| libexpat | CVE-2024-45491 | 严重 | 2.5.0-r2 | 2.6.3-r0 | libexpat: Integer Overflow or Wraparound 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28 | 
                            
                            
                                | libexpat | CVE-2024-45492 | 严重 | 2.5.0-r2 | 2.6.3-r0 | libexpat: integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28 | 
                            
                            
                                | xz | CVE-2024-3094 | 严重 | 5.4.5-r0 | 5.6.1-r2 | xz: malicious code in distributed source 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3094 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-29 17:15 修改: 2024-05-01 19:15 | 
                            
                            
                                | xz-libs | CVE-2024-3094 | 严重 | 5.4.5-r0 | 5.6.1-r2 | xz: malicious code in distributed source 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3094 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-29 17:15 修改: 2024-05-01 19:15 | 
                            
                            
                                | ghostscript | CVE-2024-33871 | 高危 | 10.02.1-r0 | 10.03.1-r0 | ghostscript: OPVP device arbitrary code execution via custom Driver library 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33871 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-07-03 19:15 修改: 2024-07-08 14:18 | 
                            
                            
                                | ghostscript | CVE-2024-46951 | 高危 | 10.02.1-r0 | 10.04.0-r0 | ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46951 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-11-10 21:15 修改: 2024-11-14 02:13 | 
                            
                            
                                | ghostscript | CVE-2024-46952 | 高危 | 10.02.1-r0 | 10.04.0-r0 | ghostscript: Buffer Overflow in Ghostscript PDF XRef Stream Handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46952 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-11-10 22:15 修改: 2024-11-14 02:01 | 
                            
                            
                                | ghostscript | CVE-2024-46953 | 高危 | 10.02.1-r0 | 10.04.0-r0 | ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46953 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-11-10 22:15 修改: 2024-11-14 02:01 | 
                            
                            
                                | ghostscript | CVE-2024-46954 | 高危 | 10.02.1-r0 | 10.04.0-r0 | ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46954 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-11-10 22:15 修改: 2024-11-14 01:58 | 
                            
                            
                                | ghostscript | CVE-2024-46956 | 高危 | 10.02.1-r0 | 10.04.0-r0 | ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46956 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-11-10 22:15 修改: 2024-11-14 20:39 | 
                            
                            
                                | gnutls | CVE-2024-0553 | 高危 | 3.8.1-r0 | 3.8.3-r0 | gnutls: incomplete fix for CVE-2023-5981 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0553 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-01-16 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | gnutls | CVE-2024-0567 | 高危 | 3.8.1-r0 | 3.8.3-r0 | gnutls: rejects certificate chain with distributed trust 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0567 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-01-16 14:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | gnutls-c++ | CVE-2024-0553 | 高危 | 3.8.1-r0 | 3.8.3-r0 | gnutls: incomplete fix for CVE-2023-5981 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0553 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-01-16 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | gnutls-c++ | CVE-2024-0567 | 高危 | 3.8.1-r0 | 3.8.3-r0 | gnutls: rejects certificate chain with distributed trust 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0567 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-01-16 14:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | gnutls-dev | CVE-2024-0553 | 高危 | 3.8.1-r0 | 3.8.3-r0 | gnutls: incomplete fix for CVE-2023-5981 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0553 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-01-16 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | gnutls-dev | CVE-2024-0567 | 高危 | 3.8.1-r0 | 3.8.3-r0 | gnutls: rejects certificate chain with distributed trust 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0567 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-01-16 14:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | libblkid | CVE-2024-28085 | 高危 | 2.39.3-r0 | 2.40-r0 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | cups | CVE-2024-47175 | 高危 | 2.4.7-r0 | 2.4.10-r1 | cups: libppd: remote command injection via attacker controlled data in PPD file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47175 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-09-26 22:15 修改: 2024-09-30 12:46 | 
                            
                            
                                | cups-client | CVE-2024-47175 | 高危 | 2.4.7-r0 | 2.4.10-r1 | cups: libppd: remote command injection via attacker controlled data in PPD file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47175 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-09-26 22:15 修改: 2024-09-30 12:46 | 
                            
