Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-20710

Опубликовано: 14 янв. 2019
Источник: redhat
CVSS3: 0

Описание

No description is available for this CVE.

Отчет

This flaw was found to be a duplicate of CVE-2019-6285. Please see https://access.redhat.com/security/cve/CVE-2019-6285 for information about affected products and security errata.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenStack Platform 10 (Newton)yaml-cppNot affected
Red Hat OpenStack Platform 13 (Queens)yaml-cppNot affected
Red Hat OpenStack Platform 14 (Rocky)yaml-cppNot affected
Red Hat OpenStack Platform 8 (Liberty)yaml-cppNot affected
Red Hat OpenStack Platform 9 (Mitaka)yaml-cppNot affected
Red Hat Satellite 6yaml-cppNot affected
Red Hat Software Collectionsrh-mongodb32-yaml-cppNot affected
Red Hat Software Collectionsrh-mongodb34-yaml-cppNot affected
Red Hat Software Collectionsrh-mongodb36-yaml-cppNot affected

Показывать по

Дополнительная информация

Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1686723yaml-cpp: remote dos via crafted YAML file in function SingleDocParser::HandleFlowSequence

0 Low

CVSS3

Связанные уязвимости

ubuntu
почти 7 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-6285. Reason: This candidate is a duplicate of CVE-2019-6285. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2019-6285 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage

nvd
почти 7 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-6285. Reason: This candidate is a duplicate of CVE-2019-6285. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2019-6285 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage

0 Low

CVSS3