Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-vrsm-6j4m-cka4
Summary
Multiple vulnerabilities have been found in systemd, the worst of
    which may allow execution of arbitrary code.
Aliases
0
alias CVE-2019-6454
Fixed_packages
0
url pkg:alpm/archlinux/systemd@241.7-1
purl pkg:alpm/archlinux/systemd@241.7-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/systemd@241.7-1
1
url pkg:deb/debian/systemd@232-25%2Bdeb9u12
purl pkg:deb/debian/systemd@232-25%2Bdeb9u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mej-gstk-pfbs
1
vulnerability VCID-2nq3-t67f-57ha
2
vulnerability VCID-4dq5-84vh-u3bz
3
vulnerability VCID-4eyp-2xve-qugd
4
vulnerability VCID-4n47-ffax-sbdu
5
vulnerability VCID-552s-n3yf-fkgq
6
vulnerability VCID-5j51-kyj4-gkag
7
vulnerability VCID-66sa-bc5p-jqde
8
vulnerability VCID-71xj-3x1z-6kh4
9
vulnerability VCID-7mtw-85gb-vyfz
10
vulnerability VCID-7p2k-q6vr-3kf5
11
vulnerability VCID-7war-ne2h-wkej
12
vulnerability VCID-86qy-wkqz-5qam
13
vulnerability VCID-8sva-z329-ekcr
14
vulnerability VCID-8x92-ah94-47f7
15
vulnerability VCID-94hk-2ehw-bqds
16
vulnerability VCID-cmbj-869t-c3e3
17
vulnerability VCID-dvhg-mcz2-r3f5
18
vulnerability VCID-e7km-pysq-hqe2
19
vulnerability VCID-e9ng-ewvh-kqeq
20
vulnerability VCID-fdkt-299k-vufa
21
vulnerability VCID-fp54-ff23-vbb5
22
vulnerability VCID-hwg6-vaus-cfa2
23
vulnerability VCID-mgcn-uevn-13c3
24
vulnerability VCID-nuf5-cg89-8bb7
25
vulnerability VCID-q4kr-rg2c-f7ad
26
vulnerability VCID-sdnj-avfk-7bch
27
vulnerability VCID-sn1e-9p1f-1fen
28
vulnerability VCID-sn9x-3yp1-2ke4
29
vulnerability VCID-t3bf-3486-wqh1
30
vulnerability VCID-tv9q-bzvp-sqb5
31
vulnerability VCID-vprj-j7u6-zbe7
32
vulnerability VCID-vrsm-6j4m-cka4
33
vulnerability VCID-w7ys-gs9d-m3f5
34
vulnerability VCID-yk9j-tm66-eyev
35
vulnerability VCID-z5kr-1k65-hyh3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@232-25%252Bdeb9u12
2
url pkg:deb/debian/systemd@240-6?distro=trixie
purl pkg:deb/debian/systemd@240-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@240-6%3Fdistro=trixie
3
url pkg:deb/debian/systemd@241-7~deb10u8
purl pkg:deb/debian/systemd@241-7~deb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2nq3-t67f-57ha
1
vulnerability VCID-4eyp-2xve-qugd
2
vulnerability VCID-4n47-ffax-sbdu
3
vulnerability VCID-552s-n3yf-fkgq
4
vulnerability VCID-66sa-bc5p-jqde
5
vulnerability VCID-71xj-3x1z-6kh4
6
vulnerability VCID-7mtw-85gb-vyfz
7
vulnerability VCID-86qy-wkqz-5qam
8
vulnerability VCID-8sva-z329-ekcr
9
vulnerability VCID-94hk-2ehw-bqds
10
vulnerability VCID-dvhg-mcz2-r3f5
11
vulnerability VCID-e9ng-ewvh-kqeq
12
vulnerability VCID-fp54-ff23-vbb5
13
vulnerability VCID-hwg6-vaus-cfa2
14
vulnerability VCID-sdnj-avfk-7bch
15
vulnerability VCID-sn1e-9p1f-1fen
16
vulnerability VCID-tv9q-bzvp-sqb5
17
vulnerability VCID-vprj-j7u6-zbe7
18
vulnerability VCID-w7ys-gs9d-m3f5
19
vulnerability VCID-yk9j-tm66-eyev
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@241-7~deb10u8
4
url pkg:deb/debian/systemd@247.3-7%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/systemd@247.3-7%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4eyp-2xve-qugd
1
vulnerability VCID-4n47-ffax-sbdu
2