                            
                                | libexpat | CVE-2023-52425 | 高危 | 2.5.0-r2 | 2.6.0-r0 | expat: parsing large tokens can trigger a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-02-04 20:15 修改: 2024-08-26 20:35 | 
                            
                            
                                | libexpat | CVE-2024-28757 | 高危 | 2.5.0-r2 | 2.6.2-r0 | expat: XML Entity Expansion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28757 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-10 05:15 修改: 2024-05-01 19:15 | 
                            
                            
                                | libexpat | CVE-2024-45490 | 高危 | 2.5.0-r2 | 2.6.3-r0 | libexpat: Negative Length Parsing Vulnerability in libexpat 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24 | 
                            
                            
                                | libfdisk | CVE-2024-28085 | 高危 | 2.39.3-r0 | 2.40-r0 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | libmount | CVE-2024-28085 | 高危 | 2.39.3-r0 | 2.40-r0 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | libsmartcols | CVE-2024-28085 | 高危 | 2.39.3-r0 | 2.40-r0 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | libuuid | CVE-2024-28085 | 高危 | 2.39.3-r0 | 2.40-r0 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | libxml2 | CVE-2024-25062 | 高危 | 2.11.6-r0 | 2.12.5-r0 | libxml2: use-after-free in XMLReader 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25062 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-02-04 16:15 修改: 2024-02-13 00:40 | 
                            
                            
                                | libxml2-utils | CVE-2024-25062 | 高危 | 2.11.6-r0 | 2.12.5-r0 | libxml2: use-after-free in XMLReader 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25062 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-02-04 16:15 修改: 2024-02-13 00:40 | 
                            
                            
                                | pyc | CVE-2024-12254 | 高危 | 3.11.6-r1 | 3.12.8-r1 | python: Unbounded memory buffering in SelectorSocketTransport.writelines() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12254 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-12-06 16:15 修改: 2025-01-06 18:15 | 
                            
                            
                                | pyc | CVE-2024-6232 | 高危 | 3.11.6-r1 | 3.12.6-r0 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | pyc | CVE-2024-7592 | 高危 | 3.11.6-r1 | 3.12.6-r0 | cpython: python: Uncontrolled CPU resource consumption when in http.cookies module 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-19 19:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python3 | CVE-2024-12254 | 高危 | 3.11.6-r1 | 3.12.8-r1 | python: Unbounded memory buffering in SelectorSocketTransport.writelines() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12254 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-12-06 16:15 修改: 2025-01-06 18:15 | 
                            
                            
                                | python3 | CVE-2024-6232 | 高危 | 3.11.6-r1 | 3.12.6-r0 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python3 | CVE-2024-7592 | 高危 | 3.11.6-r1 | 3.12.6-r0 | cpython: python: Uncontrolled CPU resource consumption when in http.cookies module 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-19 19:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python3-dev | CVE-2024-12254 | 高危 | 3.11.6-r1 | 3.12.8-r1 | python: Unbounded memory buffering in SelectorSocketTransport.writelines() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12254 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-12-06 16:15 修改: 2025-01-06 18:15 | 
                            
                            
                                | python3-dev | CVE-2024-6232 | 高危 | 3.11.6-r1 | 3.12.6-r0 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python3-dev | CVE-2024-7592 | 高危 | 3.11.6-r1 | 3.12.6-r0 | cpython: python: Uncontrolled CPU resource consumption when in http.cookies module 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-19 19:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python3-pyc | CVE-2024-12254 | 高危 | 3.11.6-r1 | 3.12.8-r1 | python: Unbounded memory buffering in SelectorSocketTransport.writelines() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12254 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-12-06 16:15 修改: 2025-01-06 18:15 | 
                            
                            
                                | python3-pyc | CVE-2024-6232 | 高危 | 3.11.6-r1 | 3.12.6-r0 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python3-pyc | CVE-2024-7592 | 高危 | 3.11.6-r1 | 3.12.6-r0 | cpython: python: Uncontrolled CPU resource consumption when in http.cookies module 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-19 19:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python3-pycache-pyc0 | CVE-2024-12254 | 高危 | 3.11.6-r1 | 3.12.8-r1 | python: Unbounded memory buffering in SelectorSocketTransport.writelines() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12254 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-12-06 16:15 修改: 2025-01-06 18:15 | 
                            
