Search for vulnerabilities
Vulnerability details: VCID-p3bp-nq76-aaak
Vulnerability ID VCID-p3bp-nq76-aaak
Aliases CVE-2019-13751
Summary Uninitialized data in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13751.html
rhas Moderate https://access.redhat.com/errata/RHSA-2021:4396
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13751.json
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00452 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00454 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00960 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00960 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00960 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.00960 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.01021 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.01021 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.01021 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.01021 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.01021 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.01021 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.01021 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.01021 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.01204 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.01204 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.01204 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.01204 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
epss 0.01447 https://api.first.org/data/v1/epss?cve=CVE-2019-13751
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1781998
generic_textual Medium https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
generic_textual Medium https://crbug.com/1025465
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13725
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13726
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13727
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13728
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13729
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13730
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13732
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13734
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13735
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13736
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13737
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13738
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13739
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13740
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13741
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13743
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13744
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13745
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13746
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13748
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13750
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13751
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13752
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13753
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13754
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13755
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13756
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13757
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13759
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13761
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13762
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13763
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13764
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13767
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6377
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6378
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6379
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6380
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2019-13751
cvssv3 6.5 https://nvd.nist.gov/vuln/detail/CVE-2019-13751
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2019-13751
archlinux Critical https://security.archlinux.org/AVG-1076
generic_textual Medium https://ubuntu.com/security/notices/USN-4298-1
generic_textual Medium https://ubuntu.com/security/notices/USN-4298-2
generic_textual Medium https://usn.ubuntu.com/usn/usn-4298-1
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13751.html
https://access.redhat.com/errata/RHSA-2019:4238
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13751.json
https://api.first.org/data/v1/epss?cve=CVE-2019-13751
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
https://crbug.com/1025465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13728
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6380
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
https://seclists.org/bugtraq/2020/Jan/27
https://security.gentoo.org/glsa/202003-08
https://ubuntu.com/security/notices/USN-4298-1
https://ubuntu.com/security/notices/USN-4298-2
https://usn.ubuntu.com/4298-1/
https://usn.ubuntu.com/4298-2/
https://usn.ubuntu.com/usn/usn-4298-1
https://www.debian.org/security/2020/dsa-4606
1781998 https://bugzilla.redhat.com/show_bug.cgi?id=1781998
AVG-1076 https://security.archlinux.org/AVG-1076
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x64:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x64:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x86:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x86:*
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x64:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x64:*
cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x86:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:x86:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x64:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x64:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x86:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x86:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x64:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x64:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x86:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x86:*
CVE-2019-13751 https://nvd.nist.gov/vuln/detail/CVE-2019-13751
RHSA-2021:4396 https://access.redhat.com/errata/RHSA-2021:4396
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13751.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-13751
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-13751
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-13751
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.60889
EPSS Score 0.00452
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.