:00Z
9
value 0.00565
scoring_system epss
scoring_elements 0.684
published_at 2026-04-04T12:55:00Z
10
value 0.00565
scoring_system epss
scoring_elements 0.68381
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-7317
8
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://github.com/glennrp/libpng/issues/275
reference_id
reference_type
scores
url https://github.com/glennrp/libpng/issues/275
24
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html
25
reference_url https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html
26
reference_url https://seclists.org/bugtraq/2019/Apr/30
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Apr/30
27
reference_url https://seclists.org/bugtraq/2019/Apr/36
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Apr/36
28
reference_url https://seclists.org/bugtraq/2019/May/56
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/May/56
29
reference_url https://seclists.org/bugtraq/2019/May/59
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/May/59
30
reference_url https://seclists.org/bugtraq/2019/May/67
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/May/67
31
reference_url https://security.gentoo.org/glsa/201908-02
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/201908-02
32
reference_url https://security.netapp.com/advisory/ntap-20190719-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190719-0005/
33
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
34
reference_url https://www.debian.org/security/2019/dsa-4435
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4435
35
reference_url https://www.debian.org/security/2019/dsa-4448
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4448
36
reference_url https://www.debian.org/security/2019/dsa-4451
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4451
37
reference_url https://www.oracle.com/security-alerts/cpuApr2021.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuApr2021.html
38
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuoct2021.html
39
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
40
reference_url http://www.securityfocus.com/bid/108098
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/108098
41
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1672409
reference_id 1672409
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1672409
42
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921355
reference_id 921355
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921355
43
reference_url https://security.archlinux.org/ASA-201904-10
reference_id ASA-201904-10
reference_type
scores
url https://security.archlinux.org/ASA-201904-10
44
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
45
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
46
reference_url https://security.archlinux.org/AVG-868
reference_id AVG-868
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-868
47
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
48
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hpe:xp7_command_view_advanced_edition_suite:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:hpe:xp7_command_view_advanced_edition_suite:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hpe:xp7_command_view_advanced_edition_suite:*:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_id cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:windows:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vcenter:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vcenter:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vcenter:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:*:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_unified_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:*:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:*:*:*:*:*:web_services_proxy:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_web_services:*:*:*:*:*:web_services_proxy:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:*:*:*:*:*:web_services_proxy:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:oracle:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:sap:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:package_hub:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:opensuse:package_hub:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opensuse:package_hub:-:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.6.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:7u221:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:7u221:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:7u221:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u212:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:java_se:8u212:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u212:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:11.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:12.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:12.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:12.0.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-7317
reference_id CVE-2019-7317
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-7317
107
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
108
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
109
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
110
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
111
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
112
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
113
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
114
