Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*
OR
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4:*:*:*:*:*:*:*
OR
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:a:redhat:fuse:1.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:integration_camel_quarkus:-:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:*
*cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:text-only:*:*:*
*cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
*cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:* versions up to (excluding) 2.0.40
*cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:* versions from (including) 2.1.0 up to (excluding) 2.2.10
|
Added |
CVSS V3.1 |
|
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
Added |
CWE |
|
NIST CWE-400
|
Changed |
Reference Type |
https://access.redhat.com/security/cve/CVE-2021-3690 No Types Assigned
|
https://access.redhat.com/security/cve/CVE-2021-3690 Vendor Advisory
|
Changed |
Reference Type |
https://bugzilla.redhat.com/show_bug.cgi?id=1991299 No Types Assigned
|
https://bugzilla.redhat.com/show_bug.cgi?id=1991299 Issue Tracking, Vendor Advisory
|
Changed |
Reference Type |
https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877 No Types Assigned
|
https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877 Patch, Third Party Advisory
|
Changed |
Reference Type |
https://issues.redhat.com/browse/UNDERTOW-1935 No Types Assigned
|
https://issues.redhat.com/browse/UNDERTOW-1935 Exploit, Issue Tracking, Mitigation, Vendor Advisory
|