Search for vulnerabilities
Vulnerability details: VCID-vkg1-2urs-aaap
Vulnerability ID VCID-vkg1-2urs-aaap
Aliases CVE-2019-9511
Summary Excessive CPU usage in HTTP/2 with small window updates
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
generic_textual HIGH http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
cvssv3.1 7.5 http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
generic_textual HIGH http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
generic_textual low http://mailman.nginx.org/pipermail/nginx-announce/2019/000249.html
generic_textual medium http://mailman.nginx.org/pipermail/nginx-announce/2019/000249.html
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9511.html
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:2925
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:2925
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:2939
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:2939
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:2955
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:2955
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:2966
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:2966
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:4018
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:4018
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:4019
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:4019
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:4020
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:4020
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2019:4021
generic_textual HIGH https://access.redhat.com/errata/RHSA-2019:4021
rhas Important https://access.redhat.com/errata/RHSA-2020:0922
rhas Important https://access.redhat.com/errata/RHSA-2020:1445
rhas Important https://access.redhat.com/errata/RHSA-2020:2067
rhas Important https://access.redhat.com/errata/RHSA-2020:2565
rhas Important https://access.redhat.com/errata/RHSA-2020:3192
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9511.json
epss 0.09623 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.09623 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.09623 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.09623 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.09623 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.09623 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.09623 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.09623 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.13948 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.15868 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.15868 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.15868 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.15868 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.15868 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.18379 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.18379 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.20628 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.22805 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.22805 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.22805 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.27044 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.30234 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.30234 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
epss 0.65205 https://api.first.org/data/v1/epss?cve=CVE-2019-9511
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1741860
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15604
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15606
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9516
cvssv3 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 7.5 https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
generic_textual HIGH https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
cvssv3.1 7.5 https://kc.mcafee.com/corporate/index?page=content&id=SB10296
generic_textual HIGH https://kc.mcafee.com/corporate/index?page=content&id=SB10296
generic_textual low https://mailman.nginx.org/pipermail/nginx-announce/2019/000249.html
generic_textual medium https://mailman.nginx.org/pipermail/nginx-announce/2019/000249.html
cvssv2 7.8 https://nvd.nist.gov/vuln/detail/CVE-2019-9511
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2019-9511
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2019-9511
archlinux Medium https://security.archlinux.org/AVG-1022
archlinux Medium https://security.archlinux.org/AVG-1023
archlinux Medium https://security.archlinux.org/AVG-1024
generic_textual Medium https://ubuntu.com/security/notices/USN-4099-1
generic_textual Medium https://usn.ubuntu.com/usn/usn-4099-1
cvssv3.1 7.5 https://www.debian.org/security/2020/dsa-4669
generic_textual HIGH https://www.debian.org/security/2020/dsa-4669
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpujan2021.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpujan2021.html
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpuoct2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpuoct2020.html
cvssv3.1 9.8 https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
generic_textual CRITICAL https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
cvssv3.1 7.5 https://www.synology.com/security/advisory/Synology_SA_19_33
generic_textual HIGH https://www.synology.com/security/advisory/Synology_SA_19_33
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html
http://mailman.nginx.org/pipermail/nginx-announce/2019/000249.html
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9511.html
https://access.redhat.com/errata/RHSA-2019:2692
https://access.redhat.com/errata/RHSA-2019:2745
https://access.redhat.com/errata/RHSA-2019:2746
https://access.redhat.com/errata/RHSA-2019:2775
https://access.redhat.com/errata/RHSA-2019:2799
https://access.redhat.com/errata/RHSA-2019:2925
https://access.redhat.com/errata/RHSA-2019:2939
https://access.redhat.com/errata/RHSA-2019:2949
https://access.redhat.com/errata/RHSA-2019:2955
https://access.redhat.com/errata/RHSA-2019:2966
https://access.redhat.com/errata/RHSA-2019:3041
https://access.redhat.com/errata/RHSA-2019:3932
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/errata/RHSA-2019:4018
https://access.redhat.com/errata/RHSA-2019:4019
https://access.redhat.com/errata/RHSA-2019:4020
https://access.redhat.com/errata/RHSA-2019:4021
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9511.json
https://api.first.org/data/v1/epss?cve=CVE-2019-9511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9516
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
https://kb.cert.org/vuls/id/605641/
https://kc.mcafee.com/corporate/index?page=content&id=SB10296
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/
https://mailman.nginx.org/pipermail/nginx-announce/2019/000249.html
https://seclists.org/bugtraq/2019/Aug/40
https://seclists.org/bugtraq/2019/Sep/1
https://security.netapp.com/advisory/ntap-20190823-0002/
https://security.netapp.com/advisory/ntap-20190823-0005/
https://support.f5.com/csp/article/K02591030
https://support.f5.com/csp/article/K02591030?utm_source=f5support&amp%3Butm_medium=RSS
https://support.f5.com/csp/article/K02591030?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-4099-1
https://usn.ubuntu.com/4099-1/
https://usn.ubuntu.com/usn/usn-4099-1
https://www.debian.org/security/2019/dsa-4505
https://www.debian.org/security/2019/dsa-4511
https://www.debian.org/security/2020/dsa-4669
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.synology.com/security/advisory/Synology_SA_19_33
1741860 https://bugzilla.redhat.com/show_bug.cgi?id=1741860
934885 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934885
ASA-201908-12 https://security.archlinux.org/ASA-201908-12
ASA-201908-13 https://security.archlinux.org/ASA-201908-13
ASA-201908-17 https://security.archlinux.org/ASA-201908-17
AVG-1022 https://security.archlinux.org/AVG-1022
AVG-1023 https://security.archlinux.org/AVG-1023
AVG-1024 https://security.archlinux.org/AVG-1024
cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*
cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*
cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*
CVE-2019-9511 https://nvd.nist.gov/vuln/detail/CVE-2019-9511
RHSA-2020:0922 https://access.redhat.com/errata/RHSA-2020:0922
RHSA-2020:1445 https://access.redhat.com/errata/RHSA-2020:1445
RHSA-2020:2067 https://access.redhat.com/errata/RHSA-2020:2067
RHSA-2020:2565 https://access.redhat.com/errata/RHSA-2020:2565
RHSA-2020:3192 https://access.redhat.com/errata/RHSA-2020:3192
RHSA-2024:5856 https://access.redhat.com/errata/RHSA-2024:5856
USN-6754-1 https://usn.ubuntu.com/6754-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:2925
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:2939
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:2955
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:2966
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:4018
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:4019
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:4020
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2019:4021
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9511.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://kc.mcafee.com/corporate/index?page=content&id=SB10296
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2019-9511
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-9511
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2019-9511
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.debian.org/security/2020/dsa-4669
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpujan2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpuoct2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.synology.com/security/advisory/Synology_SA_19_33
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.94970
EPSS Score 0.09623
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.