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
115
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
116
reference_url https://access.redhat.com/errata/RHSA-2019:2494
reference_id RHSA-2019:2494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2494
117
reference_url https://access.redhat.com/errata/RHSA-2019:2495
reference_id RHSA-2019:2495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2495
118
reference_url https://access.redhat.com/errata/RHSA-2019:2585
reference_id RHSA-2019:2585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2585
119
reference_url https://access.redhat.com/errata/RHSA-2019:2590
reference_id RHSA-2019:2590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2590
120
reference_url https://access.redhat.com/errata/RHSA-2019:2592
reference_id RHSA-2019:2592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2592
121
reference_url https://access.redhat.com/errata/RHSA-2019:2737
reference_id RHSA-2019:2737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2737
122
reference_url https://usn.ubuntu.com/3962-1/
reference_id USN-3962-1
reference_type
scores
url https://usn.ubuntu.com/3962-1/
123
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
124
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
125
reference_url https://usn.ubuntu.com/4080-1/
reference_id USN-4080-1
reference_type
scores
url https://usn.ubuntu.com/4080-1/
126
reference_url https://usn.ubuntu.com/4083-1/
reference_id USN-4083-1
reference_type
scores
url https://usn.ubuntu.com/4083-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-7317
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fx8t-41tv-hkdu
6
url VCID-g3nf-qnz2-h7gg
vulnerability_id VCID-g3nf-qnz2-h7gg
summary Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9817.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9817.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9817
reference_id
reference_type
scores
0
value 0.00191
scoring_system epss
scoring_elements 0.41035
published_at 2026-04-18T12:55:00Z
1
value 0.00191
scoring_system epss
scoring_elements 0.41049
published_at 2026-04-08T12:55:00Z
2
value 0.00191
scoring_system epss
scoring_elements 0.41056
published_at 2026-04-09T12:55:00Z
3
value 0.00191
scoring_system epss
scoring_elements 0.41074
published_at 2026-04-11T12:55:00Z
4
value 0.00191
scoring_system epss
scoring_elements 0.41038
published_at 2026-04-12T12:55:00Z
5
value 0.00191
scoring_system epss
scoring_elements 0.41022
published_at 2026-04-13T12:55:00Z
6
value 0.00191
scoring_system epss
scoring_elements 0.41065
published_at 2026-04-16T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.4096
published_at 2026-04-01T12:55:00Z
8
value 0.00191
scoring_system epss
scoring_elements 0.41041
published_at 2026-04-02T12:55:00Z
9
value 0.00191
scoring_system epss
scoring_elements 0.41073
published_at 2026-04-04T12:55:00Z
10
value 0.00191
scoring_system epss
scoring_elements 0.40999
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9817
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712626
reference_id 1712626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712626
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
24
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
25
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
26
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
27
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
28
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
29
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
30
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
31
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-9817
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g3nf-qnz2-h7gg
7
url VCID-k321-r7qq-gbb9
vulnerability_id VCID-k321-r7qq-gbb9
summary A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11691.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11691
reference_id
reference_type
scores
0
value 0.00516
scoring_system epss
scoring_elements 0.66694
published_at 2026-04-18T12:55:00Z
1
value 0.00516
scoring_system epss
scoring_elements 0.66657
published_at 2026-04-08T12:55:00Z
2
value 0.00516
scoring_system epss
scoring_elements 0.66671
published_at 2026-04-09T12:55:00Z
3
value 0.00516
scoring_system epss
scoring_elements 0.6669
published_at 2026-04-11T12:55:00Z
4
value 0.00516
scoring_system epss
scoring_elements 0.66678
published_at 2026-04-12T12:55:00Z
5
value 0.00516
scoring_system epss
scoring_elements 0.66645
published_at 2026-04-13T12:55:00Z
6
value 0.00516
scoring_system epss
scoring_elements 0.6668
published_at 2026-04-16T12:55:00Z
7
value 0.00516
scoring_system epss
scoring_elements 0.66572
published_at 2026-04-01T12:55:00Z
8
value 0.00516
scoring_system epss
scoring_elements 0.66611
published_at 2026-04-02T12:55:00Z
9
value 0.00516
scoring_system epss
scoring_elements 0.66638
published_at 2026-04-04T12:55:00Z
10
value 0.00516
scoring_system epss
scoring_elements 0.66609
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712617
reference_id 1712617
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712617
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
24
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
25
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
26
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
27
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
28
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
29
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
30
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
31
