| libcrypto3 |
CVE-2025-15467 |
严重 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15467
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-07 18:12
|
| libcrypto3 |
CVE-2026-31789 |
严重 |
3.5.1-r0 |
3.5.6-r0 |
openssl: OpenSSL: Heap buffer overflow on 32-bit systems from large X.509 certificate processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31789
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2025-15467 |
严重 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15467
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-07 18:12
|
| libssl3 |
CVE-2026-31789 |
严重 |
3.5.1-r0 |
3.5.6-r0 |
openssl: OpenSSL: Heap buffer overflow on 32-bit systems from large X.509 certificate processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31789
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-28387 |
高危 |
3.5.1-r0 |
3.5.6-r0 |
openssl: OpenSSL: Arbitrary code execution due to use-after-free in DANE TLSA authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28387
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-28388 |
高危 |
3.5.1-r0 |
3.5.6-r0 |
openssl: OpenSSL: Denial of Service due to NULL pointer dereference in delta CRL processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28388
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-28389 |
高危 |
3.5.1-r0 |
3.5.6-r0 |
openssl: OpenSSL: Denial of Service vulnerability in CMS processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28389
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-28390 |
高危 |
3.5.1-r0 |
3.5.6-r0 |
openssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28390
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libexpat |
CVE-2026-25210 |
高危 |
2.7.3-r0 |
2.7.4-r0 |
libexpat: libexpat: Information disclosure and data integrity issues due to integer overflow in buffer reallocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-25210
镜像层: sha256:724d71f960e8907fa4140ee823b72694db7e6385519b39702f4876dad82584cd
发布日期: 2026-01-30 07:16 修改: 2026-03-10 18:17
|
| libcrypto3 |
CVE-2025-69419 |
高危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69419
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2025-69421 |
高危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69421
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2025-69419 |
高危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69419
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2025-69421 |
高危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69421
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-28387 |
高危 |
3.5.1-r0 |
3.5.6-r0 |
openssl: OpenSSL: Arbitrary code execution due to use-after-free in DANE TLSA authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28387
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-28388 |
高危 |
3.5.1-r0 |
3.5.6-r0 |
openssl: OpenSSL: Denial of Service due to NULL pointer dereference in delta CRL processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28388
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-28389 |
高危 |
3.5.1-r0 |
3.5.6-r0 |
openssl: OpenSSL: Denial of Service vulnerability in CMS processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28389
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-28390 |
高危 |
3.5.1-r0 |
3.5.6-r0 |
openssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28390
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| musl |
CVE-2026-40200 |
高危 |
1.2.5-r10 |
1.2.5-r12 |
musl: musl libc: Arbitrary code execution and denial of service via stack-based memory corruption in qsort
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40200
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-10 17:17 修改: 2026-04-27 19:18
|
| musl-utils |
CVE-2026-40200 |
高危 |
1.2.5-r10 |
1.2.5-r12 |
musl: musl libc: Arbitrary code execution and denial of service via stack-based memory corruption in qsort
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40200
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-10 17:17 修改: 2026-04-27 19:18
|
| nghttp2-libs |
CVE-2026-27135 |
高危 |
1.65.0-r0 |
1.68.1 |
nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27135
镜像层: sha256:724d71f960e8907fa4140ee823b72694db7e6385519b39702f4876dad82584cd
发布日期: 2026-03-18 18:16 修改: 2026-03-23 17:51
|
| zlib |
CVE-2026-22184 |
高危 |
1.3.1-r2 |
1.3.2-r0 |
zlib: zlib: Arbitrary code execution via buffer overflow in untgz utility
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22184
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-07 21:16 修改: 2026-03-18 16:26
|
| libcrypto3 |
CVE-2026-22796 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22796
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-2673 |
中危 |
3.5.1-r0 |
3.5.6-r0 |
openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-2673
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-03-13 19:54 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-31790 |
中危 |
3.5.1-r0 |
3.5.6-r0 |
openssl: openssl: Information Disclosure from Uninitialized Memory via Invalid RSA Public Key
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31790
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| c-ares |
CVE-2025-62408 |
中危 |
1.34.5-r0 |
1.34.6-r0 |
c-ares: c-ares: Denial of Service due to query termination after maximum attempts
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-62408
镜像层: sha256:724d71f960e8907fa4140ee823b72694db7e6385519b39702f4876dad82584cd
发布日期: 2025-12-08 22:15 修改: 2026-02-02 14:40
|
| libexpat |
CVE-2026-32776 |
中危 |
2.7.3-r0 |
2.7.5-r0 |
libexpat: libexpat: Denial of Service due to NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32776
镜像层: sha256:724d71f960e8907fa4140ee823b72694db7e6385519b39702f4876dad82584cd
发布日期: 2026-03-16 14:19 修改: 2026-03-17 15:52
|
| libexpat |
CVE-2026-32777 |
中危 |
2.7.3-r0 |
2.7.5-r0 |
libexpat: libexpat: Denial of Service via infinite loop in DTD content parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32777
镜像层: sha256:724d71f960e8907fa4140ee823b72694db7e6385519b39702f4876dad82584cd
发布日期: 2026-03-16 14:19 修改: 2026-03-17 15:52
|
| libexpat |
CVE-2026-32778 |
中危 |
2.7.3-r0 |
2.7.5-r0 |
libexpat: libexpat: Denial of Service via NULL pointer dereference after out-of-memory condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32778
镜像层: sha256:724d71f960e8907fa4140ee823b72694db7e6385519b39702f4876dad82584cd
发布日期: 2026-03-16 14:19 修改: 2026-03-17 15:52
|
| busybox |
CVE-2024-58251 |
中危 |
1.37.0-r18 |
1.37.0-r20 |
In netstat in BusyBox through 1.37.0, local users can launch of networ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58251
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2025-04-23 18:16 修改: 2026-04-15 00:35
|
| busybox-binsh |
CVE-2024-58251 |
中危 |
1.37.0-r18 |
1.37.0-r20 |
In netstat in BusyBox through 1.37.0, local users can launch of networ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58251
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2025-04-23 18:16 修改: 2026-04-15 00:35
