Red Hat Enterprise Linux for Power Little Endian EUS 7.6 ppc64le

CPE Details

Red Hat Enterprise Linux for Power Little Endian EUS 7.6 ppc64le
7.6_ppc64le
2024-12-13
17h47 +00:00
2024-12-13
17h47 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.6_ppc64le:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

enterprise_linux_for_power_little_endian_eus

Version

7.6_ppc64le

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2017-12617 2017-10-03 15h00 +00:00 When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
8.1
Haute
CVE-2017-12615 2017-09-19 13h00 +00:00 When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
8.1
Haute
CVE-2016-3715 2016-05-05 18h00 +00:00 The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.
5.5
Moyen
CVE-2016-3718 2016-05-05 18h00 +00:00 The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image.
5.5
Moyen