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-11691
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k321-r7qq-gbb9
8
url VCID-k8nw-bn74-6qe5
vulnerability_id VCID-k8nw-bn74-6qe5
summary
Multiple vulnerabilities have been found in Chromium, the worst of
    which could result in the remote execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5798.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5798
reference_id
reference_type
scores
0
value 0.01255
scoring_system epss
scoring_elements 0.79398
published_at 2026-04-18T12:55:00Z
1
value 0.01255
scoring_system epss
scoring_elements 0.79395
published_at 2026-04-11T12:55:00Z
2
value 0.01255
scoring_system epss
scoring_elements 0.79379
published_at 2026-04-12T12:55:00Z
3
value 0.01255
scoring_system epss
scoring_elements 0.79368
published_at 2026-04-13T12:55:00Z
4
value 0.01255
scoring_system epss
scoring_elements 0.794
published_at 2026-04-16T12:55:00Z
5
value 0.01255
scoring_system epss
scoring_elements 0.7932
published_at 2026-04-01T12:55:00Z
6
value 0.01255
scoring_system epss
scoring_elements 0.79327
published_at 2026-04-02T12:55:00Z
7
value 0.01255
scoring_system epss
scoring_elements 0.7935
published_at 2026-04-04T12:55:00Z
8
value 0.01255
scoring_system epss
scoring_elements 0.79336
published_at 2026-04-07T12:55:00Z
9
value 0.01255
scoring_system epss
scoring_elements 0.79362
published_at 2026-04-08T12:55:00Z
10
value 0.01255
scoring_system epss
scoring_elements 0.79371
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5798
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5787
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5788
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5789
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5790
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5791
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5792
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5793
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5794
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5795
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5796
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5797
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5799
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5800
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5802
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5803
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5844
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5845
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5846
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1688200
reference_id 1688200
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1688200
34
reference_url https://security.archlinux.org/ASA-201903-8
reference_id ASA-201903-8
reference_type
scores
url https://security.archlinux.org/ASA-201903-8
35
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
36
reference_url https://security.archlinux.org/AVG-923
reference_id AVG-923
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-923
37
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
38
reference_url https://security.gentoo.org/glsa/201903-23
reference_id GLSA-201903-23
reference_type
scores
url https://security.gentoo.org/glsa/201903-23
39
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
40
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
41
reference_url https://access.redhat.com/errata/RHSA-2019:0708
reference_id RHSA-2019:0708
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0708
42
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
43
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
44
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
45
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
46
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
47
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
48
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-5798
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8nw-bn74-6qe5
9
url VCID-sknm-65ff-4uck
vulnerability_id VCID-sknm-65ff-4uck
summary Cross-origin images can be read from a canvas element in violation of the same-origin policy using the transferFromImageBitmap method.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18511.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18511
reference_id
reference_type
scores
0
value 0.00802
scoring_system epss
scoring_elements 0.7414
published_at 2026-04-18T12:55:00Z
1
value 0.00802
scoring_system epss
scoring_elements 0.74096
published_at 2026-04-09T12:55:00Z
2
value 0.00802
scoring_system epss
scoring_elements 0.74117
published_at 2026-04-11T12:55:00Z
3
value 0.00802
scoring_system epss
scoring_elements 0.74099
published_at 2026-04-12T12:55:00Z
4
value 0.00802
scoring_system epss
scoring_elements 0.74092
published_at 2026-04-13T12:55:00Z
5
value 0.00802
scoring_system epss
scoring_elements 0.74131
published_at 2026-04-16T12:55:00Z
6
value 0.00802
scoring_system epss
scoring_elements 0.74044
published_at 2026-04-01T12:55:00Z
7
value 0.00802
scoring_system epss
scoring_elements 0.7405
published_at 2026-04-02T12:55:00Z
8
value 0.00802
scoring_system epss
scoring_elements 0.74076
published_at 2026-04-04T12:55:00Z
9
value 0.00802
scoring_system epss
scoring_elements 0.74048
published_at 2026-04-07T12:55:00Z
10
value 0.00802
scoring_system epss
scoring_elements 0.74081
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18511
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1676997
reference_id 1676997
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1676997
