U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-14838

Change History

Modified Analysis by NIST 10/13/2020 12:21:15 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:redhat:data_grid:7.3.4:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.4:*:*:*:*:*:*:*
Changed CPE Configuration
AND
     OR
          *cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
AND
     OR
          *cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*
          *cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.5:*:*:*:*:*:*:*
          *cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*
          *cpe:2.3:a:redhat:single_sign-on:7.3.5:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
          cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Added CWE

								
							
							
						
NIST CWE-269
Removed CWE
NIST CWE-287

								
						
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:3082 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3082 Vendor Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:3083 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3083 Vendor Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:4018 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:4018 Vendor Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:4019 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:4019 Vendor Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:4020 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:4020 Vendor Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:4021 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:4021 Vendor Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:4040 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:4040 Vendor Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:4041 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:4041 Vendor Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:4042 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:4042 Vendor Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2019:4045 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:4045 Vendor Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2020:0728 No Types Assigned
https://access.redhat.com/errata/RHSA-2020:0728 Vendor Advisory
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14838 Issue Tracking, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14838 Issue Tracking, Vendor Advisory