ID

VAR-201908-0422


CVE

CVE-2019-9512


TITLE

HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion

Trust: 0.8

sources: CERT/CC: VU#605641

DESCRIPTION

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS) attacks. Apple SwiftNI , Apache Traffic Server , Debian GNU/Linux Used in HTTP/2 Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HTTP/2 is the second version of the hypertext transfer protocol, which is mainly used to ensure the communication between the client and the server. A resource management error vulnerability exists in HTTP/2. An attacker could exploit this vulnerability to cause a denial of service. it exists that Twisted incorrectly validated or sanitized certain URIs or HTTP methods. A remote attacker could use this issue to inject invalid characters and possibly perform header injection attacks. (CVE-2019-12387). Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. All OpenShift Container Platform 3.10 users are advised to upgrade to these updated packages and images. Solution: For OpenShift Container Platform 3.10 see the following documentation, which will be updated shortly for release 3.10.170, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_r elease_notes.html 5. Description: Skydive is an open source real-time network topology and protocols analyzer. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat Data Grid 7.3.3 security update Advisory ID: RHSA-2020:0727-01 Product: Red Hat JBoss Data Grid Advisory URL: https://access.redhat.com/errata/RHSA-2020:0727 Issue date: 2020-03-05 CVE Names: CVE-2018-14335 CVE-2019-3805 CVE-2019-3888 CVE-2019-9512 CVE-2019-9514 CVE-2019-9515 CVE-2019-9518 CVE-2019-10173 CVE-2019-10174 CVE-2019-10184 CVE-2019-10212 CVE-2019-14379 ==================================================================== 1. Summary: An update for Red Hat Data Grid is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat Data Grid is a distributed, in-memory, NoSQL datastore based on the Infinispan project. This release of Red Hat Data Grid 7.3.3 serves as a replacement for Red Hat Data Grid 7.3.2 and includes bug fixes and enhancements, which are described in the Release Notes, linked to in the References section of this erratum. Security Fix(es): * HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512) * HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514) * HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515) * HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518) * xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) (CVE-2019-10173) * infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174) * jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379) * h2: Information Exposure due to insecure handling of permissions in the backup (CVE-2018-14335) * wildfly: Race condition on PID file allows for termination of arbitrary processes by local users (CVE-2019-3805) * undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888) * undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files (CVE-2019-10212) * undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: To install this update, do the following: 1. Download the Data Grid 7.3.3 server patch from the customer portal. 2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on. 3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions. 4. Restart Data Grid to ensure the changes take effect. 4. Bugs fixed (https://bugzilla.redhat.com/): 1610877 - CVE-2018-14335 h2: Information Exposure due to insecure handling of permissions in the backup 1660263 - CVE-2019-3805 wildfly: Race condition on PID file allows for termination of arbitrary processes by local users 1693777 - CVE-2019-3888 undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed 1703469 - CVE-2019-10174 infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods 1713068 - CVE-2019-10184 undertow: Information leak in requests for directories without trailing slashes 1722971 - CVE-2019-10173 xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) 1731984 - CVE-2019-10212 undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files 1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth 1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth 1735745 - CVE-2019-9515 HTTP/2: flood using SETTINGS frames results in unbounded memory growth 1735749 - CVE-2019-9518 HTTP/2: flood using empty frames results in excessive resource consumption 1737517 - CVE-2019-14379 jackson-databind: default typing mishandling leading to remote code execution 5. References: https://access.redhat.com/security/cve/CVE-2018-14335 https://access.redhat.com/security/cve/CVE-2019-3805 https://access.redhat.com/security/cve/CVE-2019-3888 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515 https://access.redhat.com/security/cve/CVE-2019-9518 https://access.redhat.com/security/cve/CVE-2019-10173 https://access.redhat.com/security/cve/CVE-2019-10174 https://access.redhat.com/security/cve/CVE-2019-10184 https://access.redhat.com/security/cve/CVE-2019-10212 https://access.redhat.com/security/cve/CVE-2019-14379 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product\xdata.grid&downloadType=patches&version=7.3 https://access.redhat.com/documentation/en-us/red_hat_data_grid/7.3/html-single/red_hat_data_grid_7.3_release_notes/index 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXmD2b9zjgjWX9erEAQhDqA/9G7uM0HlTt4M6Z9Zc23FSbbr+jj1k/o69 a5WWa+xS3Ko4IvlN5rt+wOHSFet+NTMAerNHzAsB2+viX1hr14Hwf3QnIom/yxbJ PaC1djdaZfcvSIODhbq/C5Ilae09x3rW1voQ39i1Q2bsEqVePLZdC75KjvNLsfqe QJCMvcO3jkccxn7k45baCfTGsFyOhHb17Y9DRarWsC7jO9kEjMxrUPN6qKP6BC9t RMuqDxo1aJnatMeCWb7NA0UpOz0+lFpuR+ZZYPV444nGmfTKrbc9c5TuQUCSP+LD sG1+fh2xMztuGxNiJfgSP3iqHmgXD9TBxh1kxn1kt59llCO5+Uqu/O5OsqeQQ0Ym I+a2VAzn2N776sTbWIZ3231IJex68oG+4/fIo6/FVVJpmtDIDgumgErTPD0kkNuT yyyn3u50RZohzSxEz37QdiQDJbiJcJhmtFR5fLRAbFa8Ys2Gw81PGFba95/kVooX K5uSukzOBm8nhxfBvwZDCY/gWuJwVLSAOJb4VoPZiR2WbZsx+9r+spQv6K9wYr5v s//DY88rsUSaMH4kGco//6Dqis8IwOISr/ZR+Edlnrz1rHv9Z4XerMw56VUKIHva mS7rdNmbLqHN0XfZImxewLca2i7sWIlxWrgKF2f4zEO3ermivdis7RdssZkJ9Zv9 S7B2VoNOQj4=zoia -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . The purpose of this text-only errata is to inform you about the security issues fixed in this release. Installation instructions are available from the Fuse 7.6.0 product documentation page: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/ 4. Description: AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. The References section of this erratum contains a download link (you must log in to download the update). Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The following packages have been upgraded to a later upstream version: nodejs (10.16.3). Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux AppStream (v. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7