17
reference_url https://security.archlinux.org/ASA-201902-16
reference_id ASA-201902-16
reference_type
scores
url https://security.archlinux.org/ASA-201902-16
18
reference_url https://security.archlinux.org/AVG-896
reference_id AVG-896
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-896
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-04
reference_id mfsa2019-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-04
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
22
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
23
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
24
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
25
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
26
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
27
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
28
reference_url https://usn.ubuntu.com/3896-1/
reference_id USN-3896-1
reference_type
scores
url https://usn.ubuntu.com/3896-1/
29
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2018-18511
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sknm-65ff-4uck
10
url VCID-sq1u-5jfc-dyh1
vulnerability_id VCID-sq1u-5jfc-dyh1
summary A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supported releases.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9816.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9816
reference_id
reference_type
scores
0
value 0.38245
scoring_system epss
scoring_elements 0.97237
published_at 2026-04-18T12:55:00Z
1
value 0.38245
scoring_system epss
scoring_elements 0.97221
published_at 2026-04-08T12:55:00Z
2
value 0.38245
scoring_system epss
scoring_elements 0.97222
published_at 2026-04-09T12:55:00Z
3
value 0.38245
scoring_system epss
scoring_elements 0.97225
published_at 2026-04-11T12:55:00Z
4
value 0.38245
scoring_system epss
scoring_elements 0.97226
published_at 2026-04-12T12:55:00Z
5
value 0.38245
scoring_system epss
scoring_elements 0.97227
published_at 2026-04-13T12:55:00Z
6
value 0.38245
scoring_system epss
scoring_elements 0.97235
published_at 2026-04-16T12:55:00Z
7
value 0.38245
scoring_system epss
scoring_elements 0.97199
published_at 2026-04-01T12:55:00Z
8
value 0.38245
scoring_system epss
scoring_elements 0.97205
published_at 2026-04-02T12:55:00Z
9
value 0.38245
scoring_system epss
scoring_elements 0.9721
published_at 2026-04-04T12:55:00Z
10
value 0.38245
scoring_system epss
scoring_elements 0.97211
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9816
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712625
reference_id 1712625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712625
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1808
reference_id CVE-2019-9816
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1808
22
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46940.txt
reference_id CVE-2019-9816
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46940.txt
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
26
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
27
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
28
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
29
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
30
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-9816
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sq1u-5jfc-dyh1
11
url VCID-tff1-6wkz-jyar
vulnerability_id VCID-tff1-6wkz-jyar
summary Cross-origin images can be read in violation of the same-origin policy by exporting an image after using createImageBitmap to read the image and then rendering the resulting bitmap image within a canvas element.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9797.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9797.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9797
reference_id
reference_type
scores
0
value 0.00481
scoring_system epss
scoring_elements 0.65155
published_at 2026-04-18T12:55:00Z
1
value 0.00481
scoring_system epss
scoring_elements 0.65127
published_at 2026-04-09T12:55:00Z
2
value 0.00481
scoring_system epss
scoring_elements 0.65146
published_at 2026-04-11T12:55:00Z
3
value 0.00481
scoring_system epss
scoring_elements 0.65136
published_at 2026-04-12T12:55:00Z
4
value 0.00481
scoring_system epss
scoring_elements 0.65109
published_at 2026-04-13T12:55:00Z
5
value 0.00481
scoring_system epss
scoring_elements 0.65145
published_at 2026-04-16T12:55:00Z
6
value 0.00481
scoring_system epss
scoring_elements 0.65024
published_at 2026-04-01T12:55:00Z
7
value 0.00481
scoring_system epss
scoring_elements 0.65075
published_at 2026-04-02T12:55:00Z
8
value 0.00481
scoring_system epss
scoring_elements 0.65101
published_at 2026-04-04T12:55:00Z
9
value 0.00481
scoring_system epss
scoring_elements 0.65065
published_at 2026-04-07T12:55:00Z
10
value 0.00481
scoring_system epss
scoring_elements 0.65114
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9797
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712622
reference_id 1712622
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712622
17
reference_url https://security.archlinux.org/ASA-201903-11
reference_id ASA-201903-11
reference_type
scores
url https://security.archlinux.org/ASA-201903-11
18
reference_url https://security.archlinux.org/AVG-925
reference_id AVG-925
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-925
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
reference_id mfsa2019-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-07
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
22
