


Patches Red Hat Enterprise Linux RHSA-2022:7593 Solution Refer to Red Hat security advisory RHSA-2022:7593 for updates and patch information. Consequence Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues. Note: The preceding description block is extracted directly from the security advisory. Red hat enterprise linux for arm 64 8 aarch64. Red hat enterprise linux for power, little endian 8 ppc64le. Red hat enterprise linux for ibm z systems 8 s390x. Red Hat enterprise linux for x86_64 8 x86_64. Python: mailcap: findmatch() function does not sanitize the second argument (cve-2015-20107). Qualys ID 240860 Vendor Reference RHSA-2022:7593 CVE Reference CVE-2015-20107 CVSS Scores Base 9.8 / Temporal 8.5 Description Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.Security Fix(es): Published vulnerabilities by signing up for a Non-Qualys customers can audit their network for all We have published the detection on the date indicated,Īnd it will typically be available in the KnowledgeBase We are coding a detection and will typically publish it We are researching a detection and will publish one if Please reach out to Qualys Support for status of such support cases.

Specific CVE feature requests filed via a Qualys Support case may or may not show up on this page.

It may not show all the CVEs that are actively being investigated. Visibility into upcoming and new detections (QIDs) for allĭisclaimer: The Vulnerability Detection Pipeline is intended to give users an early insight into some of the CVEs the Qualys Research Team is investigating. Browse, filter by detection status, or search by CVE to get
