Search for vulnerabilities
Vulnerability details: VCID-r4bp-3zs8-aaag
Vulnerability ID VCID-r4bp-3zs8-aaag
Aliases CVE-2019-3498
GHSA-337x-4q8g-prc5
PYSEC-2019-17
PYSEC-2019-87
Summary In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3498.html
cvssv3 4.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3498.json
epss 0.00876 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.00876 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.00876 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.00876 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01003 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01003 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01003 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01003 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01003 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01003 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01003 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01003 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01003 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01003 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01003 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01045 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01431 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01431 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01431 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01431 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01431 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01431 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01431 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01431 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01514 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.01799 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.02373 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.02373 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.02373 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
epss 0.02373 https://api.first.org/data/v1/epss?cve=CVE-2019-3498
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1663722
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3498
cvssv3.1 3.7 https://docs.djangoproject.com/en/dev/releases/security
cvssv3.1 6.5 https://docs.djangoproject.com/en/dev/releases/security
generic_textual HIGH https://docs.djangoproject.com/en/dev/releases/security
generic_textual MODERATE https://docs.djangoproject.com/en/dev/releases/security
generic_textual Medium https://docs.djangoproject.com/en/dev/releases/security/
cvssv3 4.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 6.5 https://github.com/advisories/GHSA-337x-4q8g-prc5
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-337x-4q8g-prc5
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-337x-4q8g-prc5
generic_textual HIGH https://github.com/advisories/GHSA-337x-4q8g-prc5
cvssv3.1 3.7 https://github.com/django/django
cvssv3.1 6.5 https://github.com/django/django
generic_textual HIGH https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 6.5 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2019-17.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2019-17.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2019-17.yaml
cvssv3.1 6.5 https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ
generic_textual HIGH https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ
generic_textual MODERATE https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ
cvssv3.1 6.5 https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html
cvssv3.1 6.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2019-3498
cvssv3 6.5 https://nvd.nist.gov/vuln/detail/CVE-2019-3498
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2019-3498
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2019-3498
archlinux Medium https://security.archlinux.org/AVG-839
generic_textual Medium https://ubuntu.com/security/notices/USN-3851-1
cvssv3.1 6.5 https://usn.ubuntu.com/3851-1
generic_textual HIGH https://usn.ubuntu.com/3851-1
generic_textual MODERATE https://usn.ubuntu.com/3851-1
cvssv3.1 6.5 https://web.archive.org/web/20200227094237/http://www.securityfocus.com/bid/106453
generic_textual HIGH https://web.archive.org/web/20200227094237/http://www.securityfocus.com/bid/106453
generic_textual MODERATE https://web.archive.org/web/20200227094237/http://www.securityfocus.com/bid/106453
cvssv3.1 6.5 https://www.debian.org/security/2019/dsa-4363
generic_textual HIGH https://www.debian.org/security/2019/dsa-4363
generic_textual MODERATE https://www.debian.org/security/2019/dsa-4363
cvssv3.1 6.5 https://www.djangoproject.com/weblog/2019/jan/04/security-releases
generic_textual HIGH https://www.djangoproject.com/weblog/2019/jan/04/security-releases
generic_textual MODERATE https://www.djangoproject.com/weblog/2019/jan/04/security-releases
generic_textual Medium https://www.djangoproject.com/weblog/2019/jan/04/security-releases/
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3498.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3498.json
https://api.first.org/data/v1/epss?cve=CVE-2019-3498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3498
https://cwe.mitre.org/data/definitions/148.html
https://docs.djangoproject.com/en/dev/releases/security
https://docs.djangoproject.com/en/dev/releases/security/
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/django/django
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2019-17.yaml
https://groups.google.com/forum/#%21topic/django-announce/VYU7xQQTEPQ
https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ
https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/
https://ubuntu.com/security/notices/USN-3851-1
https://usn.ubuntu.com/3851-1
https://usn.ubuntu.com/3851-1/
https://web.archive.org/web/20200227094237/http://www.securityfocus.com/bid/106453
https://www.debian.org/security/2019/dsa-4363
https://www.djangoproject.com/weblog/2019/jan/04/security-releases
https://www.djangoproject.com/weblog/2019/jan/04/security-releases/
http://www.securityfocus.com/bid/106453
1663722 https://bugzilla.redhat.com/show_bug.cgi?id=1663722
918230 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918230
ASA-201901-6 https://security.archlinux.org/ASA-201901-6
AVG-839 https://security.archlinux.org/AVG-839
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
CVE-2019-3498 https://nvd.nist.gov/vuln/detail/CVE-2019-3498
GHSA-337x-4q8g-prc5 https://github.com/advisories/GHSA-337x-4q8g-prc5
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3498.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://docs.djangoproject.com/en/dev/releases/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://docs.djangoproject.com/en/dev/releases/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://github.com/advisories/GHSA-337x-4q8g-prc5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2019-17.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-3498
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-3498
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-3498
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://usn.ubuntu.com/3851-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://web.archive.org/web/20200227094237/http://www.securityfocus.com/bid/106453
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://www.debian.org/security/2019/dsa-4363
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Found at https://www.djangoproject.com/weblog/2019/jan/04/security-releases
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.82217
EPSS Score 0.00876
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.