| gnutls |
CVE-2026-33845 |
高危 |
3.8.3-10.el9_7 |
|
gnutls: GnuTLS: Denial of Service via DTLS zero-length fragment
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33845
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-30 18:16 修改: 2026-05-05 03:03
|
| gnutls |
CVE-2026-33846 |
高危 |
3.8.3-10.el9_7 |
|
gnutls: GnuTLS: Denial of Service via heap buffer overflow in DTLS handshake fragment reassembly
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33846
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-05-04 10:15 修改: 2026-05-04 15:22
|
| gnutls |
CVE-2026-42010 |
高危 |
3.8.3-10.el9_7 |
|
gnutls: gnutls: Authentication Bypass via NUL Character in Username
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42010
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-05-07 12:16 修改: 2026-05-07 15:16
|
| krb5-libs |
CVE-2026-40356 |
高危 |
1.21.1-9.el9_7 |
|
krb5: MIT Kerberos 5 (krb5): Denial of Service via integer underflow and out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40356
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-28 07:16 修改: 2026-04-28 20:11
|
| curl-minimal |
CVE-2026-3783 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3783
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-11 11:16 修改: 2026-03-12 14:10
|
| curl-minimal |
CVE-2026-3784 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: curl: Unauthorized access due to improper HTTP proxy connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3784
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-11 11:16 修改: 2026-03-12 14:09
|
| curl-minimal |
CVE-2026-3805 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3805
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-11 11:16 修改: 2026-03-12 14:08
|
| curl-minimal |
CVE-2026-4873 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: curl: Information disclosure due to incorrect TLS connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4873
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| curl-minimal |
CVE-2026-5545 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: libcurl: Authentication bypass due to incorrect HTTP Negotiate connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5545
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| curl-minimal |
CVE-2026-5773 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: libcurl: Wrong file transfer due to incorrect SMB connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5773
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| curl-minimal |
CVE-2026-6253 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: curl: Proxy credential disclosure via redirects to unauthenticated proxies
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6253
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| curl-minimal |
CVE-2026-6429 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: libcurl: Credential leak via reused proxy connection during HTTP redirects
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6429
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| glib2 |
CVE-2025-14087 |
中危 |
2.68.4-18.el9_7.1 |
2.68.4-18.el9_7.2 |
glib: GLib: Buffer underflow in GVariant parser leads to heap corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14087
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-12-10 09:15 修改: 2026-05-11 23:17
|
| glib2 |
CVE-2025-14512 |
中危 |
2.68.4-18.el9_7.1 |
2.68.4-18.el9_7.2 |
glib: Integer Overflow in GLib GIO Attribute Escaping Causes Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14512
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-12-11 07:16 修改: 2026-05-11 23:17
|
| glib2 |
CVE-2026-1484 |
中危 |
2.68.4-18.el9_7.1 |
|
Glib: Integer Overflow Leading to Buffer Underflow and Out-of-Bounds Write in GLib g_base64_encode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-1484
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-27 14:15 修改: 2026-04-15 00:35
|
| glib2 |
CVE-2026-1489 |
中危 |
2.68.4-18.el9_7.1 |
|
Glib: GLib: Memory corruption via integer overflow in Unicode case conversion
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-1489
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-27 15:15 修改: 2026-04-15 00:35
|
| glibc |
CVE-2026-4046 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Denial of Service via iconv() function with specific character sets
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4046
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-30 18:16 修改: 2026-04-20 22:16
|
| glibc |
CVE-2026-4437 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Incorrect DNS response parsing via crafted DNS server response
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4437
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:41
|
| glibc |
CVE-2026-5435 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Out-of-bounds write via TSIG record processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5435
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-28 13:19 修改: 2026-05-05 17:38
|
| glibc |
CVE-2026-5450 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Heap Buffer Overflow in `scanf` with `%mc` format specifier and large width
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5450
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33
|
| glibc |
CVE-2026-5928 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Information disclosure or denial of service via ungetwc function with specific wide character encodings
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5928
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33
|
| glibc-common |
CVE-2026-4046 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Denial of Service via iconv() function with specific character sets
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4046
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-30 18:16 修改: 2026-04-20 22:16
|