Trust: 3.33

sources: NVD: CVE-2019-9512 // CERT/CC: VU#605641 // JVNDB: JVNDB-2019-008112 // VULHUB: VHN-160947 // VULMON: CVE-2019-9512 // PACKETSTORM: 154458 // PACKETSTORM: 154638 // PACKETSTORM: 154525 // PACKETSTORM: 155352 // PACKETSTORM: 154964 // PACKETSTORM: 156628 // PACKETSTORM: 156941 // PACKETSTORM: 156852 // PACKETSTORM: 154663

AFFECTED PRODUCTS

vendor:apachemodel:traffic serverscope:lteversion:6.2.3

Trust: 1.0

vendor:apachemodel:traffic serverscope:gteversion:6.0.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:8.0.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:10.0.0

Trust: 1.0

vendor:apachemodel:traffic serverscope:gteversion:7.0.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:8.16.1

Trust: 1.0

vendor:applemodel:swiftnioscope:lteversion:1.4.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:lteversion:8.8.1

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:12.0.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:lteversion:10.12.0

Trust: 1.0

vendor:apachemodel:traffic serverscope:lteversion:7.1.6

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:12.8.1

Trust: 1.0

vendor:apachemodel:traffic serverscope:gteversion:8.0.0

Trust: 1.0

vendor:apachemodel:traffic serverscope:lteversion:8.0.3

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:10.16.3

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:10.13.0

Trust: 1.0

vendor:applemodel:swiftnioscope:gteversion:1.0.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:8.9.0

Trust: 1.0

vendor:akamaimodel: - scope: - version: -

Trust: 0.8

vendor:amazonmodel: - scope: - version: -

Trust: 0.8

vendor:apache traffic servermodel: - scope: - version: -

Trust: 0.8

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:cloudflaremodel: - scope: - version: -

Trust: 0.8

vendor:envoymodel: - scope: - version: -

Trust: 0.8

vendor:facebookmodel: - scope: - version: -

Trust: 0.8

vendor:go programming languagemodel: - scope: - version: -

Trust: 0.8

vendor:litespeedmodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:nettymodel: - scope: - version: -

Trust: 0.8

vendor:node jsmodel: - scope: - version: -

Trust: 0.8

vendor:synologymodel: - scope: - version: -

Trust: 0.8

vendor:twistedmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:grpcmodel: - scope: - version: -

Trust: 0.8

vendor:nghttp2model: - scope: - version: -

Trust: 0.8

vendor:nginxmodel: - scope: - version: -

Trust: 0.8

vendor:apachemodel:traffic serverscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:applemodel:swiftnioscope: - version: -

Trust: 0.8

sources: CERT/CC: VU#605641 // JVNDB: JVNDB-2019-008112 // NVD: CVE-2019-9512

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-9512
value: HIGH

Trust: 1.0

cret@cert.org: CVE-2019-9512
value: HIGH

Trust: 1.0

NVD: CVE-2019-9512
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201908-925
value: HIGH

Trust: 0.6

VULHUB: VHN-160947
value: HIGH

Trust: 0.1

VULMON: CVE-2019-9512
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-9512
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-160947
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

cret@cert.org: CVE-2019-9512
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2019-9512
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-160947 // VULMON: CVE-2019-9512 // JVNDB: JVNDB-2019-008112 // CNNVD: CNNVD-201908-925 // NVD: CVE-2019-9512 // NVD: CVE-2019-9512