vulnerability VCID-cgv9-wdwy-5qfu
3
vulnerability VCID-fp54-ff23-vbb5
4
vulnerability VCID-hwg6-vaus-cfa2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@247.3-7%252Bdeb11u5%3Fdistro=trixie
5
url pkg:deb/debian/systemd@252.39-1~deb12u1?distro=trixie
purl pkg:deb/debian/systemd@252.39-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4eyp-2xve-qugd
1
vulnerability VCID-4n47-ffax-sbdu
2
vulnerability VCID-fp54-ff23-vbb5
3
vulnerability VCID-hwg6-vaus-cfa2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@252.39-1~deb12u1%3Fdistro=trixie
6
url pkg:deb/debian/systemd@257.9-1~deb13u1?distro=trixie
purl pkg:deb/debian/systemd@257.9-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4eyp-2xve-qugd
1
vulnerability VCID-4n47-ffax-sbdu
2
vulnerability VCID-fp54-ff23-vbb5
3
vulnerability VCID-hwg6-vaus-cfa2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@257.9-1~deb13u1%3Fdistro=trixie
7
url pkg:deb/debian/systemd@260.1-1?distro=trixie
purl pkg:deb/debian/systemd@260.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@260.1-1%3Fdistro=trixie
8
url pkg:ebuild/sys-apps/systemd@239-r4
purl pkg:ebuild/sys-apps/systemd@239-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-apps/systemd@239-r4
Affected_packages
0
url pkg:alpm/archlinux/systemd@240.95-2
purl pkg:alpm/archlinux/systemd@240.95-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vrsm-6j4m-cka4
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/systemd@240.95-2
1
url pkg:deb/debian/systemd@44-11%2Bdeb7u4
purl pkg:deb/debian/systemd@44-11%2Bdeb7u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-13xf-fn51-3qhe
1
vulnerability VCID-1mej-gstk-pfbs
2
vulnerability VCID-2nq3-t67f-57ha
3
vulnerability VCID-3st2-3d7c-yuft
4
vulnerability VCID-4dq5-84vh-u3bz
5
vulnerability VCID-4eyp-2xve-qugd
6
vulnerability VCID-4n47-ffax-sbdu
7
vulnerability VCID-552s-n3yf-fkgq
8
vulnerability VCID-5fyk-ea9c-6fd1
9
vulnerability VCID-5j51-kyj4-gkag
10
vulnerability VCID-66sa-bc5p-jqde
11
vulnerability VCID-71xj-3x1z-6kh4
12
vulnerability VCID-7mtw-85gb-vyfz
13
vulnerability VCID-7p2k-q6vr-3kf5
14
vulnerability VCID-7war-ne2h-wkej
15
vulnerability VCID-86qy-wkqz-5qam
16
vulnerability VCID-8sva-z329-ekcr
17
vulnerability VCID-8x92-ah94-47f7
18
vulnerability VCID-94hk-2ehw-bqds
19
vulnerability VCID-bvrs-m3qy-dyb1
20
vulnerability VCID-cmbj-869t-c3e3
21
vulnerability VCID-dn4b-qf6b-j7aj
22
vulnerability VCID-dvhg-mcz2-r3f5
23
vulnerability VCID-e7km-pysq-hqe2
24
vulnerability VCID-e9ng-ewvh-kqeq
25
vulnerability VCID-egf8-guux-pybe
26
vulnerability VCID-fdkt-299k-vufa
27
vulnerability VCID-fp54-ff23-vbb5
28
vulnerability VCID-gkrw-z2cb-aud5
29
vulnerability VCID-gp1n-ygnu-aydy
30
vulnerability VCID-hwg6-vaus-cfa2
31
vulnerability VCID-jxun-f52c-gfg9
32
vulnerability VCID-mgcn-uevn-13c3
33
vulnerability VCID-nuf5-cg89-8bb7
34
vulnerability VCID-q4kr-rg2c-f7ad
35
vulnerability VCID-qu2y-j7d2-auej
36
vulnerability VCID-sdnj-avfk-7bch
37
vulnerability VCID-sn1e-9p1f-1fen
38
vulnerability VCID-sn9x-3yp1-2ke4
39
vulnerability VCID-t3bf-3486-wqh1
40
vulnerability VCID-tv9q-bzvp-sqb5
41
vulnerability VCID-ucz9-1m21-zbhc
42
vulnerability VCID-vprj-j7u6-zbe7
43
vulnerability VCID-vrsm-6j4m-cka4
44
