Search for vulnerabilities
Vulnerability details: VCID-97x6-pdeg-aaah
Vulnerability ID VCID-97x6-pdeg-aaah
Aliases CVE-2019-7317
Summary png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-7317.html
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7317.json
epss 0.00296 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00296 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00296 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00296 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00382 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00455 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00455 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00455 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00455 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00455 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00455 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00455 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00455 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00455 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00455 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00455 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
epss 0.01842 https://api.first.org/data/v1/epss?cve=CVE-2019-7317
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1672409
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
cvssv3 5.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 2.6 https://nvd.nist.gov/vuln/detail/CVE-2019-7317
cvssv3 5.3 https://nvd.nist.gov/vuln/detail/CVE-2019-7317
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2019-7317
archlinux Low https://security.archlinux.org/AVG-868
archlinux Critical https://security.archlinux.org/AVG-965
archlinux Critical https://security.archlinux.org/AVG-966
cvssv3.1 8.8 https://security.gentoo.org/glsa/201908-02
generic_textual HIGH https://security.gentoo.org/glsa/201908-02
generic_textual Medium https://ubuntu.com/security/notices/USN-3962-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3991-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3997-1
generic_textual Medium https://ubuntu.com/security/notices/USN-4080-1
generic_textual Medium https://ubuntu.com/security/notices/USN-4083-1
generic_textual Medium https://usn.ubuntu.com/usn/usn-3962-1
generic_textual Medium https://usn.ubuntu.com/usn/usn-3991-1
generic_textual Medium https://usn.ubuntu.com/usn/usn-3997-1
generic_textual Medium https://usn.ubuntu.com/usn/usn-4080-1
generic_textual Medium https://usn.ubuntu.com/usn/usn-4083-1
generic_textual critical https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
generic_textual Medium https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-7317
generic_textual critical https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
generic_textual Medium https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-7317
cvssv3.1 7.5 https://www.oracle.com/security-alerts/cpuApr2021.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpuApr2021.html
cvssv3.1 8.2 https://www.oracle.com/security-alerts/cpuoct2021.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpuoct2021.html
cvssv3.1 5.9 https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
generic_textual MODERATE https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
http://packetstormsecurity.com/files/152561/Slackware-Security-Advisory-libpng-Updates.html
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-7317.html
https://access.redhat.com/errata/RHSA-2019:1265
https://access.redhat.com/errata/RHSA-2019:1267
https://access.redhat.com/errata/RHSA-2019:1269
https://access.redhat.com/errata/RHSA-2019:1308
https://access.redhat.com/errata/RHSA-2019:1309
https://access.redhat.com/errata/RHSA-2019:1310
https://access.redhat.com/errata/RHSA-2019:2494
https://access.redhat.com/errata/RHSA-2019:2495
https://access.redhat.com/errata/RHSA-2019:2585
https://access.redhat.com/errata/RHSA-2019:2590
https://access.redhat.com/errata/RHSA-2019:2592
https://access.redhat.com/errata/RHSA-2019:2737
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7317.json
https://api.first.org/data/v1/epss?cve=CVE-2019-7317
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/glennrp/libpng/issues/275
https://lists.debian.org/debian-lts-announce/2019/05/msg00032.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00038.html
https://seclists.org/bugtraq/2019/Apr/30
https://seclists.org/bugtraq/2019/Apr/36
https://seclists.org/bugtraq/2019/May/56
https://seclists.org/bugtraq/2019/May/59
https://seclists.org/bugtraq/2019/May/67
https://security.gentoo.org/glsa/201908-02
https://security.netapp.com/advisory/ntap-20190719-0005/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
https://ubuntu.com/security/notices/USN-3962-1
https://ubuntu.com/security/notices/USN-3991-1
https://ubuntu.com/security/notices/USN-3997-1
https://ubuntu.com/security/notices/USN-4080-1
https://ubuntu.com/security/notices/USN-4083-1
https://usn.ubuntu.com/3962-1/
https://usn.ubuntu.com/3991-1/
https://usn.ubuntu.com/3997-1/
https://usn.ubuntu.com/4080-1/
https://usn.ubuntu.com/4083-1/
https://usn.ubuntu.com/usn/usn-3962-1
https://usn.ubuntu.com/usn/usn-3991-1
https://usn.ubuntu.com/usn/usn-3997-1
https://usn.ubuntu.com/usn/usn-4080-1
https://usn.ubuntu.com/usn/usn-4083-1
https://www.debian.org/security/2019/dsa-4435
https://www.debian.org/security/2019/dsa-4448
https://www.debian.org/security/2019/dsa-4451
https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/#CVE-2019-7317
https://www.mozilla.org/en-US/security/advisories/mfsa2019-15/#CVE-2019-7317
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
http://www.securityfocus.com/bid/108098
1672409 https://bugzilla.redhat.com/show_bug.cgi?id=1672409
921355 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921355
ASA-201904-10 https://security.archlinux.org/ASA-201904-10
ASA-201905-8 https://security.archlinux.org/ASA-201905-8
ASA-201905-9 https://security.archlinux.org/ASA-201905-9
AVG-868 https://security.archlinux.org/AVG-868
AVG-965 https://security.archlinux.org/AVG-965
AVG-966 https://security.archlinux.org/AVG-966
cpe:2.3:a:hpe:xp7_command_view_advanced_edition_suite:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hpe:xp7_command_view_advanced_edition_suite:*:*:*:*:*:*:*:*
cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:xp7_command_view:*:*:*:*:advanced:*:*:*
cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:-:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:windows:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:9.6:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vcenter:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management:-:*:*:*:*:vcenter:*:*
cpe:2.3:a:netapp:e-series_santricity_storage_manager:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_unified_manager:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_web_services:*:*:*:*:*:web_services_proxy:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:*:*:*:*:*:web_services_proxy:*:*
cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:oracle:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:oracle:*:*
cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:sap:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:3.4.2:p1:*:*:*:sap:*:*
cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*
cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*
cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:java_se:7u221:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:7u221:*:*:*:*:*:*:*
cpe:2.3:a:oracle:java_se:8u212:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:java_se:8u212:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:11.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:11.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:12.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:12.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
CVE-2019-7317 https://nvd.nist.gov/vuln/detail/CVE-2019-7317
mfsa2019-13 https://www.mozilla.org/en-US/security/advisories/mfsa2019-13
mfsa2019-14 https://www.mozilla.org/en-US/security/advisories/mfsa2019-14
mfsa2019-15 https://www.mozilla.org/en-US/security/advisories/mfsa2019-15
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7317.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2019-7317
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-7317
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-7317
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://security.gentoo.org/glsa/201908-02
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://www.oracle.com/security-alerts/cpuApr2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N Found at https://www.oracle.com/security-alerts/cpuoct2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.68920
EPSS Score 0.00296
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.