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.9

sources: VULHUB: VHN-160947 // JVNDB: JVNDB-2019-008112 // NVD: CVE-2019-9512

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201908-925

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201908-925

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-008112

PATCH

title:DSA-4503url:https://www.debian.org/security/2019/dsa-4503

Trust: 0.8

title:SwiftNIOurl:https://github.com/apple/swift-nio

Trust: 0.8

title:[ANNOUNCE] Apache Traffic Server is vulnerable to various HTTP/2 attacks (3921083)url:https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E

Trust: 0.8

title:[ANNOUNCE] Apache Traffic Server is vulnerable to various HTTP/2 attacks (ad3d01e)url:https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E

Trust: 0.8

title:[ANNOUNCE] Apache Traffic Server is vulnerable to various HTTP/2 attacks (bde5230)url:https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E

Trust: 0.8

title:HTTP/2 Remedial measures to achieve security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=96610

Trust: 0.6

title:Red Hat: Important: container-tools:1.0 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20194273 - Security Advisory

Trust: 0.1

title:Red Hat: Important: go-toolset-1.11 and go-toolset-1.11-golang security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192682 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 3.11 HTTP/2 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20193906 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat OpenShift Container Platform 4.1 openshift RPM security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192661 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.2 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20193245 - Security Advisory

Trust: 0.1

title:Red Hat: Important: go-toolset:rhel8 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192726 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.1 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20193265 - Security Advisory

Trust: 0.1

title:Red Hat: Important: containernetworking-plugins security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20200406 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.1.20 golang security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20193131 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 3.9 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192769 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: golang-1.13: CVE-2019-14809url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=4f1284fb5317a7db524840483ee9db6f

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 3.10 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192690 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.1.18 gRPC security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192861 - Security Advisory

Trust: 0.1

title:Red Hat: Important: container-tools:rhel8 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20194269 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat OpenShift Enterprise 4.1.15 gRPC security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192766 - Security Advisory

Trust: 0.1

title:Red Hat: CVE-2019-9512url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2019-9512

Trust: 0.1

title:Red Hat: Important: Red Hat Quay v3.1.1 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192966 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat Single Sign-On 7.3.5 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20194045 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Enterprise Application Platform 7.2.5 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20194021 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.1.14 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192594 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 6 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20194018 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: CVE-2019-9512 CVE-2019-9514 CVE-2019-9515url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=7cb587dafb04d397dd392a7f09dec1d9

Trust: 0.1

title:Debian CVElist Bug Report Logs: CVE-2019-9512 CVE-2019-9514 CVE-2019-9515url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=84ba5eefbc1d57b08d1c61852a12e026

Trust: 0.1

title:Amazon Linux AMI: ALAS-2019-1270url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2019-1270

Trust: 0.1

title:Debian Security Advisories: DSA-4503-1 golang-1.11 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=99481074beb7ec3119ad722cad3dd9cc

Trust: 0.1

title:Debian Security Advisories: DSA-4508-1 h2o -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=728a827d177258876055a9107f821dfe

Trust: 0.1

title:Red Hat: Important: Red Hat Single Sign-On 7.3.5 security update on RHEL 7url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20194041 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2019-9512

Trust: 0.1

title:Red Hat: Important: Red Hat Single Sign-On 7.3.5 security update on RHEL 8url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20194042 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat Single Sign-On 7.3.5 security update on RHEL 6url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20194040 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20194019 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 8 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20194020 - Security Advisory

Trust: 0.1

title:Red Hat: Important: nodejs:10 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192925 - Security Advisory

Trust: 0.1

title:Red Hat: Important: rh-nodejs8-nodejs security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192955 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-4520-1 trafficserver -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=3b21ecf9ab12cf6e0b56a2ef2ccf56b8

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Fuse/A-MQ 6.3 R14 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20194352 - Security Advisory

Trust: 0.1

title:Red Hat: Important: EAP Continuous Delivery Technical Preview Release 18 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202565 - Security Advisory

Trust: 0.1

title:Apple: SwiftNIO HTTP/2 1.5.0url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=39f63f0751cdcda5bff86ad147e8e1d5

Trust: 0.1

title:Arch Linux Advisories: [ASA-201908-15] go: multiple issuesurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201908-15

Trust: 0.1

title:Red Hat: Important: rh-nodejs10-nodejs security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20192939 - Security Advisory

Trust: 0.1

title:Arch Linux Advisories: [ASA-201908-16] go-pie: multiple issuesurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201908-16

Trust: 0.1

title:Red Hat: Important: Red Hat Data Grid 7.3.3 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20200727 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: twisted vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4308-1

