Search for vulnerabilities
Vulnerability details: VCID-kfap-b6t7-aaam
Vulnerability ID VCID-kfap-b6t7-aaam
Aliases CVE-2019-9515
Summary Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://blog.kazuhooku.com/2019/08/h2o-version-226-230-beta2-released.html
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
generic_textual HIGH http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
generic_textual HIGH http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9515.html
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:2766
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:2766
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:2796
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:2796
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:2861
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:2861
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:2925
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:2925
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:2939
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:2939
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:2955
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:2955
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:3892
rhas Important https://access.redhat.com/errata/RHSA-2019:3892
ssvc Track https://access.redhat.com/errata/RHSA-2019:3892
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:4018
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:4018
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:4019
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:4019
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:4020
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:4020
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:4021
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:4021
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:4040
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:4040
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:4041
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:4041
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:4042
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:4042
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:4045
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:4045
rhas Important https://access.redhat.com/errata/RHSA-2019:4352
cvssv3.1 6.5 https://access.redhat.com/errata/RHSA-2020:0727
rhas Important https://access.redhat.com/errata/RHSA-2020:0727
ssvc Track https://access.redhat.com/errata/RHSA-2020:0727
rhas Important https://access.redhat.com/errata/RHSA-2020:0922
rhas Important https://access.redhat.com/errata/RHSA-2020:0983
rhas Important https://access.redhat.com/errata/RHSA-2020:1445
rhas Important https://access.redhat.com/errata/RHSA-2020:2067
rhas Important https://access.redhat.com/errata/RHSA-2020:2565
rhas Important https://access.redhat.com/errata/RHSA-2020:3196
rhas Important https://access.redhat.com/errata/RHSA-2020:3197
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9515.json
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.02693 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04632 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04632 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04632 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04632 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04881 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04881 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04881 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04881 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04881 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04881 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04881 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04881 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04881 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04881 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04881 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.04881 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.09583 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.18145 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.20633 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.20633 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
epss 0.20633 https://api.first.org/data/v1/epss?cve=CVE-2019-9515
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1735745
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
cvssv3.1 7.5 http://seclists.org/fulldisclosure/2019/Aug/16
generic_textual HIGH http://seclists.org/fulldisclosure/2019/Aug/16
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 7.5 https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
generic_textual HIGH https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
generic_textual Medium https://github.com/netty/netty/pull/9460
cvssv3.1 7.5 https://kc.mcafee.com/corporate/index?page=content&id=SB10296
generic_textual HIGH https://kc.mcafee.com/corporate/index?page=content&id=SB10296
generic_textual Medium https://labs.twistedmatrix.com/2019/11/twisted-19100-released.html
cvssv3.1 7.5 https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
cvssv3.1 7.5 https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
cvssv3.1 7.5 https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
generic_textual Medium https://netty.io/news/2019/08/13/4-1-39-Final.html
cvssv2 7.8 https://nvd.nist.gov/vuln/detail/CVE-2019-9515
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2019-9515
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2019-9515
cvssv3.1 7.5 https://seclists.org/bugtraq/2019/Aug/24
generic_textual HIGH https://seclists.org/bugtraq/2019/Aug/24
cvssv3.1 7.5 https://seclists.org/bugtraq/2019/Aug/43
generic_textual HIGH https://seclists.org/bugtraq/2019/Aug/43
cvssv3.1 7.5 https://seclists.org/bugtraq/2019/Sep/18
generic_textual HIGH https://seclists.org/bugtraq/2019/Sep/18
generic_textual Medium https://ubuntu.com/security/notices/USN-4308-1
generic_textual Medium https://usn.ubuntu.com/usn/usn-4308-1