|
| libcrypto3 |
CVE-2025-11187 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11187
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-03-20 14:16
|
| libcrypto3 |
CVE-2025-15468 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15468
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-02-02 18:38
|
| libcrypto3 |
CVE-2025-15469 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15469
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-02-02 18:37
|
| libcrypto3 |
CVE-2025-66199 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66199
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-02-02 18:37
|
| libcrypto3 |
CVE-2025-68160 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68160
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2025-69418 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69418
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2025-11187 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11187
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-03-20 14:16
|
| libssl3 |
CVE-2025-15468 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15468
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-02-02 18:38
|
| libssl3 |
CVE-2025-15469 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15469
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-02-02 18:37
|
| libssl3 |
CVE-2025-66199 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66199
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-02-02 18:37
|
| libssl3 |
CVE-2025-68160 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68160
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2025-69418 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69418
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2025-69420 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via malformed TimeStamp Response
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69420
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2025-9230 |
中危 |
3.5.1-r0 |
3.5.4-r0 |
openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9230
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2025-09-30 14:15 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2025-9231 |
中危 |
3.5.1-r0 |
3.5.4-r0 |
openssl: Timing side-channel in SM2 algorithm on 64 bit ARM
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9231
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2025-09-30 14:15 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-22795 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22795
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-22796 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22796
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-2673 |
中危 |
3.5.1-r0 |
3.5.6-r0 |
openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-2673
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-03-13 19:54 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-31790 |
中危 |
3.5.1-r0 |
3.5.6-r0 |
openssl: openssl: Information Disclosure from Uninitialized Memory via Invalid RSA Public Key
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31790
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2025-69420 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via malformed TimeStamp Response
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69420
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| musl |
CVE-2026-6042 |
中危 |
1.2.5-r10 |
1.2.5-r11 |
musl libc: GB18030 4-byte Decoder: musl libc: Denial of Service via inefficient algorithmic complexity in iconv
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6042
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-10 09:16 修改: 2026-04-24 18:01
|
| libcrypto3 |
CVE-2025-9230 |
中危 |
3.5.1-r0 |
3.5.4-r0 |
openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9230
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2025-09-30 14:15 修改: 2026-05-12 13:17
|
| musl-utils |
CVE-2026-6042 |
中危 |
1.2.5-r10 |
1.2.5-r11 |
musl libc: GB18030 4-byte Decoder: musl libc: Denial of Service via inefficient algorithmic complexity in iconv
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6042
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-04-10 09:16 修改: 2026-04-24 18:01
|
| libcrypto3 |
CVE-2025-9231 |
中危 |
3.5.1-r0 |
3.5.4-r0 |
openssl: Timing side-channel in SM2 algorithm on 64 bit ARM
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9231
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2025-09-30 14:15 修改: 2026-05-12 13:17
|
| ssl_client |
CVE-2024-58251 |
中危 |
1.37.0-r18 |
1.37.0-r20 |
In netstat in BusyBox through 1.37.0, local users can launch of networ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58251
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2025-04-23 18:16 修改: 2026-04-15 00:35
|
| libcrypto3 |
CVE-2026-22795 |
中危 |
3.5.1-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22795
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| zlib |
CVE-2026-27171 |
中危 |
1.3.1-r2 |
1.3.2-r0 |
zlib: zlib: Denial of Service via infinite loop in CRC32 combine functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27171
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2026-02-18 04:16 修改: 2026-03-25 21:27
|
| busybox-binsh |
CVE-2025-46394 |
低危 |
1.37.0-r18 |
1.37.0-r20 |
In tar in BusyBox through 1.37.0, a TAR archive can have filenames hid ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-46394
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2025-04-23 16:15 修改: 2025-09-24 14:38
|
| libssl3 |
CVE-2025-9232 |
低危 |
3.5.1-r0 |
3.5.4-r0 |
openssl: Out-of-bounds read in HTTP client no_proxy handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9232
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2025-09-30 14:15 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2025-9232 |
低危 |
3.5.1-r0 |
3.5.4-r0 |
openssl: Out-of-bounds read in HTTP client no_proxy handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9232
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2025-09-30 14:15 修改: 2026-05-12 13:17
|
| ssl_client |
CVE-2025-46394 |
低危 |
1.37.0-r18 |
1.37.0-r20 |
In tar in BusyBox through 1.37.0, a TAR archive can have filenames hid ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-46394
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2025-04-23 16:15 修改: 2025-09-24 14:38
|
| busybox |
CVE-2025-46394 |
低危 |
1.37.0-r18 |
1.37.0-r20 |
In tar in BusyBox through 1.37.0, a TAR archive can have filenames hid ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-46394
镜像层: sha256:418dccb7d85a63a6aa574439840f7a6fa6fd2321b3e2394568a317735e867d35
发布日期: 2025-04-23 16:15 修改: 2025-09-24 14:38
|
| libexpat |
CVE-2026-24515 |
低危 |
2.7.3-r0 |
2.7.4-r0 |
libexpat: libexpat null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-24515
镜像层: sha256:724d71f960e8907fa4140ee823b72694db7e6385519b39702f4876dad82584cd
发布日期: 2026-01-23 08:16 修改: 2026-02-05 17:27
|