Trust: 0.1

title:Red Hat: Important: Red Hat AMQ Broker 7.4.3 release and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20201445 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat AMQ Broker 7.6 release and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20200922 - Security Advisory

Trust: 0.1

title:Amazon Linux 2: ALAS2-2019-1272url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2019-1272

Trust: 0.1

title:Red Hat: Important: Red Hat Fuse 7.6.0 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20200983 - Security Advisory

Trust: 0.1

title:IBM: Security Bulletin: IBM Cloud Transformation Advisor is affected by vulnerabilities in WebSphere Application Server Liberty (CVE-2019-9515, CVE-2019-9518, CVE-2019-9517, CVE-2019-9512, CVE-2019-9514, CVE-2019-9513)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=cbf2ee0b22e92590472860fdb3718cab

Trust: 0.1

title:Red Hat: Important: Red Hat Process Automation Manager 7.8.0 Security Updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203197 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat Fuse 7.5.0 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20193892 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat Decision Manager 7.8.0 Security Updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203196 - Security Advisory

Trust: 0.1

title:IBM: IBM Security Bulletin: Version 8.15.0 of Node.js included in IBM Cloud Event Management 2.3.0 has several security vulnerabilities.url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=3b9c6b5fbfb51d956856e88dff5a7acd

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple vulnerabilities affect IBM® SDK for Node.js™ in IBM Cloudurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=89d19e42a01e098dd5f88e0433d2bb5d

Trust: 0.1

title:IBM: IBM Security Bulletin: Node.js vulnerabilities affect IBM Spectrum Control (formerly Tivoli Storage Productivity Center) (CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=5ad9418973cac91ba73c01ad16b1f5a4

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple vulnerabilities in Node.js affect IBM iurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=247686da02fe524817c1939b0f6b6a5c

Trust: 0.1

title:IBM: Security Bulletin: IBM Cloud Transformation Advisor is affected by a Node.js vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=8f76cfb8f0c5ea84a0bc28705788f854

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple vulnerabilities in Node.js affect IBM Cloud App Managementurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=1ce0280dd79176d32c26f34906d1d4de

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple vulnerabilities in Node.js affect IBM Cloud App Managementurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=b76ff63209def4a949aa18bdf6b518b8

Trust: 0.1

title:Red Hat: Important: Red Hat build of Thorntail 2.5.1 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202067 - Security Advisory

Trust: 0.1

title:Fortinet Security Advisories: HTTP/2 Multiple DoS Attacks (VU#605641)url:https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories&qid=FG-IR-19-225

Trust: 0.1

title:metargeturl:https://github.com/brant-ruan/metarget

Trust: 0.1

title:sec-daily-2019url:https://github.com/alphaSeclab/sec-daily-2019

Trust: 0.1

title:Symantec Threat Intelligence Blogurl:https://www.symantec.com/blogs/threat-intelligence/microsoft-patch-tuesday-august-2019

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/severe-flaws-in-kubernetes-expose-all-servers-to-dos-attacks/