vulnerability VCID-w7ys-gs9d-m3f5
45
vulnerability VCID-y58f-kwx7-m3ec
46
vulnerability VCID-yk9j-tm66-eyev
47
vulnerability VCID-z5kr-1k65-hyh3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@44-11%252Bdeb7u4
2
url pkg:deb/debian/systemd@204-14~bpo70%2B1
purl pkg:deb/debian/systemd@204-14~bpo70%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mej-gstk-pfbs
1
vulnerability VCID-2nq3-t67f-57ha
2
vulnerability VCID-3st2-3d7c-yuft
3
vulnerability VCID-4dq5-84vh-u3bz
4
vulnerability VCID-4eyp-2xve-qugd
5
vulnerability VCID-4n47-ffax-sbdu
6
vulnerability VCID-552s-n3yf-fkgq
7
vulnerability VCID-5j51-kyj4-gkag
8
vulnerability VCID-66sa-bc5p-jqde
9
vulnerability VCID-71xj-3x1z-6kh4
10
vulnerability VCID-7mtw-85gb-vyfz
11
vulnerability VCID-7p2k-q6vr-3kf5
12
vulnerability VCID-7war-ne2h-wkej
13
vulnerability VCID-86qy-wkqz-5qam
14
vulnerability VCID-8sva-z329-ekcr
15
vulnerability VCID-8x92-ah94-47f7
16
vulnerability VCID-94hk-2ehw-bqds
17
vulnerability VCID-cmbj-869t-c3e3
18
vulnerability VCID-dvhg-mcz2-r3f5
19
vulnerability VCID-e7km-pysq-hqe2
20
vulnerability VCID-e9ng-ewvh-kqeq
21
vulnerability VCID-egf8-guux-pybe
22
vulnerability VCID-fdkt-299k-vufa
23
vulnerability VCID-fp54-ff23-vbb5
24
vulnerability VCID-gkrw-z2cb-aud5
25
vulnerability VCID-gp1n-ygnu-aydy
26
vulnerability VCID-hwg6-vaus-cfa2
27
vulnerability VCID-jxun-f52c-gfg9
28
vulnerability VCID-mgcn-uevn-13c3
29
vulnerability VCID-nuf5-cg89-8bb7
30
vulnerability VCID-q4kr-rg2c-f7ad
31
vulnerability VCID-qu2y-j7d2-auej
32
vulnerability VCID-sdnj-avfk-7bch
33
vulnerability VCID-sn1e-9p1f-1fen
34
vulnerability VCID-sn9x-3yp1-2ke4
35
vulnerability VCID-t3bf-3486-wqh1
36
vulnerability VCID-tv9q-bzvp-sqb5
37
vulnerability VCID-ucz9-1m21-zbhc
38
vulnerability VCID-vprj-j7u6-zbe7
39
vulnerability VCID-vrsm-6j4m-cka4
40
vulnerability VCID-w7ys-gs9d-m3f5
41
vulnerability VCID-y58f-kwx7-m3ec
42
vulnerability VCID-yk9j-tm66-eyev
43
vulnerability VCID-z5kr-1k65-hyh3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@204-14~bpo70%252B1
3
url pkg:deb/debian/systemd@215-17
purl pkg:deb/debian/systemd@215-17
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mej-gstk-pfbs
1
vulnerability VCID-2nq3-t67f-57ha
2
vulnerability VCID-4dq5-84vh-u3bz
3
vulnerability VCID-4eyp-2xve-qugd
4
vulnerability VCID-4n47-ffax-sbdu
5
vulnerability VCID-552s-n3yf-fkgq
6
vulnerability VCID-5j51-kyj4-gkag
7
vulnerability VCID-66sa-bc5p-jqde
8
vulnerability VCID-71xj-3x1z-6kh4
9
vulnerability VCID-7mtw-85gb-vyfz
10
vulnerability VCID-7p2k-q6vr-3kf5
11
vulnerability VCID-7war-ne2h-wkej
12
vulnerability VCID-86qy-wkqz-5qam
13
vulnerability VCID-8sva-z329-ekcr
14
vulnerability VCID-8x92-ah94-47f7
15
vulnerability VCID-94hk-2ehw-bqds
16
vulnerability VCID-cmbj-869t-c3e3
17
vulnerability VCID-dvhg-mcz2-r3f5
18
vulnerability VCID-e7km-pysq-hqe2
19
vulnerability VCID-e9ng-ewvh-kqeq
20
vulnerability VCID-egf8-guux-pybe
21
vulnerability VCID-fdkt-299k-vufa
22
vulnerability VCID-fp54-ff23-vbb5
23
vulnerability VCID-gkrw-z2cb-aud5
24
vulnerability VCID-hwg6-vaus-cfa2
25
vulnerability VCID-jxun-f52c-gfg9
26
vulnerability VCID-mgcn-uevn-13c3
27
vulnerability VCID-nuf5-cg89-8bb7
28
vulnerability VCID-q4kr-rg2c-f7ad
29
