Skip to content
Test a host for susceptibility to CVE-2019-19781
Python Shell
Branch: develop
Clone or download
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github Merge branch 'develop' of into im… Nov 18, 2019
src/check_cve Bump version Jan 14, 2020
tests Relax decoding of response data. Jan 14, 2020
.bandit.yml Split bandit pre-commit checks into two diffrent runs May 6, 2019
.coveragerc Rename library from skeleton Jan 10, 2020
.flake8 Add pydoc warnings to flake8 config May 3, 2019
.gitignore Add ignore for pytest cache directory May 5, 2019
.isort.cfg Add ability to pass in retries and timeout arguments. Jan 13, 2020
.mdl_config.json Add config file for markdownlint Jun 24, 2019
.pre-commit-config.yaml Merge branch 'develop' of into im… Dec 23, 2019
.prettierignore Configure prettier to ignore JSON files Jun 7, 2019
.yamllint First commit Mar 11, 2019 Rename repository references after clone. Jan 10, 2020
LICENSE Rename to LICENSE, make the other changes that requires Jun 24, 2019 Bump version Jan 14, 2020 Rename library from skeleton Jan 10, 2020
pytest.ini Add option to pytest to show extra test summary info May 5, 2019
requirements-dev.txt Move semver requirement from test requirements in to require… Jan 10, 2020
requirements-test.txt Add and requirements.txt Apr 4, 2019
requirements.txt Add and requirements.txt Apr 4, 2019 Merge branch 'develop' into improvement/retry-timeout-args Jan 14, 2020 Add and to support bumping versions and taggin… Jan 10, 2020

check-cve-2019-19781 🔎🐞

GitHub Build Status Coverage Status Total alerts Language grade: Python Known Vulnerabilities

This utility determines if a host appears susceptible to CVE-2019-19781.


Python versions 3.6 and above. Note that Python 2 is not supported.


From a release:

pip install

From source:

git clone
cd check-cve-2019-19781
pip install -r requirements.txt


To scan a host:

❱ cve-2019-19781
2020-01-10 22:11:46,312 WARNING appears to be vulnerable.

Detailed usage information can be viewed with:

❱ cve-2019-19781 --help

Check for the existence of CVE-2019-19781 on a host machine.

    This utility exits with one of the following values:
    0   The host does not seem vulnerable
    1   Command was invoked incorrectly
    2   The host appears to be vulnerable
    >2  An error occurred.

For more information about this vulnerability see:

  cve-2019-19781 [options] <host>
  cve-2019-19781 (-h | --help)

  -h --help              Show this message.
  --log-level=LEVEL      If specified, then the log level will be set to
                         the specified value.  Valid values are "debug", "info",
                         "warning", "error", and "critical". [default: info]
  -r --retries=count     Number of times to retry a failed connection attempt before
                         giving up. [default: 2]
  -t --timeout=seconds   Number of seconds to wait during each connection attempt.
                         [default: 10]


We welcome contributions! Please see here for details.


This project is in the worldwide public domain.

This project is in the public domain within the United States, and copyright and related rights in the work worldwide are waived through the CC0 1.0 Universal public domain dedication.

All contributions to this project will be released under the CC0 dedication. By submitting a pull request, you are agreeing to comply with this waiver of copyright interest.

You can’t perform that action at this time.