Trust: 0.1

title:Threatposturl:https://threatpost.com/http-bugs/147405/

Trust: 0.1

sources: VULMON: CVE-2019-9512 // JVNDB: JVNDB-2019-008112 // CNNVD: CNNVD-201908-925

EXTERNAL IDS

db:NVDid:CVE-2019-9512

Trust: 3.5

db:CERT/CCid:VU#605641

Trust: 3.4

db:OPENWALLid:OSS-SECURITY/2019/08/20/1

Trust: 1.8

db:MCAFEEid:SB10296

Trust: 1.8

db:JVNid:JVNVU93696206

Trust: 0.8

db:JVNid:JVNVU98433488

Trust: 0.8

db:JVNDBid:JVNDB-2019-008112

Trust: 0.8

db:CNNVDid:CNNVD-201908-925

Trust: 0.7

db:PACKETSTORMid:155396

Trust: 0.7

db:PACKETSTORMid:156209

Trust: 0.7

db:PACKETSTORMid:155705

Trust: 0.7

db:PACKETSTORMid:158651

Trust: 0.7

db:PACKETSTORMid:155352

Trust: 0.7

db:PACKETSTORMid:156628

Trust: 0.7

db:PACKETSTORMid:156941

Trust: 0.7

db:PACKETSTORMid:156852

Trust: 0.7

db:PACKETSTORMid:155484

Trust: 0.6

db:PACKETSTORMid:157214

Trust: 0.6

db:PACKETSTORMid:157741

Trust: 0.6

db:PACKETSTORMid:158095

Trust: 0.6

db:PACKETSTORMid:155520

Trust: 0.6

db:PACKETSTORMid:154135

Trust: 0.6

db:PACKETSTORMid:155728

Trust: 0.6

db:AUSCERTid:ESB-2019.4238

Trust: 0.6

db:AUSCERTid:ESB-2019.4737

Trust: 0.6

db:AUSCERTid:ESB-2019.4332

Trust: 0.6

db:AUSCERTid:ESB-2020.4324

Trust: 0.6

db:AUSCERTid:ESB-2020.1030

Trust: 0.6

db:AUSCERTid:ESB-2020.2619

Trust: 0.6

db:AUSCERTid:ESB-2019.4533

Trust: 0.6

db:AUSCERTid:ESB-2020.0643

Trust: 0.6

db:AUSCERTid:ESB-2020.1766

Trust: 0.6

db:AUSCERTid:ESB-2019.3152

Trust: 0.6

db:AUSCERTid:ESB-2020.1076

Trust: 0.6

db:AUSCERTid:ESB-2020.0994

Trust: 0.6

db:AUSCERTid:ESB-2019.3114

Trust: 0.6

db:AUSCERTid:ESB-2019.3597.2

Trust: 0.6

db:AUSCERTid:ESB-2020.0007

Trust: 0.6

db:AUSCERTid:ESB-2019.4645

Trust: 0.6

db:AUSCERTid:ESB-2019.4596

Trust: 0.6

db:AUSCERTid:ESB-2019.4586

Trust: 0.6

db:AUSCERTid:ESB-2020.0100

Trust: 0.6

db:AUSCERTid:ESB-2019.4788

Trust: 0.6

db:AUSCERTid:ESB-2020.2071

Trust: 0.6

db:AUSCERTid:ESB-2019.4697

Trust: 0.6

db:AUSCERTid:ESB-2019.4484

Trust: 0.6

db:AUSCERTid:ESB-2020.1335

Trust: 0.6

db:AUSCERTid:ESB-2020.1427

Trust: 0.6

db:AUSCERTid:ESB-2019.4368

Trust: 0.6

db:AUSCERTid:ESB-2019.4665

Trust: 0.6

db:AUSCERTid:ESB-2020.0832

Trust: 0.6

db:AUSCERTid:ESB-2019.3597.3

Trust: 0.6

db:NSFOCUSid:43919

Trust: 0.6

db:CS-HELPid:SB2022072128

Trust: 0.6

db:ICS CERTid:ICSA-19-346-01

Trust: 0.6

db:PACKETSTORMid:154525

Trust: 0.2

db:PACKETSTORMid:154638

Trust: 0.2

db:PACKETSTORMid:155024

Trust: 0.1

db:PACKETSTORMid:154430

Trust: 0.1

db:PACKETSTORMid:154888

Trust: 0.1

db:PACKETSTORMid:154444

Trust: 0.1

db:PACKETSTORMid:154396

Trust: 0.1

db:PACKETSTORMid:158650

Trust: 0.1

db:PACKETSTORMid:154222

Trust: 0.1

db:PACKETSTORMid:154475

Trust: 0.1

db:PACKETSTORMid:155037

Trust: 0.1

db:PACKETSTORMid:154058

Trust: 0.1

db:PACKETSTORMid:154425

Trust: 0.1

db:VULHUBid:VHN-160947

Trust: 0.1

db:VULMONid:CVE-2019-9512

Trust: 0.1

db:PACKETSTORMid:154458

Trust: 0.1

db:PACKETSTORMid:154964

Trust: 0.1

db:PACKETSTORMid:154663

Trust: 0.1

sources: CERT/CC: VU#605641 // VULHUB: VHN-160947 // VULMON: CVE-2019-9512 // JVNDB: JVNDB-2019-008112 // PACKETSTORM: 154458 // PACKETSTORM: 154638 // PACKETSTORM: 154525 // PACKETSTORM: 155352 // PACKETSTORM: 154964 // PACKETSTORM: 156628 // PACKETSTORM: 156941 // PACKETSTORM: 156852 // PACKETSTORM: 154663 // CNNVD: CNNVD-201908-925 // NVD: CVE-2019-9512

REFERENCES

url:https://www.debian.org/security/2019/dsa-4503

Trust: 3.0

url:https://github.com/netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md