| glibc-common |
CVE-2026-4437 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Incorrect DNS response parsing via crafted DNS server response
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4437
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:41
|
| glibc-common |
CVE-2026-5435 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Out-of-bounds write via TSIG record processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5435
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-28 13:19 修改: 2026-05-05 17:38
|
| glibc-common |
CVE-2026-5450 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Heap Buffer Overflow in `scanf` with `%mc` format specifier and large width
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5450
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33
|
| glibc-common |
CVE-2026-5928 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Information disclosure or denial of service via ungetwc function with specific wide character encodings
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5928
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33
|
| glibc-minimal-langpack |
CVE-2026-4046 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Denial of Service via iconv() function with specific character sets
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4046
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-30 18:16 修改: 2026-04-20 22:16
|
| glibc-minimal-langpack |
CVE-2026-4437 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Incorrect DNS response parsing via crafted DNS server response
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4437
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:41
|
| glibc-minimal-langpack |
CVE-2026-5435 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Out-of-bounds write via TSIG record processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5435
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-28 13:19 修改: 2026-05-05 17:38
|
| glibc-minimal-langpack |
CVE-2026-5450 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Heap Buffer Overflow in `scanf` with `%mc` format specifier and large width
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5450
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33
|
| glibc-minimal-langpack |
CVE-2026-5928 |
中危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Information disclosure or denial of service via ungetwc function with specific wide character encodings
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5928
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33
|
| gnupg2 |
CVE-2025-68972 |
中危 |
2.3.3-5.el9_7 |
|
gnupg: GnuPG: Signature bypass via form feed character in signed messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68972
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-12-27 23:15 修改: 2026-01-09 20:08
|
| coreutils-single |
CVE-2025-5278 |
中危 |
8.32-39.el9 |
|
coreutils: Heap Buffer Under-Read in GNU Coreutils sort via Key Specification
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5278
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-05-27 21:15 修改: 2026-04-15 00:35
|
| curl-minimal |
CVE-2025-13034 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: Public key pinning bypass via QUIC and GnuTLS allows server impersonation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13034
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:54
|
| curl-minimal |
CVE-2025-14017 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14017
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-08 10:15 修改: 2026-01-27 21:29
|
| gnutls |
CVE-2026-3833 |
中危 |
3.8.3-10.el9_7 |
|
gnutls: GnuTLS: Policy bypass due to case-sensitive nameConstraints comparison
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3833
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-30 18:16 修改: 2026-05-07 02:09
|
| gnutls |
CVE-2026-42011 |
中危 |
3.8.3-10.el9_7 |
|
gnutls: gnutls: Security bypass due to incorrect name constraint handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42011
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-05-07 15:16 修改: 2026-05-07 15:48
|
| curl-minimal |
CVE-2026-1965 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-1965
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-11 11:15 修改: 2026-03-12 14:11
|
| krb5-libs |
CVE-2026-40355 |
中危 |
1.21.1-9.el9_7 |
|
krb5: MIT Kerberos 5: Denial of Service via NULL pointer dereference in NegoEx mechanism
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40355
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-28 06:16 修改: 2026-04-28 20:11
|
| libarchive |
CVE-2023-30571 |
中危 |
3.5.3-9.el9_7 |
|
libarchive: Race condition in multi-threaded use of archive_write_disk_header() on posix based systems
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30571
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2023-05-29 20:15 修改: 2025-01-14 17:15
|
| libarchive |
CVE-2025-60753 |
中危 |
3.5.3-9.el9_7 |
|
libarchive: bsdtar hangs and OOMs with zero-length pattern matches
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-60753
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-11-05 16:15 修改: 2026-02-04 21:19
|
| libarchive |
CVE-2026-4426 |
中危 |
3.5.3-9.el9_7 |
|
libarchive: libarchive: Denial of Service via malformed ISO file processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4426
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-19 15:16 修改: 2026-05-03 21:16
|
| libarchive |
CVE-2026-5745 |
中危 |
3.5.3-9.el9_7 |
|
libarchive: A NULL pointer dereference vulnerability exists in the ACL parser of libarchive
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5745
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-07 16:16 修改: 2026-05-03 15:15
|
| libblkid |
CVE-2026-27456 |
中危 |
2.37.4-21.el9_7 |
|
util-linux: TOCTOU in the mount program when setting up loop devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08