cvssv3.1 7.5 https://www.debian.org/security/2019/dsa-4508
generic_textual HIGH https://www.debian.org/security/2019/dsa-4508
cvssv3.1 7.5 https://www.debian.org/security/2019/dsa-4520
generic_textual HIGH https://www.debian.org/security/2019/dsa-4520
cvssv3.1 7.5 https://www.synology.com/security/advisory/Synology_SA_19_33
generic_textual HIGH https://www.synology.com/security/advisory/Synology_SA_19_33
Reference id Reference type URL
http://blog.kazuhooku.com/2019/08/h2o-version-226-230-beta2-released.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9515.html
https://access.redhat.com/errata/RHSA-2019:2766
https://access.redhat.com/errata/RHSA-2019:2796
https://access.redhat.com/errata/RHSA-2019:2861
https://access.redhat.com/errata/RHSA-2019:2925
https://access.redhat.com/errata/RHSA-2019:2939
https://access.redhat.com/errata/RHSA-2019:2955
https://access.redhat.com/errata/RHSA-2019:4018
https://access.redhat.com/errata/RHSA-2019:4019
https://access.redhat.com/errata/RHSA-2019:4020
https://access.redhat.com/errata/RHSA-2019:4021
https://access.redhat.com/errata/RHSA-2019:4040
https://access.redhat.com/errata/RHSA-2019:4041
https://access.redhat.com/errata/RHSA-2019:4042
https://access.redhat.com/errata/RHSA-2019:4045
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9515.json
https://api.first.org/data/v1/epss?cve=CVE-2019-9515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518
http://seclists.org/fulldisclosure/2019/Aug/16
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
https://github.com/netty/netty/pull/9460
https://kb.cert.org/vuls/id/605641/
https://kc.mcafee.com/corporate/index?page=content&id=SB10296
https://labs.twistedmatrix.com/2019/11/twisted-19100-released.html
https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3Cusers.trafficserver.apache.org%3E
https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3Cannounce.trafficserver.apache.org%3E
https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3Cdev.trafficserver.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/
https://netty.io/news/2019/08/13/4-1-39-Final.html
https://seclists.org/bugtraq/2019/Aug/24
https://seclists.org/bugtraq/2019/Aug/43
https://seclists.org/bugtraq/2019/Sep/18
https://security.netapp.com/advisory/ntap-20190823-0005/
https://support.f5.com/csp/article/K50233772
https://support.f5.com/csp/article/K50233772?utm_source=f5support&amp%3Butm_medium=RSS
https://support.f5.com/csp/article/K50233772?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4308-1
https://usn.ubuntu.com/4308-1/
https://usn.ubuntu.com/usn/usn-4308-1
https://www.debian.org/security/2019/dsa-4508
https://www.debian.org/security/2019/dsa-4520
https://www.synology.com/security/advisory/Synology_SA_19_33
1735745 https://bugzilla.redhat.com/show_bug.cgi?id=1735745
934886 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934886
cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*
cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*
CVE-2019-9515 https://nvd.nist.gov/vuln/detail/CVE-2019-9515
ISTIO-SECURITY-2019-004 https://istio.io/latest/news/security/ISTIO-SECURITY-2019-004/
RHSA-2019:3892 https://access.redhat.com/errata/RHSA-2019:3892
RHSA-2019:4352 https://access.redhat.com/errata/RHSA-2019:4352
RHSA-2020:0727 https://access.redhat.com/errata/RHSA-2020:0727
RHSA-2020:0922 https://access.redhat.com/errata/RHSA-2020:0922
RHSA-2020:0983 https://access.redhat.com/errata/RHSA-2020:0983
RHSA-2020:1445 https://access.redhat.com/errata/RHSA-2020:1445
RHSA-2020:2067 https://access.redhat.com/errata/RHSA-2020:2067
RHSA-2020:2565 https://access.redhat.com/errata/RHSA-2020:2565
RHSA-2020:3196 https://access.redhat.com/errata/RHSA-2020:3196
RHSA-2020:3197 https://access.redhat.com/errata/RHSA-2020:3197
RHSA-2024:5856 https://access.redhat.com/errata/RHSA-2024:5856
USN-USN-4866-1 https://usn.ubuntu.com/USN-4866-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:2766
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:2796
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:2861
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:2925
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:2939
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:2955
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2019:3892
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:30:15Z/ Found at https://access.redhat.com/errata/RHSA-2019:3892
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:4018
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:4019
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:4020
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:4021
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:4040
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:4041
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:4042
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:4045
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2020:0727
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T16:04:44Z/ Found at https://access.redhat.com/errata/RHSA-2020:0727
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9515.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://seclists.org/fulldisclosure/2019/Aug/16
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://kc.mcafee.com/corporate/index?page=content&id=SB10296
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2019-9515
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-9515
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-9515
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://seclists.org/bugtraq/2019/Aug/24
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://seclists.org/bugtraq/2019/Aug/43
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://seclists.org/bugtraq/2019/Sep/18
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.debian.org/security/2019/dsa-4508
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.debian.org/security/2019/dsa-4520
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.synology.com/security/advisory/Synology_SA_19_33
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.84563
EPSS Score 0.02693
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.