                            
                                | python3-pycache-pyc0 | CVE-2024-6232 | 高危 | 3.11.6-r1 | 3.12.6-r0 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python3-pycache-pyc0 | CVE-2024-7592 | 高危 | 3.11.6-r1 | 3.12.6-r0 | cpython: python: Uncontrolled CPU resource consumption when in http.cookies module 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-19 19:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | util-linux-dev | CVE-2024-28085 | 高危 | 2.39.3-r0 | 2.40-r0 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | cups-dev | CVE-2024-47175 | 高危 | 2.4.7-r0 | 2.4.10-r1 | cups: libppd: remote command injection via attacker controlled data in PPD file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47175 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-09-26 22:15 修改: 2024-09-30 12:46 | 
                            
                            
                                | cups-libs | CVE-2024-47175 | 高危 | 2.4.7-r0 | 2.4.10-r1 | cups: libppd: remote command injection via attacker controlled data in PPD file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47175 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-09-26 22:15 修改: 2024-09-30 12:46 | 
                            
                            
                                | avahi | CVE-2023-38469 | 中危 | 0.8-r13 | 0.8-r15 | avahi: Reachable assertion in avahi_dns_packet_append_record 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | cups-client | CVE-2024-35235 | 中危 | 2.4.7-r0 | 2.4.9-r0 | cups: Cupsd Listen arbitrary chmod 0140777 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35235 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-06-11 15:16 修改: 2024-06-14 03:15 | 
                            
                            
                                | avahi | CVE-2023-38470 | 中危 | 0.8-r13 | 0.8-r16 | avahi: Reachable assertion in avahi_escape_label 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | cups-dev | CVE-2024-35235 | 中危 | 2.4.7-r0 | 2.4.9-r0 | cups: Cupsd Listen arbitrary chmod 0140777 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35235 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-06-11 15:16 修改: 2024-06-14 03:15 | 
                            
                            
                                | avahi | CVE-2023-38471 | 中危 | 0.8-r13 | 0.8-r15 | avahi: Reachable assertion in dbus_set_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | cups-libs | CVE-2024-35235 | 中危 | 2.4.7-r0 | 2.4.9-r0 | cups: Cupsd Listen arbitrary chmod 0140777 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35235 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-06-11 15:16 修改: 2024-06-14 03:15 | 
                            
                            
                                | avahi | CVE-2023-38472 | 中危 | 0.8-r13 | 0.8-r14 | avahi: Reachable assertion in avahi_rdata_parse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi | CVE-2023-38473 | 中危 | 0.8-r13 | 0.8-r14 | avahi: Reachable assertion in avahi_alternative_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46 | 
                            
                            
                                | avahi-compat-howl | CVE-2023-1981 | 中危 | 0.8-r13 | 0.8-r14 | avahi: avahi-daemon can be crashed via DBus 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1981 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-05-26 18:15 修改: 2023-06-02 19:06 | 
                            
                            
                                | avahi-compat-howl | CVE-2023-38469 | 中危 | 0.8-r13 | 0.8-r15 | avahi: Reachable assertion in avahi_dns_packet_append_record 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-compat-howl | CVE-2023-38470 | 中危 | 0.8-r13 | 0.8-r16 | avahi: Reachable assertion in avahi_escape_label 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-compat-howl | CVE-2023-38471 | 中危 | 0.8-r13 | 0.8-r15 | avahi: Reachable assertion in dbus_set_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | ghostscript | CVE-2023-52722 | 中危 | 10.02.1-r0 | 10.03.1-r0 | ghostscript: eexec seeds other than the Type 1 standard are allowed while using SAFER mode 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52722 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-04-28 00:15 修改: 2024-12-04 21:15 | 
                            
