Vulnerabilities > Redhat > Software Collections

DATE CVE VULNERABILITY TITLE RISK
2019-08-13 CVE-2019-9513 Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. 7.5
2019-08-13 CVE-2019-9511 Allocation of Resources Without Limits or Throttling vulnerability in multiple products
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service.
7.5
2019-08-09 CVE-2019-11042 Out-of-bounds Read vulnerability in multiple products
When PHP EXIF extension is parsing EXIF information from an image, e.g.
7.1
2019-08-09 CVE-2019-11041 Out-of-bounds Read vulnerability in multiple products
When PHP EXIF extension is parsing EXIF information from an image, e.g.
7.1
2019-07-23 CVE-2019-2879 Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB).
network
low complexity
oracle redhat
4.9
2019-07-23 CVE-2019-2834 Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer).
network
low complexity
oracle redhat
6.5
2019-07-23 CVE-2019-2830 Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer).
network
low complexity
oracle redhat
4.9
2019-07-23 CVE-2019-2826 Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Roles).
network
low complexity
oracle redhat
4.9
2019-07-23 CVE-2019-2819 Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Audit).
network
low complexity
oracle canonical redhat
5.5
2019-07-23 CVE-2019-2815 Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer).
network
low complexity
oracle redhat
4.9