[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-RHSA-2018:3065":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T20:11:31.826Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":24,"duplicates":25,"related":26,"reserved_at":9,"published_at":27,"modified_at":28,"state":9,"summary":29,"references_raw":31,"kevs":136,"epss":9,"epss_history":137,"metrics":138,"affected":145},"RHSA-2018:3065","Red Hat Security Advisory: libkdcraw security update",null,[],[],[],[14,16,18,20,22],{"_key":15},"CVE-2018-5800",{"_key":17},"CVE-2018-5801",{"_key":19},"CVE-2018-5802",{"_key":21},"CVE-2018-5805",{"_key":23},"CVE-2018-5806",[],[],[],"2024-09-16T01:12:48Z","2025-11-22T11:34:51Z",{"cisa_kev":30,"cisa_ransomware":30,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[32,38,43,47,52,56,60,64,68,72,76,80,84,88,92,96,100,104,108,112,116,120,124,128,132],{"url":33,"sources":34,"tags":36},"https://access.redhat.com/errata/RHSA-2018:3065",[35],"osv_red_hat",[37],"Advisory",{"url":39,"sources":40,"tags":41},"https://access.redhat.com/security/updates/classification/#moderate",[35],[42],"ARTICLE",{"url":44,"sources":45,"tags":46},"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index",[35],[42],{"url":48,"sources":49,"tags":50},"https://bugzilla.redhat.com/show_bug.cgi?id=1553332",[35],[51],"REPORT",{"url":53,"sources":54,"tags":55},"https://bugzilla.redhat.com/show_bug.cgi?id=1553334",[35],[51],{"url":57,"sources":58,"tags":59},"https://bugzilla.redhat.com/show_bug.cgi?id=1553335",[35],[51],{"url":61,"sources":62,"tags":63},"https://bugzilla.redhat.com/show_bug.cgi?id=1591887",[35],[51],{"url":65,"sources":66,"tags":67},"https://bugzilla.redhat.com/show_bug.cgi?id=1591897",[35],[51],{"url":69,"sources":70,"tags":71},"https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3065.json",[35],[37],{"url":73,"sources":74,"tags":75},"https://access.redhat.com/security/cve/CVE-2018-5800",[35],[51],{"url":77,"sources":78,"tags":79},"https://www.cve.org/CVERecord?id=CVE-2018-5800",[35],[37],{"url":81,"sources":82,"tags":83},"https://nvd.nist.gov/vuln/detail/CVE-2018-5800",[35],[37],{"url":85,"sources":86,"tags":87},"https://packetstormsecurity.com/files/146172/secunia-libraw.txt",[35],[42],{"url":89,"sources":90,"tags":91},"https://access.redhat.com/security/cve/CVE-2018-5801",[35],[51],{"url":93,"sources":94,"tags":95},"https://www.cve.org/CVERecord?id=CVE-2018-5801",[35],[37],{"url":97,"sources":98,"tags":99},"https://nvd.nist.gov/vuln/detail/CVE-2018-5801",[35],[37],{"url":101,"sources":102,"tags":103},"https://access.redhat.com/security/cve/CVE-2018-5802",[35],[51],{"url":105,"sources":106,"tags":107},"https://www.cve.org/CVERecord?id=CVE-2018-5802",[35],[37],{"url":109,"sources":110,"tags":111},"https://nvd.nist.gov/vuln/detail/CVE-2018-5802",[35],[37],{"url":113,"sources":114,"tags":115},"https://access.redhat.com/security/cve/CVE-2018-5805",[35],[51],{"url":117,"sources":118,"tags":119},"https://www.cve.org/CVERecord?id=CVE-2018-5805",[35],[37],{"url":121,"sources":122,"tags":123},"https://nvd.nist.gov/vuln/detail/CVE-2018-5805",[35],[37],{"url":125,"sources":126,"tags":127},"https://access.redhat.com/security/cve/CVE-2018-5806",[35],[51],{"url":129,"sources":130,"tags":131},"https://www.cve.org/CVERecord?id=CVE-2018-5806",[35],[37],{"url":133,"sources":134,"tags":135},"https://nvd.nist.gov/vuln/detail/CVE-2018-5806",[35],[37],[],[],[139],{"source":35,"cvss_v2_0":9,"cvss_v3_0":140,"cvss_v3_1":9,"cvss_v4_0":9},{"baseScore":141,"baseSeverity":9,"vectorString":142,"impactScore":143,"exploitabilityScore":144},7,"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",9.8,2.6,[146,160,166],{"ecosystem":147,"name":148,"vendor":149,"product":148,"cpe_part":9,"purl_type":150,"purl_namespace":149,"purl_name":148,"source":9,"versions":151},"Red Hat","libkdcraw","redhat","rpm",[152,158,159],{"version":153,"is_range":154,"range_type":155,"version_start":9,"version_start_type":9,"version_end":156,"version_end_type":157,"fixed_in":9},"lt0:4_10_5_5_el7",true,"ecosystem","0:4.10.5-5.el7","excluding",{"version":153,"is_range":154,"range_type":155,"version_start":9,"version_start_type":9,"version_end":156,"version_end_type":157,"fixed_in":9},{"version":153,"is_range":154,"range_type":155,"version_start":9,"version_start_type":9,"version_end":156,"version_end_type":157,"fixed_in":9},{"ecosystem":147,"name":161,"vendor":149,"product":161,"cpe_part":9,"purl_type":150,"purl_namespace":149,"purl_name":161,"source":9,"versions":162},"libkdcraw-debuginfo",[163,164,165],{"version":153,"is_range":154,"range_type":155,"version_start":9,"version_start_type":9,"version_end":156,"version_end_type":157,"fixed_in":9},{"version":153,"is_range":154,"range_type":155,"version_start":9,"version_start_type":9,"version_end":156,"version_end_type":157,"fixed_in":9},{"version":153,"is_range":154,"range_type":155,"version_start":9,"version_start_type":9,"version_end":156,"version_end_type":157,"fixed_in":9},{"ecosystem":147,"name":167,"vendor":149,"product":167,"cpe_part":9,"purl_type":150,"purl_namespace":149,"purl_name":167,"source":9,"versions":168},"libkdcraw-devel",[169,170,171],{"version":153,"is_range":154,"range_type":155,"version_start":9,"version_start_type":9,"version_end":156,"version_end_type":157,"fixed_in":9},{"version":153,"is_range":154,"range_type":155,"version_start":9,"version_start_type":9,"version_end":156,"version_end_type":157,"fixed_in":9},{"version":153,"is_range":154,"range_type":155,"version_start":9,"version_start_type":9,"version_end":156,"version_end_type":157,"fixed_in":9}]