                            
                                | ghostscript | CVE-2024-29510 | 中危 | 10.02.1-r0 | 10.03.1-r0 | ghostscript: format string injection leads to shell command execution (SAFER bypass) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29510 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-07-03 19:15 修改: 2024-07-08 14:18 | 
                            
                            
                                | ghostscript | CVE-2024-33869 | 中危 | 10.02.1-r0 | 10.03.1-r0 | ghostscript: path traversal and command execution due to path reduction 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33869 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-07-03 19:15 修改: 2024-10-31 18:35 | 
                            
                            
                                | ghostscript | CVE-2024-33870 | 中危 | 10.02.1-r0 | 10.03.1-r0 | ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33870 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-07-03 19:15 修改: 2024-11-07 22:35 | 
                            
                            
                                | ghostscript | CVE-2024-46955 | 中危 | 10.02.1-r0 | 10.04.0-r0 | ghostscript: Out-of-Bounds Read in Ghostscript Indexed Color Space 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46955 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-11-10 22:15 修改: 2024-11-14 01:53 | 
                            
                            
                                | avahi-compat-howl | CVE-2023-38472 | 中危 | 0.8-r13 | 0.8-r14 | avahi: Reachable assertion in avahi_rdata_parse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-compat-howl | CVE-2023-38473 | 中危 | 0.8-r13 | 0.8-r14 | avahi: Reachable assertion in avahi_alternative_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46 | 
                            
                            
                                | gnutls | CVE-2023-5981 | 中危 | 3.8.1-r0 | 3.8.3-r0 | gnutls: timing side-channel in the RSA-PSK authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-28 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | gnutls | CVE-2024-28834 | 中危 | 3.8.1-r0 | 3.8.5-r0 | gnutls: vulnerable to Minerva side-channel information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28834 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-21 14:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | gnutls | CVE-2024-28835 | 中危 | 3.8.1-r0 | 3.8.5-r0 | gnutls: potential crash during chain building/verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28835 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-21 06:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | avahi-compat-libdns_sd | CVE-2023-1981 | 中危 | 0.8-r13 | 0.8-r14 | avahi: avahi-daemon can be crashed via DBus 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1981 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-05-26 18:15 修改: 2023-06-02 19:06 | 
                            
                            
                                | avahi-compat-libdns_sd | CVE-2023-38469 | 中危 | 0.8-r13 | 0.8-r15 | avahi: Reachable assertion in avahi_dns_packet_append_record 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | gnutls-c++ | CVE-2023-5981 | 中危 | 3.8.1-r0 | 3.8.3-r0 | gnutls: timing side-channel in the RSA-PSK authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-28 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | gnutls-c++ | CVE-2024-28834 | 中危 | 3.8.1-r0 | 3.8.5-r0 | gnutls: vulnerable to Minerva side-channel information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28834 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-21 14:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | gnutls-c++ | CVE-2024-28835 | 中危 | 3.8.1-r0 | 3.8.5-r0 | gnutls: potential crash during chain building/verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28835 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-21 06:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | avahi-compat-libdns_sd | CVE-2023-38470 | 中危 | 0.8-r13 | 0.8-r16 | avahi: Reachable assertion in avahi_escape_label 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-compat-libdns_sd | CVE-2023-38471 | 中危 | 0.8-r13 | 0.8-r15 | avahi: Reachable assertion in dbus_set_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | gnutls-dev | CVE-2023-5981 | 中危 | 3.8.1-r0 | 3.8.3-r0 | gnutls: timing side-channel in the RSA-PSK authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-28 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | gnutls-dev | CVE-2024-28834 | 中危 | 3.8.1-r0 | 3.8.5-r0 | gnutls: vulnerable to Minerva side-channel information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28834 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-21 14:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | gnutls-dev | CVE-2024-28835 | 中危 | 3.8.1-r0 | 3.8.5-r0 | gnutls: potential crash during chain building/verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28835 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-21 06:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | avahi-compat-libdns_sd | CVE-2023-38472 | 中危 | 0.8-r13 | 0.8-r14 | avahi: Reachable assertion in avahi_rdata_parse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libcrypto3 | CVE-2023-6129 | 中危 | 3.1.4-r2 | 3.1.4-r3 | openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6129 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-01-09 17:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libcrypto3 | CVE-2023-6237 | 中危 | 3.1.4-r2 | 3.1.4-r4 | openssl: Excessive time spent checking invalid RSA public keys 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6237 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-04-25 07:15 修改: 2024-11-01 15:35 | 
                            
