Search for vulnerabilities
Vulnerability details: VCID-9v8e-jame-aaaf
Vulnerability ID VCID-9v8e-jame-aaaf
Aliases CVE-2019-10160
Summary A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-10160.html
rhas Important https://access.redhat.com/errata/RHSA-2019:1587
rhas Important https://access.redhat.com/errata/RHSA-2019:2437
cvssv3 9.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10160.json
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.00464 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.00634 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.00634 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.00634 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.00634 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.00634 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.00634 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.00634 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01722 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.01811 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
epss 0.08121 https://api.first.org/data/v1/epss?cve=CVE-2019-10160
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1718388
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10160
cvssv3 9.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 9.8 https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
generic_textual CRITICAL https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2019-10160
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2019-10160
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2019-10160
generic_textual Medium https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization2.html
generic_textual Medium https://ubuntu.com/security/notices/USN-4127-1
generic_textual Medium https://ubuntu.com/security/notices/USN-4127-2
generic_textual Medium https://usn.ubuntu.com/usn/usn-4127-1
generic_textual Medium https://usn.ubuntu.com/usn/usn-4127-2
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-10160.html
https://access.redhat.com/errata/RHSA-2019:1700
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10160.json
https://api.first.org/data/v1/epss?cve=CVE-2019-10160
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10160
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09
https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e
https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de
https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/
https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization2.html
https://security.netapp.com/advisory/ntap-20190617-0003/
https://ubuntu.com/security/notices/USN-4127-1
https://ubuntu.com/security/notices/USN-4127-2
https://usn.ubuntu.com/4127-1/
https://usn.ubuntu.com/4127-2/
https://usn.ubuntu.com/usn/usn-4127-1
https://usn.ubuntu.com/usn/usn-4127-2
1718388 https://bugzilla.redhat.com/show_bug.cgi?id=1718388
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:converged_systems_advisor_agent:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:converged_systems_advisor_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:3.7:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.8.0:alpha4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:3.8.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:python:python:3.8.0:beta1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:3.8.0:beta1:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
CVE-2019-10160 https://nvd.nist.gov/vuln/detail/CVE-2019-10160
RHSA-2019:1587 https://access.redhat.com/errata/RHSA-2019:1587
RHSA-2019:2437 https://access.redhat.com/errata/RHSA-2019:2437
USN-6891-1 https://usn.ubuntu.com/6891-1/
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10160.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-10160
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-10160
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-10160
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.75929
EPSS Score 0.00464
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.