Added |
CVSS V3.1 |
|
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Removed |
CVSS V3 |
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
|
Changed |
Reference Type |
http://packetstormsecurity.com/files/153106/Spidermonkey-IonMonkey-JS_OPTIMIZED_OUT-Value-Leak.html No Types Assigned
|
http://packetstormsecurity.com/files/153106/Spidermonkey-IonMonkey-JS_OPTIMIZED_OUT-Value-Leak.html Exploit, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
https://access.redhat.com/errata/RHSA-2019:0966 No Types Assigned
|
https://access.redhat.com/errata/RHSA-2019:0966 Third Party Advisory
|
Changed |
Reference Type |
https://access.redhat.com/errata/RHSA-2019:1144 No Types Assigned
|
https://access.redhat.com/errata/RHSA-2019:1144 Third Party Advisory
|
Changed |
Reference Type |
https://bugzilla.mozilla.org/show_bug.cgi?id=1532599 Issue Tracking, Permissions Required, Vendor Advisory
|
https://bugzilla.mozilla.org/show_bug.cgi?id=1532599 Exploit, Issue Tracking, Vendor Advisory
|