vulnerability VCID-qu2y-j7d2-auej
30
vulnerability VCID-sdnj-avfk-7bch
31
vulnerability VCID-sn1e-9p1f-1fen
32
vulnerability VCID-sn9x-3yp1-2ke4
33
vulnerability VCID-t3bf-3486-wqh1
34
vulnerability VCID-tv9q-bzvp-sqb5
35
vulnerability VCID-ucz9-1m21-zbhc
36
vulnerability VCID-vprj-j7u6-zbe7
37
vulnerability VCID-vrsm-6j4m-cka4
38
vulnerability VCID-w7ys-gs9d-m3f5
39
vulnerability VCID-y58f-kwx7-m3ec
40
vulnerability VCID-yk9j-tm66-eyev
41
vulnerability VCID-z5kr-1k65-hyh3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@215-17
4
url pkg:deb/debian/systemd@215-17%2Bdeb8u7
purl pkg:deb/debian/systemd@215-17%2Bdeb8u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mej-gstk-pfbs
1
vulnerability VCID-2nq3-t67f-57ha
2
vulnerability VCID-4dq5-84vh-u3bz
3
vulnerability VCID-4eyp-2xve-qugd
4
vulnerability VCID-4n47-ffax-sbdu
5
vulnerability VCID-552s-n3yf-fkgq
6
vulnerability VCID-5j51-kyj4-gkag
7
vulnerability VCID-66sa-bc5p-jqde
8
vulnerability VCID-71xj-3x1z-6kh4
9
vulnerability VCID-7mtw-85gb-vyfz
10
vulnerability VCID-7p2k-q6vr-3kf5
11
vulnerability VCID-7war-ne2h-wkej
12
vulnerability VCID-86qy-wkqz-5qam
13
vulnerability VCID-8sva-z329-ekcr
14
vulnerability VCID-8x92-ah94-47f7
15
vulnerability VCID-94hk-2ehw-bqds
16
vulnerability VCID-cmbj-869t-c3e3
17
vulnerability VCID-dvhg-mcz2-r3f5
18
vulnerability VCID-e7km-pysq-hqe2
19
vulnerability VCID-e9ng-ewvh-kqeq
20
vulnerability VCID-egf8-guux-pybe
21
vulnerability VCID-fdkt-299k-vufa
22
vulnerability VCID-fp54-ff23-vbb5
23
vulnerability VCID-gkrw-z2cb-aud5
24
vulnerability VCID-hwg6-vaus-cfa2
25
vulnerability VCID-jxun-f52c-gfg9
26
vulnerability VCID-mgcn-uevn-13c3
27
vulnerability VCID-nuf5-cg89-8bb7
28
vulnerability VCID-q4kr-rg2c-f7ad
29
vulnerability VCID-qu2y-j7d2-auej
30
vulnerability VCID-sdnj-avfk-7bch
31
vulnerability VCID-sn1e-9p1f-1fen
32
vulnerability VCID-sn9x-3yp1-2ke4
33
vulnerability VCID-t3bf-3486-wqh1
34
vulnerability VCID-tv9q-bzvp-sqb5
35
vulnerability VCID-ucz9-1m21-zbhc
36
vulnerability VCID-vprj-j7u6-zbe7
37
vulnerability VCID-vrsm-6j4m-cka4
38
vulnerability VCID-w7ys-gs9d-m3f5
39
vulnerability VCID-y58f-kwx7-m3ec
40
vulnerability VCID-yk9j-tm66-eyev
41
vulnerability VCID-z5kr-1k65-hyh3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@215-17%252Bdeb8u7
5
url pkg:deb/debian/systemd@230-7~bpo8%2B2
purl pkg:deb/debian/systemd@230-7~bpo8%2B2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mej-gstk-pfbs
1
vulnerability VCID-2nq3-t67f-57ha
2
vulnerability VCID-4dq5-84vh-u3bz
3
vulnerability VCID-4eyp-2xve-qugd
4
vulnerability VCID-4n47-ffax-sbdu
5
vulnerability VCID-552s-n3yf-fkgq
6
vulnerability VCID-5j51-kyj4-gkag
7
vulnerability VCID-66sa-bc5p-jqde
8
vulnerability VCID-71xj-3x1z-6kh4
9
vulnerability VCID-7mtw-85gb-vyfz
10
vulnerability VCID-7p2k-q6vr-3kf5
11
vulnerability VCID-7war-ne2h-wkej
12
vulnerability VCID-86qy-wkqz-5qam
13
vulnerability VCID-8sva-z329-ekcr
14
vulnerability VCID-8x92-ah94-47f7
15
vulnerability VCID-94hk-2ehw-bqds
16
vulnerability VCID-cmbj-869t-c3e3
17
vulnerability VCID-dvhg-mcz2-r3f5
18
vulnerability VCID-e7km-pysq-hqe2
19
vulnerability VCID-e9ng-ewvh-kqeq
20
vulnerability VCID-egf8-guux-pybe
21
vulnerability VCID-fdkt-299k-vufa
22
