Total vulnerabilities in the database
Buffer overflow in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege and/or denial of service via network access.
Software | From | Fixed in |
---|---|---|
opensuse / leap | 15.0 | 15.0.x |
fedoraproject / fedora | 30 | 30.x |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
redhat / enterprise_linux | 8.0 | 8.0.x |
redhat / enterprise_linux_eus | 8.1 | 8.1.x |
redhat / enterprise_linux_eus | 8.2 | 8.2.x |
redhat / enterprise_linux_server_tus | 8.2 | 8.2.x |
redhat / enterprise_linux_server_aus | 8.2 | 8.2.x |
redhat / enterprise_linux_server_tus | 8.4 | 8.4.x |
redhat / enterprise_linux_eus | 8.4 | 8.4.x |
redhat / enterprise_linux_server_aus | 8.4 | 8.4.x |