|
| libcurl-minimal |
CVE-2025-13034 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: Public key pinning bypass via QUIC and GnuTLS allows server impersonation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13034
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:54
|
| libcurl-minimal |
CVE-2025-14017 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14017
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-08 10:15 修改: 2026-01-27 21:29
|
| libcurl-minimal |
CVE-2026-1965 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-1965
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-11 11:15 修改: 2026-03-12 14:11
|
| libcurl-minimal |
CVE-2026-3783 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3783
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-11 11:16 修改: 2026-03-12 14:10
|
| libcurl-minimal |
CVE-2026-3784 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: curl: Unauthorized access due to improper HTTP proxy connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3784
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-11 11:16 修改: 2026-03-12 14:09
|
| libcurl-minimal |
CVE-2026-3805 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3805
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-11 11:16 修改: 2026-03-12 14:08
|
| libcurl-minimal |
CVE-2026-4873 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: curl: Information disclosure due to incorrect TLS connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4873
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| libcurl-minimal |
CVE-2026-5545 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: libcurl: Authentication bypass due to incorrect HTTP Negotiate connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5545
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| libcurl-minimal |
CVE-2026-5773 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: libcurl: Wrong file transfer due to incorrect SMB connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5773
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| libcurl-minimal |
CVE-2026-6253 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: curl: Proxy credential disclosure via redirects to unauthenticated proxies
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6253
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| libcurl-minimal |
CVE-2026-6429 |
中危 |
7.76.1-35.el9_7.3 |
|
curl: libcurl: Credential leak via reused proxy connection during HTTP redirects
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6429
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| libgcrypt |
CVE-2026-41989 |
中危 |
1.10.0-11.el9 |
|
Libgcrypt: Libgcrypt: Denial of Service and buffer overflow via crafted ECDH ciphertext
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41989
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-23 05:16 修改: 2026-04-27 18:33
|
| libmount |
CVE-2026-27456 |
中危 |
2.37.4-21.el9_7 |
|
util-linux: TOCTOU in the mount program when setting up loop devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08
|
| libsmartcols |
CVE-2026-27456 |
中危 |
2.37.4-21.el9_7 |
|
util-linux: TOCTOU in the mount program when setting up loop devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08
|
| libuuid |
CVE-2026-27456 |
中危 |
2.37.4-21.el9_7 |
|
util-linux: TOCTOU in the mount program when setting up loop devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08
|
| libxml2 |
CVE-2026-0990 |
中危 |
2.9.13-14.el9_7 |
|
libxml2: libxml2: Denial of Service via uncontrolled recursion in XML catalog processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0990
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-15 15:15 修改: 2026-04-22 10:16
|
| libxml2 |
CVE-2026-1757 |
中危 |
2.9.13-14.el9_7 |
|
libxml2: Memory Leak Leading to Local Denial of Service in xmllint Interactive Shell
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-1757
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-02-02 13:15 修改: 2026-04-22 10:16
|
| libxml2 |
CVE-2026-6732 |
中危 |
2.9.13-14.el9_7 |
|
libxml2: libxml2: Denial of Service via crafted XSD-validated document
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6732
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-23 23:16 修改: 2026-05-05 13:58
|
| openldap |
CVE-2026-22185 |
中危 |
2.6.8-4.el9 |
|
OpenLDAP: OpenLDAP LMDB: Denial of Service and Information Disclosure via Heap Buffer Underflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22185
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-07 21:16 修改: 2026-04-15 00:35
|
| openssl-fips-provider |
CVE-2026-2673 |
中危 |
3.0.7-8.el9 |
|
openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-2673
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-13 19:54 修改: 2026-05-12 13:17
|
| openssl-fips-provider |
CVE-2026-31790 |
中危 |
3.0.7-8.el9 |
|
openssl: openssl: Information Disclosure from Uninitialized Memory via Invalid RSA Public Key
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31790
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| openssl-fips-provider-so |
CVE-2026-2673 |
中危 |
3.0.7-8.el9 |
|
openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-2673
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-13 19:54 修改: 2026-05-12 13:17
|
| openssl-fips-provider-so |
CVE-2026-31790 |
中危 |
3.0.7-8.el9 |
|
openssl: openssl: Information Disclosure from Uninitialized Memory via Invalid RSA Public Key
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31790
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| openssl-libs |
CVE-2026-2673 |
中危 |
1:3.5.1-7.el9_7 |
|
openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-2673
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-13 19:54 修改: 2026-05-12 13:17
|
| openssl-libs |
CVE-2026-28386 |
中危 |
1:3.5.1-7.el9_7 |
|
openssl: openssl: Denial of Service due to out-of-bounds read in AES-CFB128