vulnerability VCID-fp54-ff23-vbb5
23
vulnerability VCID-gkrw-z2cb-aud5
24
vulnerability VCID-hwg6-vaus-cfa2
25
vulnerability VCID-jxun-f52c-gfg9
26
vulnerability VCID-mgcn-uevn-13c3
27
vulnerability VCID-nuf5-cg89-8bb7
28
vulnerability VCID-q4kr-rg2c-f7ad
29
vulnerability VCID-sdnj-avfk-7bch
30
vulnerability VCID-sn1e-9p1f-1fen
31
vulnerability VCID-sn9x-3yp1-2ke4
32
vulnerability VCID-t3bf-3486-wqh1
33
vulnerability VCID-tv9q-bzvp-sqb5
34
vulnerability VCID-vprj-j7u6-zbe7
35
vulnerability VCID-vrsm-6j4m-cka4
36
vulnerability VCID-w7ys-gs9d-m3f5
37
vulnerability VCID-y58f-kwx7-m3ec
38
vulnerability VCID-yk9j-tm66-eyev
39
vulnerability VCID-z5kr-1k65-hyh3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@230-7~bpo8%252B2
6
url pkg:deb/debian/systemd@232-25%2Bdeb9u12
purl pkg:deb/debian/systemd@232-25%2Bdeb9u12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1mej-gstk-pfbs
1
vulnerability VCID-2nq3-t67f-57ha
2
vulnerability VCID-4dq5-84vh-u3bz
3
vulnerability VCID-4eyp-2xve-qugd
4
vulnerability VCID-4n47-ffax-sbdu
5
vulnerability VCID-552s-n3yf-fkgq
6
vulnerability VCID-5j51-kyj4-gkag
7
vulnerability VCID-66sa-bc5p-jqde
8
vulnerability VCID-71xj-3x1z-6kh4
9
vulnerability VCID-7mtw-85gb-vyfz
10
vulnerability VCID-7p2k-q6vr-3kf5
11
vulnerability VCID-7war-ne2h-wkej
12
vulnerability VCID-86qy-wkqz-5qam
13
vulnerability VCID-8sva-z329-ekcr
14
vulnerability VCID-8x92-ah94-47f7
15
vulnerability VCID-94hk-2ehw-bqds
16
vulnerability VCID-cmbj-869t-c3e3
17
vulnerability VCID-dvhg-mcz2-r3f5
18
vulnerability VCID-e7km-pysq-hqe2
19
vulnerability VCID-e9ng-ewvh-kqeq
20
vulnerability VCID-fdkt-299k-vufa
21
vulnerability VCID-fp54-ff23-vbb5
22
vulnerability VCID-hwg6-vaus-cfa2
23
vulnerability VCID-mgcn-uevn-13c3
24
vulnerability VCID-nuf5-cg89-8bb7
25
vulnerability VCID-q4kr-rg2c-f7ad
26
vulnerability VCID-sdnj-avfk-7bch
27
vulnerability VCID-sn1e-9p1f-1fen
28
vulnerability VCID-sn9x-3yp1-2ke4
29
vulnerability VCID-t3bf-3486-wqh1
30
vulnerability VCID-tv9q-bzvp-sqb5
31
vulnerability VCID-vprj-j7u6-zbe7
32
vulnerability VCID-vrsm-6j4m-cka4
33
vulnerability VCID-w7ys-gs9d-m3f5
34
vulnerability VCID-yk9j-tm66-eyev
35
vulnerability VCID-z5kr-1k65-hyh3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/systemd@232-25%252Bdeb9u12
7
url pkg:rpm/redhat/redhat-release-virtualization-host@4.2-8.3?arch=el7
purl pkg:rpm/redhat/redhat-release-virtualization-host@4.2-8.3?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2sfr-eba3-c7ch
1
vulnerability VCID-8hpc-axe9-p7am
2
vulnerability VCID-vrsm-6j4m-cka4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-release-virtualization-host@4.2-8.3%3Farch=el7
8
url pkg:rpm/redhat/redhat-virtualization-host@4.2-20190219.0?arch=el7_6
purl pkg:rpm/redhat/redhat-virtualization-host@4.2-20190219.0?arch=el7_6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2sfr-eba3-c7ch
1
vulnerability VCID-8hpc-axe9-p7am
2
vulnerability VCID-vrsm-6j4m-cka4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.2-20190219.0%3Farch=el7_6
9
url pkg:rpm/redhat/rhvm-appliance@4.2-20190224.0?arch=el7
purl pkg:rpm/redhat/rhvm-appliance@4.2-20190224.0?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vrsm-6j4m-cka4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhvm-appliance@4.2-20190224.0%3Farch=el7
