Executive Summary
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
Why It Matters
CVE-2019-5482 is rated CRITICAL severity, requiring immediate attention from security teams.
CVSS Base Score: 9.8/10
EPSS (Exploit Prediction): 6.9% probability of exploitation in the next 30 days.
Affected Technologies
Vendors: haxx, fedoraproject, opensuse, netapp, oracle, debian
Products: curl, fedora, leap, cloud_backup, oncommand_insight, oncommand_unified_manager, oncommand_workflow_automation, snapcenter, steelstore_cloud_integrated_storage, communications_operations_monitor, communications_session_border_controller, enterprise_manager_ops_center, http_server, hyperion_essbase, mysql_server, oss_support_tools, debian_linux
🛡️What Defenders Should Check
Use Vulnios to continuously monitor your exposure to CVE-2019-5482 and similar vulnerabilities.
References & Sources
AI Security Advisor
Powered by Gemini
Get AI-powered security recommendations tailored to this specific threat — including risk assessment, detection guidance, MITRE ATT&CK mapping, and actionable remediation steps.
Affected Products
Sources
Protect Your Organization
Monitor CVEs, scan for vulnerabilities, and get real-time threat alerts — all in one platform.
Get instant alerts on Telegram
Join our public channel for real-time critical CVE alerts.
Follow @vulnios