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28386
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-07 22:16 修改: 2026-04-24 18:28
|
| openssl-libs |
CVE-2026-28390 |
中危 |
1:3.5.1-7.el9_7 |
|
openssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28390
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| openssl-libs |
CVE-2026-31790 |
中危 |
1:3.5.1-7.el9_7 |
|
openssl: openssl: Information Disclosure from Uninitialized Memory via Invalid RSA Public Key
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31790
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| p11-kit |
CVE-2026-2100 |
中危 |
0.25.3-3.el9_5 |
|
p11-kit: NULL dereference via C_DeriveKey with specific NULL parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-2100
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-26 21:17 修改: 2026-04-25 02:16
|
| p11-kit-trust |
CVE-2026-2100 |
中危 |
0.25.3-3.el9_5 |
|
p11-kit: NULL dereference via C_DeriveKey with specific NULL parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-2100
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-26 21:17 修改: 2026-04-25 02:16
|
| systemd-libs |
CVE-2026-4105 |
中危 |
252-55.el9_7.9 |
|
systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4105
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-13 19:55 修改: 2026-04-30 17:16
|
| xz-libs |
CVE-2026-34743 |
中危 |
5.2.5-8.el9_0 |
|
xz: XZ Utils: Denial of Service via buffer overflow in index decoding
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34743
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-02 19:21 修改: 2026-04-15 17:33
|
| curl-minimal |
CVE-2025-15079 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: Host verification bypass during SSH transfers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15079
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:50
|
| gnupg2 |
CVE-2022-3219 |
低危 |
2.3.3-5.el9_7 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2023-02-23 20:15 修改: 2025-03-12 21:15
|
| gnupg2 |
CVE-2025-30258 |
低危 |
2.3.3-5.el9_7 |
|
gnupg: verification DoS due to a malicious subkey in the keyring
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-30258
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-03-19 20:15 修改: 2025-10-16 16:53
|
| gnupg2 |
CVE-2026-24883 |
低危 |
2.3.3-5.el9_7 |
|
GnuPG: GnuPG: Denial of service due to specially crafted signature packet
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-24883
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-27 19:16 修改: 2026-02-06 18:06
|
| curl-minimal |
CVE-2025-15224 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: libssh key passphrase bypass without agent set
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15224
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:47
|
| curl-minimal |
CVE-2026-6276 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: libcurl: Information disclosure due to cookie leak when reusing connections with custom Host headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6276
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| gawk |
CVE-2023-4156 |
低危 |
5.1.0-6.el9 |
|
gawk: heap out of bound read in builtin.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4156
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2023-09-25 18:15 修改: 2024-11-21 08:34
|
| libcurl-minimal |
CVE-2024-11053 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: curl netrc password leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2024-12-11 08:15 修改: 2025-11-03 21:16
|
| libcurl-minimal |
CVE-2024-7264 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: libcurl: ASN.1 date parser overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2024-07-31 08:15 修改: 2025-11-03 23:17
|
| libcurl-minimal |
CVE-2024-9681 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: HSTS subdomain overwrites parent cache entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2024-11-06 08:15 修改: 2025-11-03 21:18
|
| libcurl-minimal |
CVE-2025-14524 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: Information disclosure via cross-protocol redirect with OAuth2 bearer token
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14524
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:53
|
| libcurl-minimal |
CVE-2025-14819 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: libcurl: Improper certificate validation due to cached TLS settings reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14819
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:51
|
| libcurl-minimal |
CVE-2025-15079 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: Host verification bypass during SSH transfers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15079
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:50
|
| libcurl-minimal |
CVE-2025-15224 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: libssh key passphrase bypass without agent set
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15224
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:47
|
| libcurl-minimal |
CVE-2026-6276 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: libcurl: Information disclosure due to cookie leak when reusing connections with custom Host headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6276
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| libgcc |
CVE-2022-27943 |
低危 |
11.5.0-11.el9 |
|
binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27943
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2022-03-26 13:15 修改: 2024-11-21 06:56
|
| glibc |
CVE-2026-4438 |
低危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4438
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:40
|
| libgcrypt |
CVE-2026-41990 |
低危 |
1.10.0-11.el9 |
|
Libgcrypt: Libgcrypt: Denial of Service or data integrity issues from missing bounds check during Dilithium signing.