10
url pkg:rpm/redhat/systemd@219-30.el7_3?arch=14
purl pkg:rpm/redhat/systemd@219-30.el7_3?arch=14
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vrsm-6j4m-cka4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/systemd@219-30.el7_3%3Farch=14
11
url pkg:rpm/redhat/systemd@219-42.el7_4?arch=16
purl pkg:rpm/redhat/systemd@219-42.el7_4?arch=16
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vrsm-6j4m-cka4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/systemd@219-42.el7_4%3Farch=16
12
url pkg:rpm/redhat/systemd@219-57.el7_5?arch=6
purl pkg:rpm/redhat/systemd@219-57.el7_5?arch=6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vrsm-6j4m-cka4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/systemd@219-57.el7_5%3Farch=6
13
url pkg:rpm/redhat/systemd@219-62.el7_6?arch=5
purl pkg:rpm/redhat/systemd@219-62.el7_6?arch=5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vrsm-6j4m-cka4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/systemd@219-62.el7_6%3Farch=5
14
url pkg:rpm/redhat/systemd@239-13.el8_0?arch=3
purl pkg:rpm/redhat/systemd@239-13.el8_0?arch=3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vrsm-6j4m-cka4
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/systemd@239-13.el8_0%3Farch=3
References
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6454.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6454.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6454
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29629
published_at 2026-04-01T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29566
published_at 2026-04-18T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29668
published_at 2026-04-11T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29623
published_at 2026-04-12T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29573
published_at 2026-04-13T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29592
published_at 2026-04-16T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29695
published_at 2026-04-02T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29746
published_at 2026-04-04T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29565
published_at 2026-04-07T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29628
published_at 2026-04-08T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29665
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6454
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/systemd/systemd/commits/master/src/libsystemd/sd-bus/bus-objects.c
reference_id
reference_type
scores
url https://github.com/systemd/systemd/commits/master/src/libsystemd/sd-bus/bus-objects.c
7
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10278
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10278
8
reference_url https://lists.debian.org/debian-lts-announce/2019/02/msg00031.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/02/msg00031.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N67IOBOTDOMVNQJ5QRU2MXLEECXPGNVJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N67IOBOTDOMVNQJ5QRU2MXLEECXPGNVJ/
10
reference_url https://security.netapp.com/advisory/ntap-20190327-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190327-0004/