Trust: 2.6

url:https://www.synology.com/security/advisory/synology_sa_19_33

Trust: 2.6

url:https://seclists.org/bugtraq/2019/aug/24

Trust: 2.6

url:https://kb.cert.org/vuls/id/605641/

Trust: 2.6

url:https://access.redhat.com/errata/rhsa-2019:3892

Trust: 2.5

url:https://access.redhat.com/errata/rhsa-2019:4273

Trust: 2.5

url:https://access.redhat.com/errata/rhsa-2019:4018

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2019:4019

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2019:4020

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2019:4021

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2019:4040

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2019:4041

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2019:4042

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2019:4045

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2019:4269

Trust: 2.4

url:https://access.redhat.com/errata/rhsa-2019:4352

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-9512

Trust: 2.3

url:https://access.redhat.com/errata/rhsa-2019:2690

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2019:2769

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2019:2796

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2019:2861

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2019:2925

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2020:0727

Trust: 1.9

url:https://usn.ubuntu.com/4308-1/

Trust: 1.9

url:https://seclists.org/bugtraq/2019/aug/31

Trust: 1.8

url:https://seclists.org/bugtraq/2019/aug/43

Trust: 1.8

url:https://seclists.org/bugtraq/2019/sep/18

Trust: 1.8

url:https://security.netapp.com/advisory/ntap-20190823-0001/

Trust: 1.8

url:https://security.netapp.com/advisory/ntap-20190823-0004/

Trust: 1.8

url:https://security.netapp.com/advisory/ntap-20190823-0005/

Trust: 1.8

url:https://support.f5.com/csp/article/k98053339

Trust: 1.8

url:https://www.debian.org/security/2019/dsa-4508

Trust: 1.8

url:https://www.debian.org/security/2019/dsa-4520

Trust: 1.8

url:http://seclists.org/fulldisclosure/2019/aug/16

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html

Trust: 1.8

url:http://www.openwall.com/lists/oss-security/2019/08/20/1

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:2594

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:2661

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:2682

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:2726

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:2766

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:2939

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:2955

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:2966

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:3131

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:3245

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:3265

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:3906

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2020:0406

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html

Trust: 1.8

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10296

Trust: 1.7

url:https://blogs.akamai.com/sitr/2019/08/http2-vulnerabilities.html

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9512

Trust: 1.4

url:https://support.f5.com/csp/article/k98053339?utm_source=f5support&amp%3butm_medium=rss

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4zqghe3wtylyayjeidjvf2figqtaypmc/

Trust: 1.0

url:https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19%40%3cannounce.trafficserver.apache.org%3e

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4bbp27pzgsy6op6d26e5fw4gzkbfhnu7/

Trust: 1.0

url:https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04%40%3cusers.trafficserver.apache.org%3e

Trust: 1.0

url:https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7%40%3cdev.trafficserver.apache.org%3e

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/cmnfx5mnyrwwimo4btkyqcgudmho3axp/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/lyo6e3h34c346d2e443glxk7ok6kiyiq/

Trust: 1.0

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2019-9514

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2019-9514

Trust: 0.9

url:https://bugzilla.redhat.com/):

Trust: 0.9

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.9

url:https://access.redhat.com/security/team/contact/

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2019-9512

Trust: 0.9

url:https://vuls.cert.org/confluence/pages/viewpage.action?pageid=56393752

Trust: 0.8

url:https://tools.ietf.org/html/rfc7540

Trust: 0.8

url:https://tools.ietf.org/html/rfc7541

Trust: 0.8

url:https://blog.cloudflare.com/on-the-recent-http-2-dos-attacks/

Trust: 0.8

url:https://blog.litespeedtech.com/2019/08/15/litespeed-addresses-http-2-dos-advisories/

Trust: 0.8

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9511https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9512https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9513https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9514https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-9518

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/lyo6e3h34c346d2e443glxk7ok6kiyiq/

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/cmnfx5mnyrwwimo4btkyqcgudmho3axp/

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4bbp27pzgsy6op6d26e5fw4gzkbfhnu7/

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4zqghe3wtylyayjeidjvf2figqtaypmc/

Trust: 0.8

url:https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3cannounce.trafficserver.apache.org%3e

Trust: 0.8

url:https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3cdev.trafficserver.apache.org%3e

Trust: 0.8

url:https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3cusers.trafficserver.apache.org%3e

Trust: 0.8

url:https://jvn.jp/vu/jvnvu98433488/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu93696206/

Trust: 0.8

url:https://support.f5.com/csp/article/k98053339?utm_source=f5support&utm_medium=rss

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2019-9515

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-9515

Trust: 0.7

url:http2-cves/

Trust: 0.6

url:https://www.cloudfoundry.org/blog/various-

Trust: 0.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9518

Trust: 0.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9517

Trust: 0.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9516

Trust: 0.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9515

Trust: 0.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9514

Trust: 0.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9513

Trust: 0.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9511

Trust: 0.6

url:https://support.apple.com/en-au/ht210436

Trust: 0.6

url:https://support.f5.com/csp/article/k50233772

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1126605

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-201914246-1.html

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1104951

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2019:3905

Trust: 0.6

url:https://www.us-cert.gov/ics/advisories/icsa-19-346-01

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1109787

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1109781

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1108515

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1109775

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1165894

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1165906

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1135167

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1164346

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1164364

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2020/suse-su-20200059-1.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation/