                            
                                | libcrypto3 | CVE-2024-0727 | 中危 | 3.1.4-r2 | 3.1.4-r5 | openssl: denial of service via null dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libcrypto3 | CVE-2024-4603 | 中危 | 3.1.4-r2 | 3.3.0-r2 | openssl: Excessive time spent checking DSA keys and parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4603 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-05-16 16:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libcrypto3 | CVE-2024-4741 | 中危 | 3.1.4-r2 | 3.3.0-r3 | openssl: Use After Free with SSL_free_buffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01 | 
                            
                            
                                | libcrypto3 | CVE-2024-5535 | 中危 | 3.1.4-r2 | 3.3.1-r1 | openssl: SSL_select_next_proto buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15 | 
                            
                            
                                | libcrypto3 | CVE-2024-6119 | 中危 | 3.1.4-r2 | 3.3.2-r0 | openssl: Possible denial of service in X.509 name checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35 | 
                            
                            
                                | avahi-compat-libdns_sd | CVE-2023-38473 | 中危 | 0.8-r13 | 0.8-r14 | avahi: Reachable assertion in avahi_alternative_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46 | 
                            
                            
                                | avahi-dev | CVE-2023-1981 | 中危 | 0.8-r13 | 0.8-r14 | avahi: avahi-daemon can be crashed via DBus 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1981 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-05-26 18:15 修改: 2023-06-02 19:06 | 
                            
                            
                                | avahi-dev | CVE-2023-38469 | 中危 | 0.8-r13 | 0.8-r15 | avahi: Reachable assertion in avahi_dns_packet_append_record 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-dev | CVE-2023-38470 | 中危 | 0.8-r13 | 0.8-r16 | avahi: Reachable assertion in avahi_escape_label 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-dev | CVE-2023-38471 | 中危 | 0.8-r13 | 0.8-r15 | avahi: Reachable assertion in dbus_set_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libexpat | CVE-2023-52426 | 中危 | 2.5.0-r2 | 2.6.0-r0 | expat: recursive XML entity expansion vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52426 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-02-04 20:15 修改: 2024-03-07 17:15 | 
                            
                            
                                | libexpat | CVE-2024-50602 | 中危 | 2.5.0-r2 | 2.6.4-r0 | libexpat: expat: DoS via XML_ResumeParser 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-10-27 05:15 修改: 2024-10-30 18:35 | 
                            
                            
                                | avahi-dev | CVE-2023-38472 | 中危 | 0.8-r13 | 0.8-r14 | avahi: Reachable assertion in avahi_rdata_parse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-dev | CVE-2023-38473 | 中危 | 0.8-r13 | 0.8-r14 | avahi: Reachable assertion in avahi_alternative_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46 | 
                            
                            
                                | avahi-glib | CVE-2023-1981 | 中危 | 0.8-r13 | 0.8-r14 | avahi: avahi-daemon can be crashed via DBus 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1981 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-05-26 18:15 修改: 2023-06-02 19:06 | 
                            
                            
                                | libssl3 | CVE-2023-6129 | 中危 | 3.1.4-r2 | 3.1.4-r3 | openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6129 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-01-09 17:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl3 | CVE-2023-6237 | 中危 | 3.1.4-r2 | 3.1.4-r4 | openssl: Excessive time spent checking invalid RSA public keys 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6237 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-04-25 07:15 修改: 2024-11-01 15:35 | 
                            
                            
                                | libssl3 | CVE-2024-0727 | 中危 | 3.1.4-r2 | 3.1.4-r5 | openssl: denial of service via null dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl3 | CVE-2024-4603 | 中危 | 3.1.4-r2 | 3.3.0-r2 | openssl: Excessive time spent checking DSA keys and parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4603 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-05-16 16:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl3 | CVE-2024-4741 | 中危 | 3.1.4-r2 | 3.3.0-r3 | openssl: Use After Free with SSL_free_buffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01 | 
                            
