Search for vulnerabilities
Vulnerability details: VCID-ae3q-mde6-aaab
Vulnerability ID VCID-ae3q-mde6-aaab
Aliases CVE-2019-20907
Summary In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
Status Published
Exploitability 0.5
Weighted Severity 7.0
Risk 3.5
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-20907.html
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4273
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4285
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4299
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4433
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4641
rhas Moderate https://access.redhat.com/errata/RHSA-2020:4654
rhas Moderate https://access.redhat.com/errata/RHSA-2020:5009
rhas Moderate https://access.redhat.com/errata/RHSA-2020:5010
rhas Moderate https://access.redhat.com/errata/RHSA-2021:0528
rhas Moderate https://access.redhat.com/errata/RHSA-2021:0761
rhas Moderate https://access.redhat.com/errata/RHSA-2021:0881
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20907.json
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00321 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00322 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00322 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00322 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00322 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00322 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.0033 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.0033 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.0033 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.0033 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.0033 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.0033 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.0033 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.0033 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.0033 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.0033 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.0033 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00526 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00526 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00526 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.00526 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.01146 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.01176 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.01176 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.01176 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.01176 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.01176 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.01176 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.01176 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.01176 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.01176 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
epss 0.01184 https://api.first.org/data/v1/epss?cve=CVE-2019-20907
generic_textual Medium https://bugs.python.org/issue39017
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1856481
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
cvssv3.1 5.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
generic_textual Medium https://github.com/python/cpython/pull/21454
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2019-20907
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2019-20907
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2019-20907
generic_textual Low https://ubuntu.com/security/notices/USN-4428-1
generic_textual Medium https://ubuntu.com/security/notices/USN-4754-3
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpujan2021.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpujan2021.html
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-20907.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20907.json
https://api.first.org/data/v1/epss?cve=CVE-2019-20907
https://bugs.python.org/issue39017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/python/cpython/pull/21454
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/
https://security.gentoo.org/glsa/202008-01
https://security.netapp.com/advisory/ntap-20200731-0002/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.oracle.com/security-alerts/cpujan2021.html
1856481 https://bugzilla.redhat.com/show_bug.cgi?id=1856481
970099 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970099
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
CVE-2019-20907 https://nvd.nist.gov/vuln/detail/CVE-2019-20907
RHSA-2020:4273 https://access.redhat.com/errata/RHSA-2020:4273
RHSA-2020:4285 https://access.redhat.com/errata/RHSA-2020:4285
RHSA-2020:4299 https://access.redhat.com/errata/RHSA-2020:4299
RHSA-2020:4433 https://access.redhat.com/errata/RHSA-2020:4433
RHSA-2020:4641 https://access.redhat.com/errata/RHSA-2020:4641
RHSA-2020:4654 https://access.redhat.com/errata/RHSA-2020:4654
RHSA-2020:5009 https://access.redhat.com/errata/RHSA-2020:5009
RHSA-2020:5010 https://access.redhat.com/errata/RHSA-2020:5010
RHSA-2021:0528 https://access.redhat.com/errata/RHSA-2021:0528
RHSA-2021:0761 https://access.redhat.com/errata/RHSA-2021:0761
RHSA-2021:0881 https://access.redhat.com/errata/RHSA-2021:0881
RHSA-2021:0949 https://access.redhat.com/errata/RHSA-2021:0949
USN-4754-3 https://usn.ubuntu.com/4754-3/
USN-6891-1 https://usn.ubuntu.com/6891-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20907.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2019-20907
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-20907
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-20907
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpujan2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.5209
EPSS Score 0.00321
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.