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1128387

Trust: 0.6

url:https://packetstormsecurity.com/files/157214/red-hat-security-advisory-2020-1445-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4368/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4788/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4586/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0994/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-node-js-affect-ibm-spectrum-protect-plus-cve-2019-15606-cve-2019-15604-cve-2019-15605-cve-2019-9511-cve-2019-9516-cve-2019-9512-cve-2019-9517-cve-2019-951/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4332/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0643/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4484/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-have-been-identified-in-db2-that-affect-the-ibm-performance-management-product/

Trust: 0.6

url:http2-implementation-vulnerablility/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-websphere-liberty-susceptible-to-

Trust: 0.6

url:https://packetstormsecurity.com/files/155728/red-hat-security-advisory-2019-4352-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2619/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3114/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-kubernetes-affect-ibm-infosphere-information-server/

Trust: 0.6

url:https://portal.msrc.microsoft.com/zh-cn/security-guidance/advisory/cve-2019-9512

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-websphere-application-server-liberty-affect-ibm-spectrum-protect-operations-center-and-client-management-service/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1335/

Trust: 0.6

url:https://packetstormsecurity.com/files/157741/red-hat-security-advisory-2020-2067-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/156209/red-hat-security-advisory-2020-0406-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3597.3/

Trust: 0.6

url:https://packetstormsecurity.com/files/158095/red-hat-security-advisory-2020-2565-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4737/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0832/

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1137466

Trust: 0.6

url:http://www.nsfocus.net/vulndb/43919

Trust: 0.6

url:https://vigilance.fr/vulnerability/http-2-multiple-vulnerabilities-30040

Trust: 0.6

url:https://packetstormsecurity.com/files/155484/red-hat-security-advisory-2019-4019-01.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-netty-affect-ibm-operations-analytics-predictive-insights-cve-2019-9514-cve-2019-9512-cve-2019-9518-cve-2019-9515/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1076/

Trust: 0.6

url:https://packetstormsecurity.com/files/156628/red-hat-security-advisory-2020-0727-01.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation-3/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2071/

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1127397

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1427/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4645/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3597.2/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4665/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-ibm-cloud-pak-for-data-affected-by-vulnerability-in-netty/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-netty-affect-ibm-netcool-agile-service-manager/

Trust: 0.6

url:https://pivotal.io/security/cve-2019-9517

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4697/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-db2-warehouse-has-released-a-fix-in-response-to-multiple-vulnerabilities-found-in-ibm-db2/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-cloud-transformation-advisor-is-affected-by-vulnerabilities-in-websphere-application-server-liberty-cve-2019-9515-cve-2019-9518-cve-2019-9517-cve-2019-9512-cve-2019-9514-c/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4596/

Trust: 0.6

url:https://support.apple.com/en-us/ht210436

Trust: 0.6

url:https://packetstormsecurity.com/files/155520/red-hat-security-advisory-2019-4045-01.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-ibm-db2-and-ibm-java-runtime-affect-ibm-spectrum-protect-server/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-in-ibm-websphere-application-server-affect-ibm-sterling-b2b-integrator/

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1128279

Trust: 0.6

url:https://packetstormsecurity.com/files/156852/red-hat-security-advisory-2020-0922-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/156941/red-hat-security-advisory-2020-0983-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1766/

Trust: 0.6

url:https://packetstormsecurity.com/files/154135/debian-security-advisory-4503-1.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072128

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3152/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-dependent-libraries-affect-ibm-db2-leading-to-denial-of-service-or-privilege-escalation-2/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-infosphere-information-server-is-affected-by-multiple-vulnerabilities-in-websphere-application-server-liberty/

Trust: 0.6

url:https://packetstormsecurity.com/files/158651/red-hat-security-advisory-2020-3197-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.4324/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4533/

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1150960

Trust: 0.6

url:https://packetstormsecurity.com/files/155396/red-hat-security-advisory-2019-3906-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0100/

Trust: 0.6

url:https://packetstormsecurity.com/files/155705/red-hat-security-advisory-2019-4273-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0007/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4238/

Trust: 0.6

url:https://packetstormsecurity.com/files/155352/red-hat-security-advisory-2019-3892-01.html

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1165852

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1030/

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1127853

Trust: 0.6

url:https://www.ibm.com/support/pages/node/1168528

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2019-9518

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-9518

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-9517

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-9517

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-9516

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-9516

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2019-11247

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-11247

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-10173

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-10173

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-16869

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-16869

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-10174

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14379

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-10184

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-3888

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-3888

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-10184

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-10174

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-14379

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-9513

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-9513

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-9511

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-9511

Trust: 0.2

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10296

Trust: 0.1

url:https://support.f5.com/csp/article/k98053339?utm_source=f5support&amp;amp;utm_medium=rss

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/400.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.kb.cert.org/vuls/id/605641

