{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T00:34:41.748","vulnerabilities":[{"cve":{"id":"CVE-2019-13636","sourceIdentifier":"cve@mitre.org","published":"2019-07-17T21:15:11.797","lastModified":"2024-11-21T04:25:24.703","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c."},{"lang":"es","value":"En GNU parche hasta 2.7.6, el seguimiento de los enlaces simbólicos es manejado inapropiadamente en determinados casos diferentes a los archivos de entrada. Esto afecta a los archivos inp.c y util.c."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:P","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-59"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:patch:*:*:*:*:*:*:*:*","versionEndIncluding":"2.7.6","matchCriteriaId":"0324E14E-0A19-4B70-B316-19577201C5D8"}]}]}],"references":[{"url":"http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html","source":"cve@mitre.org"},{"url":"https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a","source":"cve@mitre.org","tags":["Mailing List","Patch","Vendor Advisory"]},{"url":"https://github.com/irsl/gnu-patch-vulnerabilities","source":"cve@mitre.org"},{"url":"https://lists.debian.org/debian-lts-announce/2019/07/msg00016.html","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/","source":"cve@mitre.org"},{"url":"https://seclists.org/bugtraq/2019/Aug/29","source":"cve@mitre.org"},{"url":"https://seclists.org/bugtraq/2019/Jul/54","source":"cve@mitre.org"},{"url":"https://security.gentoo.org/glsa/201908-22","source":"cve@mitre.org"},{"url":"https://security.netapp.com/advisory/ntap-20190828-0001/","source":"cve@mitre.org"},{"url":"https://usn.ubuntu.com/4071-1/","source":"cve@mitre.org"},{"url":"https://usn.ubuntu.com/4071-2/","source":"cve@mitre.org"},{"url":"https://www.debian.org/security/2019/dsa-4489","source":"cve@mitre.org"},{"url":"http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Vendor Advisory"]},{"url":"https://github.com/irsl/gnu-patch-vulnerabilities","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.debian.org/debian-lts-announce/2019/07/msg00016.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://seclists.org/bugtraq/2019/Aug/29","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://seclists.org/bugtraq/2019/Jul/54","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.gentoo.org/glsa/201908-22","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.netapp.com/advisory/ntap-20190828-0001/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://usn.ubuntu.com/4071-1/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://usn.ubuntu.com/4071-2/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.debian.org/security/2019/dsa-4489","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}