Search for vulnerabilities
Vulnerability details: VCID-x591-qs6b-aaar
Vulnerability ID VCID-x591-qs6b-aaar
Aliases CVE-2023-46219
Summary When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.
Status Published
Exploitability 0.5
Weighted Severity 4.8
Risk 2.4
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 4.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46219.json
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46219.json
epss 0.00052 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00062 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00152 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00193 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00198 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00198 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00507 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
epss 0.00989 https://api.first.org/data/v1/epss?cve=CVE-2023-46219
cvssv3.1 Low https://curl.se/docs/CVE-2023-46219.html
cvssv3.1 4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 5.3 https://nvd.nist.gov/vuln/detail/CVE-2023-46219
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2023-46219
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46219.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46219.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-46219
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-46219
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.21364
EPSS Score 0.00052
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-01-03T17:13:34.633948+00:00 NVD Importer Import https://nvd.nist.gov/vuln/detail/CVE-2023-46219 34.0.0rc1