Trust: 0.1

url:https://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_r

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-11796

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-0204

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-15095

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-19360

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-8034

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14720

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14718

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14718

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-19361

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14719

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14719

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12022

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14720

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000850

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=jboss.fuse&version=7.5.0

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000850

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-0201

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12023

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-17485

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-8009

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-8034

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-19360

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-11775

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-11796

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-19362

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1131

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1131

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-19362

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-0204

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-12023

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14721

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-12022

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-11775

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-11307

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14721

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14860

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-0201

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-17485

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-15095

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-8009

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-11307

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14860

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-19361

Trust: 0.1

url:https://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_rel

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14335

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product\xdata.grid&downloadtype=patches&version=7.3

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10212

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10212

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_data_grid/7.3/html-single/red_hat_data_grid_7.3_release_notes/index

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3805

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14335

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3805

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-9251

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-11771

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-5427

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-12422

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-5929

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12422

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14439

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11272

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17570

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17570

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=jboss.fuse&version=7.6.0

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-5929

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-11771

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14439

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3802

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12814

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-12384

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-15756

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-5427

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-15756

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-9251

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-16012

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-12384

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-11272

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-3802

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-12814

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-16012

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:0983

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-0222

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_amq/7.6/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20444

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10247

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=jboss.amq.broker&version=7.6.0&productchanged=yes

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20445

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20444

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-0222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-7238

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:0922

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-10241

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-7238

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10247

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-10241

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20445

Trust: 0.1

sources: CERT/CC: VU#605641 // VULHUB: VHN-160947 // VULMON: CVE-2019-9512 // JVNDB: JVNDB-2019-008112 // PACKETSTORM: 154458 // PACKETSTORM: 154638 // PACKETSTORM: 154525 // PACKETSTORM: 155352 // PACKETSTORM: 154964 // PACKETSTORM: 156628 // PACKETSTORM: 156941 // PACKETSTORM: 156852 // PACKETSTORM: 154663 // CNNVD: CNNVD-201908-925 // NVD: CVE-2019-9512

CREDITS

Red Hat

Trust: 0.9

sources: PACKETSTORM: 154458 // PACKETSTORM: 154638 // PACKETSTORM: 154525 // PACKETSTORM: 155352 // PACKETSTORM: 154964 // PACKETSTORM: 156628 // PACKETSTORM: 156941 // PACKETSTORM: 156852 // PACKETSTORM: 154663

SOURCES

db:CERT/CCid:VU#605641
db:VULHUBid:VHN-160947
db:VULMONid:CVE-2019-9512
db:JVNDBid:JVNDB-2019-008112
db:PACKETSTORMid:154458
db:PACKETSTORMid:154638
db:PACKETSTORMid:154525
db:PACKETSTORMid:155352
db:PACKETSTORMid:154964
db:PACKETSTORMid:156628
db:PACKETSTORMid:156941
db:PACKETSTORMid:156852
db:PACKETSTORMid:154663
db:CNNVDid:CNNVD-201908-925
db:NVDid:CVE-2019-9512

LAST UPDATE DATE

2025-04-28T21:52:13.916000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#605641date:2019-11-19T00:00:00
db:VULHUBid:VHN-160947date:2019-08-23T00:00:00
db:VULMONid:CVE-2019-9512date:2020-12-09T00:00:00
db:JVNDBid:JVNDB-2019-008112date:2019-08-26T00:00:00
db:CNNVDid:CNNVD-201908-925date:2022-07-22T00:00:00
db:NVDid:CVE-2019-9512date:2024-11-21T04:51:46.193

SOURCES RELEASE DATE

db:CERT/CCid:VU#605641date:2019-08-13T00:00:00
db:VULHUBid:VHN-160947date:2019-08-13T00:00:00
db:VULMONid:CVE-2019-9512date:2019-08-13T00:00:00
db:JVNDBid:JVNDB-2019-008112date:2019-08-26T00:00:00
db:PACKETSTORMid:154458date:2019-09-11T19:58:47
db:PACKETSTORMid:154638date:2019-09-27T13:02:22
db:PACKETSTORMid:154525date:2019-09-19T16:25:47
db:PACKETSTORMid:155352date:2019-11-15T16:16:10
db:PACKETSTORMid:154964date:2019-10-24T18:52:58
db:PACKETSTORMid:156628date:2020-03-05T14:41:17
db:PACKETSTORMid:156941date:2020-03-27T13:16:40
db:PACKETSTORMid:156852date:2020-03-23T15:57:42
db:PACKETSTORMid:154663date:2019-09-30T13:33:33
db:CNNVDid:CNNVD-201908-925date:2019-08-13T00:00:00
db:NVDid:CVE-2019-9512date:2019-08-13T21:15:12.287