Search for vulnerabilities
| Vulnerability ID | VCID-fnr7-xb26-dbez |
| Aliases |
CVE-2020-19909
|
| Summary | Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associated systems or networks if, for example, --retry-delay is misinterpreted as a value much smaller than what was intended. This is not especially plausible because the overflow only happens if the user was trying to specify that curl should wait weeks (or longer) before trying to recover from a transient error. |
| Status | Disputed |
| Exploitability | 0.5 |
| Weighted Severity | 1.6 |
| Risk | 0.8 |
| Affected and Fixed Packages | Package Details |
| There are no known CWE. |
| System | Score | Found at |
|---|---|---|
| epss | 0.00017 | https://api.first.org/data/v1/epss?cve=CVE-2020-19909 |
| epss | 0.00017 | https://api.first.org/data/v1/epss?cve=CVE-2020-19909 |
| epss | 0.00017 | https://api.first.org/data/v1/epss?cve=CVE-2020-19909 |
| epss | 0.00017 | https://api.first.org/data/v1/epss?cve=CVE-2020-19909 |
| epss | 0.00017 | https://api.first.org/data/v1/epss?cve=CVE-2020-19909 |
| epss | 0.00017 | https://api.first.org/data/v1/epss?cve=CVE-2020-19909 |
| epss | 0.00017 | https://api.first.org/data/v1/epss?cve=CVE-2020-19909 |
| epss | 0.00017 | https://api.first.org/data/v1/epss?cve=CVE-2020-19909 |
| epss | 0.00017 | https://api.first.org/data/v1/epss?cve=CVE-2020-19909 |
| ssvc | Track | https://daniel.haxx.se/blog/2023/08/26/cve-2020-19909-is-everything-that-is-wrong-with-cves/ |
| cvssv3.1 | 3.3 | https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml |
| ssvc | Track | https://github.com/curl/curl/pull/4166 |
| Reference id | Reference type | URL |
|---|---|---|
| https://api.first.org/data/v1/epss?cve=CVE-2020-19909 | ||
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19909 | ||
| https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml | ||
| 4166 | https://github.com/curl/curl/pull/4166 | |
| cve-2020-19909-is-everything-that-is-wrong-with-cves | https://daniel.haxx.se/blog/2023/08/26/cve-2020-19909-is-everything-that-is-wrong-with-cves/ |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Percentile | 0.04228 |
| EPSS Score | 0.00017 |
| Published At | April 1, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-03T19:05:22.476158+00:00 | NVD CVE Status Improver | Improve | https://cveawg.mitre.org/api/cve/CVE-2020-19909 | 38.1.0 |
| 2026-04-01T16:34:11.649369+00:00 | Debian Oval Importer | Import | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 38.0.0 |