Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-w8d1-se9j-e7ew
Summary
Grafana Arbitrary File Read
Grafana <= 6.4.3 has an Arbitrary File Read vulnerability, which could be exploited by an authenticated attacker that has privileges to modify the data source configurations.
Aliases
0
alias CVE-2019-19499
1
alias GHSA-4pwp-cx67-5cpx
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/grafana@6.7.4-3?arch=el8
purl pkg:rpm/redhat/grafana@6.7.4-3?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-amqf-ytjf-fydp
1
vulnerability VCID-drfs-tub9-zqgg
2
vulnerability VCID-ed2w-eexq-kuam
3
vulnerability VCID-fph7-rrjp-uqa1
4
vulnerability VCID-snvt-p8kr-2ucq
5
vulnerability VCID-txvc-2hvr-nkaj
6
vulnerability VCID-w8d1-se9j-e7ew
7
vulnerability VCID-y46u-m8e4-9qcn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grafana@6.7.4-3%3Farch=el8
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19499.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19499.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19499
reference_id
reference_type
scores
0
value 0.4386
scoring_system epss
scoring_elements 0.97542
published_at 2026-04-21T12:55:00Z
1
value 0.4386
scoring_system epss
scoring_elements 0.97541
published_at 2026-04-18T12:55:00Z
2
value 0.4386
scoring_system epss
scoring_elements 0.97525
published_at 2026-04-09T12:55:00Z
3
value 0.4386
scoring_system epss
scoring_elements 0.97539
published_at 2026-04-16T12:55:00Z
4
value 0.4386
scoring_system epss
scoring_elements 0.97531
published_at 2026-04-13T12:55:00Z
5
value 0.4386
scoring_system epss
scoring_elements 0.97528
published_at 2026-04-11T12:55:00Z
6
value 0.4386
scoring_system epss
scoring_elements 0.97507
published_at 2026-04-01T12:55:00Z
7
value 0.4386
scoring_system epss
scoring_elements 0.97514
published_at 2026-04-02T12:55:00Z
8
value 0.4386
scoring_system epss
scoring_elements 0.97517
published_at 2026-04-04T12:55:00Z
9
value 0.4386
scoring_system epss
scoring_elements 0.97518
published_at 2026-04-07T12:55:00Z
10
value 0.4386
scoring_system epss
scoring_elements 0.97524
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19499
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/grafana/grafana
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/grafana/grafana
4
reference_url https://github.com/grafana/grafana/blob/master/CHANGELOG.md#644-2019-11-06
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/grafana/grafana/blob/master/CHANGELOG.md#644-2019-11-06
5
reference_url https://github.com/grafana/grafana/commit/19dbd27c5caa1a160bd5854b65a4e1fe2a8a4f00
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/grafana/grafana/commit/19dbd27c5caa1a160bd5854b65a4e1fe2a8a4f00
6
reference_url https://github.com/grafana/grafana/pull/20192
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/grafana/grafana/pull/20192
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19499
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-19499
8
reference_url https://security.netapp.com/advisory/ntap-20200918-0003
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20200918-0003
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1873615
reference_id 1873615
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1873615
10
reference_url https://access.redhat.com/errata/RHSA-2020:4682
reference_id RHSA-2020:4682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4682
Weaknesses
0
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
1
cwe_id 22
name Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
description The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
2
cwe_id 89
name Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
description The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
3
cwe_id 88
name Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
description The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-w8d1-se9j-e7ew