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41990
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-23 05:16 修改: 2026-04-27 18:33
|
| curl-minimal |
CVE-2024-11053 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: curl netrc password leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2024-12-11 08:15 修改: 2025-11-03 21:16
|
| gnutls |
CVE-2026-3832 |
低危 |
3.8.3-10.el9_7 |
|
gnutls: gnutls: Security bypass allows acceptance of revoked server certificates via crafted OCSP response
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3832
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-30 18:16 修改: 2026-05-11 19:15
|
| libstdc++ |
CVE-2022-27943 |
低危 |
11.5.0-11.el9 |
|
binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27943
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2022-03-26 13:15 修改: 2024-11-21 06:56
|
| libtasn1 |
CVE-2025-13151 |
低危 |
4.16.0-9.el9 |
|
libtasn1: libtasn1: Denial of Service via stack-based buffer overflow in asn1_expend_octet_string
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13151
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-07 22:15 修改: 2026-02-02 19:27
|
| curl-minimal |
CVE-2024-7264 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: libcurl: ASN.1 date parser overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2024-07-31 08:15 修改: 2025-11-03 23:17
|
| curl-minimal |
CVE-2024-9681 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: HSTS subdomain overwrites parent cache entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2024-11-06 08:15 修改: 2025-11-03 21:18
|
| curl-minimal |
CVE-2025-14524 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: Information disclosure via cross-protocol redirect with OAuth2 bearer token
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14524
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:53
|
| glib2 |
CVE-2023-32636 |
低危 |
2.68.4-18.el9_7.1 |
|
glib: Timeout in fuzz_variant_text
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32636
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2023-09-14 20:15 修改: 2024-11-21 08:03
|
| libxml2 |
CVE-2023-45322 |
低危 |
2.9.13-14.el9_7 |
|
libxml2: use-after-free in xmlUnlinkNode() in tree.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45322
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2023-10-06 22:15 修改: 2025-11-03 21:16
|
| libxml2 |
CVE-2024-34459 |
低危 |
2.9.13-14.el9_7 |
|
libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2024-05-14 15:39 修改: 2025-11-04 22:16
|
| libxml2 |
CVE-2025-27113 |
低危 |
2.9.13-14.el9_7 |
|
libxml2: NULL Pointer Dereference in libxml2 xmlPatMatch
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-27113
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-02-18 23:15 修改: 2025-11-03 22:18
|
| libxml2 |
CVE-2025-6170 |
低危 |
2.9.13-14.el9_7 |
|
libxml2: Stack Buffer Overflow in xmllint Interactive Shell Command Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6170
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-06-16 16:15 修改: 2026-04-19 20:16
|
| libxml2 |
CVE-2026-0989 |
低危 |
2.9.13-14.el9_7 |
|
libxml2: Unbounded RelaxNG Include Recursion Leading to Stack Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0989
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-15 15:15 修改: 2026-04-22 10:16
|
| libxml2 |
CVE-2026-0992 |
低危 |
2.9.13-14.el9_7 |
|
libxml2: libxml2: Denial of Service via crafted XML catalogs
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0992
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-15 15:15 修改: 2026-04-22 10:16
|
| ncurses-base |
CVE-2023-50495 |
低危 |
6.2-12.20210508.el9 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2023-12-12 15:15 修改: 2025-11-04 19:16
|
| ncurses-libs |
CVE-2023-50495 |
低危 |
6.2-12.20210508.el9 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2023-12-12 15:15 修改: 2025-11-04 19:16
|
| glibc-common |
CVE-2026-4438 |
低危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4438
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:40
|
| glib2 |
CVE-2025-3360 |
低危 |
2.68.4-18.el9_7.1 |
|
glibc: GLib prior to 2.82.5 is vulnerable to integer overflow and buffer under-read when parsing a very long invalid ISO 8601 timestamp with g_date_time_new_from_iso8601().