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
23
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
24
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
25
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
26
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
27
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
28
reference_url https://usn.ubuntu.com/3918-1/
reference_id USN-3918-1
reference_type
scores
url https://usn.ubuntu.com/3918-1/
29
reference_url https://usn.ubuntu.com/3918-2/
reference_id USN-3918-2
reference_type
scores
url https://usn.ubuntu.com/3918-2/
30
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-9797
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tff1-6wkz-jyar
12
url VCID-tfry-ch3y-fyb1
vulnerability_id VCID-tfry-ch3y-fyb1
summary Mozilla developers and community members Olli Pettay, Bogdan Tara, Jan de Mooij, Jason Kratzer, Jan Varga, Gary Kwong, Tim Guan-tin Chien, Tyson Smith, Ronald Crane, and Ted Campbell reported memory safety bugs present in Firefox 66 and Firefox ESR 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9800.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9800
reference_id
reference_type
scores
0
value 0.00554
scoring_system epss
scoring_elements 0.68126
published_at 2026-04-18T12:55:00Z
1
value 0.00554
scoring_system epss
scoring_elements 0.68085
published_at 2026-04-08T12:55:00Z
2
value 0.00554
scoring_system epss
scoring_elements 0.68099
published_at 2026-04-09T12:55:00Z
3
value 0.00554
scoring_system epss
scoring_elements 0.68124
published_at 2026-04-11T12:55:00Z
4
value 0.00554
scoring_system epss
scoring_elements 0.68111
published_at 2026-04-12T12:55:00Z
5
value 0.00554
scoring_system epss
scoring_elements 0.68077
published_at 2026-04-13T12:55:00Z
6
value 0.00554
scoring_system epss
scoring_elements 0.68114
published_at 2026-04-16T12:55:00Z
7
value 0.00554
scoring_system epss
scoring_elements 0.68014
published_at 2026-04-01T12:55:00Z
8
value 0.00554
scoring_system epss
scoring_elements 0.68035
published_at 2026-04-02T12:55:00Z
9
value 0.00554
scoring_system epss
scoring_elements 0.68055
published_at 2026-04-04T12:55:00Z
10
value 0.00554
scoring_system epss
scoring_elements 0.68033
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712623
reference_id 1712623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712623
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
24
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
25
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
26
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
27
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
28
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
29
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
30
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
31
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-9800
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tfry-ch3y-fyb1
13
url VCID-ugjs-4tca-d3dk
vulnerability_id VCID-ugjs-4tca-d3dk
summary The bufferdata function in WebGL is vulnerable to a buffer overflow with specific graphics drivers on Linux. This could result in malicious content freezing a tab or triggering a potentially exploitable crash. *Note: this issue only occurs on Linux. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11693.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11693.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11693
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69451
published_at 2026-04-18T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69392
published_at 2026-04-08T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69408
published_at 2026-04-09T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.6943
published_at 2026-04-11T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69415
published_at 2026-04-12T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69401
published_at 2026-04-13T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.6944
published_at 2026-04-16T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69333
published_at 2026-04-01T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69345
published_at 2026-04-02T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69362
published_at 2026-04-04T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69342
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11693
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712619
reference_id 1712619
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712619
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
24
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
25
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
26
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
27
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
28
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
29
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
30
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
31
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-11693
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ugjs-4tca-d3dk
14
url VCID-vvpm-3zhz-77dm
vulnerability_id VCID-vvpm-3zhz-77dm
summary A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11692.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11692.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11692
reference_id
reference_type
scores
0
value 0.00516
scoring_system epss
scoring_elements 0.66694
published_at 2026-04-18T12:55:00Z
1
value 0.00516
scoring_system epss
scoring_elements 0.66657
published_at 2026-04-08T12:55:00Z
