Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-vk3a-td8w-ebfp
Summaryhttp.cookies.Morsel.js_output() returns an inline <script> snippet and only escapes " for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence </script> inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.
Aliases
0
alias CVE-2026-6019
Fixed_packages
0
url pkg:deb/debian/python3.14@3.14.5~rc1-1
purl pkg:deb/debian/python3.14@3.14.5~rc1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.14@3.14.5~rc1-1
1
url pkg:deb/debian/python3.14@3.14.5~rc1-1?distro=sid
purl pkg:deb/debian/python3.14@3.14.5~rc1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.14@3.14.5~rc1-1%3Fdistro=sid
Affected_packages
0
url pkg:deb/debian/python3.14@3.14.4-2
purl pkg:deb/debian/python3.14@3.14.4-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rcu5-gpmt-r7cb
1
vulnerability VCID-vk3a-td8w-ebfp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.14@3.14.4-2
1
url pkg:deb/debian/python3.14@3.14.4-2?distro=sid
purl pkg:deb/debian/python3.14@3.14.4-2?distro=sid
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rcu5-gpmt-r7cb
1
vulnerability VCID-vk3a-td8w-ebfp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.14@3.14.4-2%3Fdistro=sid
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6019.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6019.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-6019
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11642
published_at 2026-04-24T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11602
published_at 2026-04-26T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.1577
published_at 2026-04-29T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.18741
published_at 2026-05-07T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.18657
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-6019
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6019
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135116
reference_id 1135116
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135116
5
reference_url https://github.com/python/cpython/pull/148848
reference_id 148848
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T20:02:17Z/
url https://github.com/python/cpython/pull/148848
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460869
reference_id 2460869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460869
7
reference_url https://github.com/python/cpython/commit/3c59b8b53fc75c7f9578d16fb8201ceb43e8f76c
reference_id 3c59b8b53fc75c7f9578d16fb8201ceb43e8f76c
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T20:02:17Z/
url https://github.com/python/cpython/commit/3c59b8b53fc75c7f9578d16fb8201ceb43e8f76c
8
reference_url https://github.com/python/cpython/commit/76b3923d688c0efc580658476c5f525ec8735104
reference_id 76b3923d688c0efc580658476c5f525ec8735104
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T20:02:17Z/
url https://github.com/python/cpython/commit/76b3923d688c0efc580658476c5f525ec8735104
9
reference_url https://github.com/python/cpython/issues/90309
reference_id 90309
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T20:02:17Z/
url https://github.com/python/cpython/issues/90309
10
reference_url https://github.com/python/cpython/commit/f795e042043dfe26c42e1971d4502c1cdc4c65b8
reference_id f795e042043dfe26c42e1971d4502c1cdc4c65b8
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T20:02:17Z/
url https://github.com/python/cpython/commit/f795e042043dfe26c42e1971d4502c1cdc4c65b8
11
reference_url https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3/
reference_id IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3
reference_type
scores
0
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T20:02:17Z/
url https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3/
Weaknesses
0
cwe_id 150
name Improper Neutralization of Escape, Meta, or Control Sequences
description The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as escape, meta, or control character sequences when they are sent to a downstream component.
1
cwe_id 79
name Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
description The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Exploits
Severity_range_score2.1 - 6.8
Exploitability0.5
Weighted_severity6.1
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-vk3a-td8w-ebfp