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3360
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-04-07 13:15 修改: 2026-04-15 00:35
|
| libarchive |
CVE-2025-1632 |
低危 |
3.5.3-9.el9_7 |
|
libarchive: null pointer dereference in bsdunzip.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1632
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-02-24 14:15 修改: 2025-03-25 15:41
|
| libarchive |
CVE-2025-5915 |
低危 |
3.5.3-9.el9_7 |
|
libarchive: Heap buffer over read in copy_from_lzss_window() at archive_read_support_format_rar.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5915
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-06-09 20:15 修改: 2026-01-08 04:15
|
| libarchive |
CVE-2025-5916 |
低危 |
3.5.3-9.el9_7 |
|
libarchive: Integer overflow while reading warc files at archive_read_support_format_warc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5916
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-06-09 20:15 修改: 2025-12-12 01:15
|
| libarchive |
CVE-2025-5917 |
低危 |
3.5.3-9.el9_7 |
|
libarchive: Off by one error in build_ustar_entry_name() at archive_write_set_format_pax.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5917
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-06-09 20:15 修改: 2025-12-12 01:15
|
| libarchive |
CVE-2025-5918 |
低危 |
3.5.3-9.el9_7 |
|
libarchive: Reading past EOF may be triggered for piped file streams
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5918
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-06-09 20:15 修改: 2025-08-15 18:35
|
| libatomic |
CVE-2022-27943 |
低危 |
11.5.0-11.el9 |
|
binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27943
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2022-03-26 13:15 修改: 2024-11-21 06:56
|
| glib2 |
CVE-2025-7039 |
低危 |
2.68.4-18.el9_7.1 |
|
glib: Buffer Under-read on GLib through glib/gfileutils.c via get_tmp_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7039
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-09-03 02:15 修改: 2026-04-15 00:35
|
| openssl-libs |
CVE-2024-13176 |
低危 |
1:3.5.1-7.el9_7 |
|
openssl: Timing side-channel in ECDSA signature computation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-13176
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-01-20 14:15 修改: 2026-04-15 00:35
|
| openssl-libs |
CVE-2024-41996 |
低危 |
1:3.5.1-7.el9_7 |
|
openssl: remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41996
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2024-08-26 06:15 修改: 2026-05-12 12:17
|
| openssl-libs |
CVE-2025-9232 |
低危 |
1:3.5.1-7.el9_7 |
|
openssl: Out-of-bounds read in HTTP client no_proxy handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9232
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2025-09-30 14:15 修改: 2026-05-12 13:17
|
| openssl-libs |
CVE-2026-28387 |
低危 |
1:3.5.1-7.el9_7 |
|
openssl: OpenSSL: Arbitrary code execution due to use-after-free in DANE TLSA authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28387
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| openssl-libs |
CVE-2026-28388 |
低危 |
1:3.5.1-7.el9_7 |
|
openssl: OpenSSL: Denial of Service due to NULL pointer dereference in delta CRL processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28388
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| openssl-libs |
CVE-2026-28389 |
低危 |
1:3.5.1-7.el9_7 |
|
openssl: OpenSSL: Denial of Service vulnerability in CMS processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28389
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| openssl-libs |
CVE-2026-31789 |
低危 |
1:3.5.1-7.el9_7 |
|
openssl: OpenSSL: Heap buffer overflow on 32-bit systems from large X.509 certificate processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31789
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| glib2 |
CVE-2026-0988 |
低危 |
2.68.4-18.el9_7.1 |
|
glib: GLib: Denial of Service via Integer Overflow in g_buffered_input_stream_peek()
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0988
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-21 12:15 修改: 2026-04-24 21:16
|
| glib2 |
CVE-2026-1485 |
低危 |
2.68.4-18.el9_7.1 |
|
Glib: Glib: Local denial of service via buffer underflow in content type parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-1485
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-27 14:15 修改: 2026-04-15 00:35
|
| pcre2 |
CVE-2022-41409 |
低危 |
10.40-6.el9 |
|
pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2023-07-18 14:15 修改: 2024-11-21 07:23
|
| pcre2-syntax |
CVE-2022-41409 |
低危 |
10.40-6.el9 |
|
pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2023-07-18 14:15 修改: 2024-11-21 07:23
|
| sqlite-libs |
CVE-2024-0232 |
低危 |
3.34.1-9.el9_7 |
|
sqlite: use-after-free bug in jsonParseAddNodeArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0232
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2024-01-16 14:15 修改: 2024-11-21 08:46
|
| sqlite-libs |
CVE-2025-70873 |
低危 |
3.34.1-9.el9_7 |
|
sqlite: SQLite: Information Disclosure via Crafted ZIP File
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-70873
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-12 19:16 修改: 2026-04-16 21:15
|
| curl-minimal |
CVE-2025-14819 |
低危 |
7.76.1-35.el9_7.3 |
|
curl: libcurl: Improper certificate validation due to cached TLS settings reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14819
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:51
|
| glibc-minimal-langpack |
CVE-2026-4438 |
低危 |
2.34-231.el9_7.10 |
|
glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4438
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:40
|
| zlib |
CVE-2026-27171 |
低危 |
1.2.11-40.el9 |
|
zlib: zlib: Denial of Service via infinite loop in CRC32 combine functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27171
镜像层: sha256:8e41b1ff54809ea55741dfd1f0f244aa2e6a4683b9f3a5fec2af385e81e41538
发布日期: 2026-02-18 04:16 修改: 2026-03-25 21:27
|