2
value 0.00516
scoring_system epss
scoring_elements 0.66671
published_at 2026-04-09T12:55:00Z
3
value 0.00516
scoring_system epss
scoring_elements 0.6669
published_at 2026-04-11T12:55:00Z
4
value 0.00516
scoring_system epss
scoring_elements 0.66678
published_at 2026-04-12T12:55:00Z
5
value 0.00516
scoring_system epss
scoring_elements 0.66645
published_at 2026-04-13T12:55:00Z
6
value 0.00516
scoring_system epss
scoring_elements 0.6668
published_at 2026-04-16T12:55:00Z
7
value 0.00516
scoring_system epss
scoring_elements 0.66572
published_at 2026-04-01T12:55:00Z
8
value 0.00516
scoring_system epss
scoring_elements 0.66611
published_at 2026-04-02T12:55:00Z
9
value 0.00516
scoring_system epss
scoring_elements 0.66638
published_at 2026-04-04T12:55:00Z
10
value 0.00516
scoring_system epss
scoring_elements 0.66609
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11692
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712618
reference_id 1712618
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712618
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
24
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
25
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
26
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
27
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
28
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
29
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
30
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
31
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-11692
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vvpm-3zhz-77dm
15
url VCID-w5hu-w7mu-b3g3
vulnerability_id VCID-w5hu-w7mu-b3g3
summary If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data. This allows for the theft of browser history by a malicious site.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11698.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11698
reference_id
reference_type
scores
0
value 0.00379
scoring_system epss
scoring_elements 0.59477
published_at 2026-04-18T12:55:00Z
1
value 0.00379
scoring_system epss
scoring_elements 0.5944
published_at 2026-04-08T12:55:00Z
2
value 0.00379
scoring_system epss
scoring_elements 0.59453
published_at 2026-04-09T12:55:00Z
3
value 0.00379
scoring_system epss
scoring_elements 0.59472
published_at 2026-04-11T12:55:00Z
4
value 0.00379
scoring_system epss
scoring_elements 0.59456
published_at 2026-04-12T12:55:00Z
5
value 0.00379
scoring_system epss
scoring_elements 0.59437
published_at 2026-04-13T12:55:00Z
6
value 0.00379
scoring_system epss
scoring_elements 0.5947
published_at 2026-04-16T12:55:00Z
7
value 0.00379
scoring_system epss
scoring_elements 0.59326
published_at 2026-04-01T12:55:00Z
8
value 0.00379
scoring_system epss
scoring_elements 0.59399
published_at 2026-04-02T12:55:00Z
9
value 0.00379
scoring_system epss
scoring_elements 0.59423
published_at 2026-04-04T12:55:00Z
10
value 0.00379
scoring_system epss
scoring_elements 0.59389
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11698
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1712621
reference_id 1712621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1712621
17
reference_url https://security.archlinux.org/ASA-201905-8
reference_id ASA-201905-8
reference_type
scores
url https://security.archlinux.org/ASA-201905-8
18
reference_url https://security.archlinux.org/ASA-201905-9
reference_id ASA-201905-9
reference_type
scores
url https://security.archlinux.org/ASA-201905-9
19
reference_url https://security.archlinux.org/AVG-965
reference_id AVG-965
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-965
20
reference_url https://security.archlinux.org/AVG-966
reference_id AVG-966
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-966
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
reference_id mfsa2019-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
reference_id mfsa2019-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
reference_id mfsa2019-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
24
reference_url https://access.redhat.com/errata/RHSA-2019:1265
reference_id RHSA-2019:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1265
25
reference_url https://access.redhat.com/errata/RHSA-2019:1267
reference_id RHSA-2019:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1267
26
reference_url https://access.redhat.com/errata/RHSA-2019:1269
reference_id RHSA-2019:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1269
27
reference_url https://access.redhat.com/errata/RHSA-2019:1308
reference_id RHSA-2019:1308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1308
28
reference_url https://access.redhat.com/errata/RHSA-2019:1309
reference_id RHSA-2019:1309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1309
29
reference_url https://access.redhat.com/errata/RHSA-2019:1310
reference_id RHSA-2019:1310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1310
30
reference_url https://usn.ubuntu.com/3991-1/
reference_id USN-3991-1
reference_type
scores
url https://usn.ubuntu.com/3991-1/
31
reference_url https://usn.ubuntu.com/3997-1/
reference_id USN-3997-1
reference_type
scores
url https://usn.ubuntu.com/3997-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/firefox-esr@60.7.0-r0?arch=x86&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community
aliases CVE-2019-11698
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w5hu-w7mu-b3g3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@60.7.0-r0%3Farch=x86&distroversion=v3.17&reponame=community