11
reference_url https://www.debian.org/security/2019/dsa-4393
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4393
12
reference_url http://www.openwall.com/lists/oss-security/2019/02/18/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/02/18/3
13
reference_url http://www.openwall.com/lists/oss-security/2019/02/19/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/02/19/1
14
reference_url http://www.openwall.com/lists/oss-security/2021/07/20/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2021/07/20/2
15
reference_url http://www.securityfocus.com/bid/107081
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107081
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1667032
reference_id 1667032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1667032
17
reference_url https://security.archlinux.org/ASA-201902-24
reference_id ASA-201902-24
reference_type
scores
url https://security.archlinux.org/ASA-201902-24
18
reference_url https://security.archlinux.org/AVG-906
reference_id AVG-906
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-906
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_performance_analytics_services:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:239:*:*:*:*:*:*:*
reference_id cpe:2.3:a:systemd_project:systemd:239:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:systemd_project:systemd:239:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6454
reference_id CVE-2019-6454
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-6454
73
reference_url https://security.gentoo.org/glsa/201903-07
reference_id GLSA-201903-07
reference_type
scores
url https://security.gentoo.org/glsa/201903-07
74
reference_url https://access.redhat.com/errata/RHSA-2019:0368
reference_id RHSA-2019:0368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0368
75
reference_url https://access.redhat.com/errata/RHSA-2019:0457
reference_id RHSA-2019:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0457
76
reference_url https://access.redhat.com/errata/RHSA-2019:0461
reference_id RHSA-2019:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0461
77
reference_url https://access.redhat.com/errata/RHSA-2019:0990
reference_id RHSA-2019:0990
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0990
78
reference_url https://access.redhat.com/errata/RHSA-2019:1322
reference_id RHSA-2019:1322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1322
79
reference_url https://access.redhat.com/errata/RHSA-2019:1502
reference_id RHSA-2019:1502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1502
80
reference_url https://access.redhat.com/errata/RHSA-2019:2805
reference_id RHSA-2019:2805
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2805
81
reference_url https://usn.ubuntu.com/3891-1/
reference_id USN-3891-1
reference_type
scores
url https://usn.ubuntu.com/3891-1/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
1
cwe_id 787
name Out-of-bounds Write
description The product writes data past the end, or before the beginning, of the intended buffer.
Exploits
Severity_range_score4.9 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-vrsm-6j4m-cka4