Vulnerabilities > Redhat
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-12-09 | CVE-2017-3112 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. | 9.8 |
2017-12-09 | CVE-2017-11225 | Use After Free vulnerability in multiple products An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. | 9.8 |
2017-12-09 | CVE-2017-11215 | Use After Free vulnerability in multiple products An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. | 9.8 |
2017-12-09 | CVE-2017-11213 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. | 9.8 |
2017-12-08 | CVE-2017-10906 | Escape sequence injection vulnerability in Fluentd versions 0.12.29 through 0.12.40 may allow an attacker to change the terminal UI or execute arbitrary commands on the device via unspecified vectors. | 9.8 |
2017-12-07 | CVE-2017-1000410 | Information Exposure vulnerability in multiple products The Linux kernel version 3.3-rc1 and later is affected by a vulnerability lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. | 7.5 |
2017-12-07 | CVE-2017-15121 | Unspecified vulnerability in Redhat products A non-privileged user is able to mount a fuse filesystem on RHEL 6 or 7 and crash a system if an application punches a hole in a file that does not end aligned to a page boundary. | 5.5 |
2017-12-01 | CVE-2017-11282 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Adobe Flash Player has an exploitable memory corruption vulnerability in the MP4 atom parser. | 9.8 |
2017-12-01 | CVE-2017-11281 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products Adobe Flash Player has an exploitable memory corruption vulnerability in the text handling function. | 9.8 |
2017-11-30 | CVE-2017-15116 | NULL Pointer Dereference vulnerability in multiple products The rngapi_reset function in crypto/rng.c in the Linux kernel before 4.2 allows attackers to cause a denial of service (NULL pointer dereference). | 5.5 |