                            
                                | libssl3 | CVE-2024-5535 | 中危 | 3.1.4-r2 | 3.3.1-r1 | openssl: SSL_select_next_proto buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15 | 
                            
                            
                                | libssl3 | CVE-2024-6119 | 中危 | 3.1.4-r2 | 3.3.2-r0 | openssl: Possible denial of service in X.509 name checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35 | 
                            
                            
                                | avahi-glib | CVE-2023-38469 | 中危 | 0.8-r13 | 0.8-r15 | avahi: Reachable assertion in avahi_dns_packet_append_record 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-glib | CVE-2023-38470 | 中危 | 0.8-r13 | 0.8-r16 | avahi: Reachable assertion in avahi_escape_label 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libxml2 | CVE-2024-34459 | 中危 | 2.11.6-r0 | 2.12.7-r0 | libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-05-14 15:39 修改: 2024-08-22 18:35 | 
                            
                            
                                | avahi-glib | CVE-2023-38471 | 中危 | 0.8-r13 | 0.8-r15 | avahi: Reachable assertion in dbus_set_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libxml2-utils | CVE-2024-34459 | 中危 | 2.11.6-r0 | 2.12.7-r0 | libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-05-14 15:39 修改: 2024-08-22 18:35 | 
                            
                            
                                | nss | CVE-2023-5388 | 中危 | 3.94-r0 | 3.98-r0 | nss: timing attack against RSA decryption 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5388 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-03-19 12:15 修改: 2024-11-14 22:35 | 
                            
                            
                                | openssl | CVE-2023-6129 | 中危 | 3.1.4-r2 | 3.1.4-r3 | openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6129 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-01-09 17:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | openssl | CVE-2023-6237 | 中危 | 3.1.4-r2 | 3.1.4-r4 | openssl: Excessive time spent checking invalid RSA public keys 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6237 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-04-25 07:15 修改: 2024-11-01 15:35 | 
                            
                            
                                | openssl | CVE-2024-0727 | 中危 | 3.1.4-r2 | 3.1.4-r5 | openssl: denial of service via null dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | openssl | CVE-2024-4603 | 中危 | 3.1.4-r2 | 3.3.0-r2 | openssl: Excessive time spent checking DSA keys and parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4603 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-05-16 16:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | openssl | CVE-2024-4741 | 中危 | 3.1.4-r2 | 3.3.0-r3 | openssl: Use After Free with SSL_free_buffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01 | 
                            
                            
                                | openssl | CVE-2024-5535 | 中危 | 3.1.4-r2 | 3.3.1-r1 | openssl: SSL_select_next_proto buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15 | 
                            
                            
                                | openssl | CVE-2024-6119 | 中危 | 3.1.4-r2 | 3.3.2-r0 | openssl: Possible denial of service in X.509 name checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35 | 
                            
                            
                                | avahi-glib | CVE-2023-38472 | 中危 | 0.8-r13 | 0.8-r14 | avahi: Reachable assertion in avahi_rdata_parse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-glib | CVE-2023-38473 | 中危 | 0.8-r13 | 0.8-r14 | avahi: Reachable assertion in avahi_alternative_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46 | 
                            
                            
                                | avahi-libs | CVE-2023-1981 | 中危 | 0.8-r13 | 0.8-r14 | avahi: avahi-daemon can be crashed via DBus 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1981 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-05-26 18:15 修改: 2023-06-02 19:06 | 
                            
                            
                                | pyc | CVE-2023-27043 | 中危 | 3.11.6-r1 | 3.12.6-r0 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | pyc | CVE-2024-6923 | 中危 | 3.11.6-r1 | 3.12.5-r0 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | pyc | CVE-2024-8088 | 中危 | 3.11.6-r1 | 3.12.5-r1 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | pyc | CVE-2024-9287 | 中危 | 3.11.6-r1 | 3.12.8-r0 | python: Virtual environment (venv) activation scripts don't quote paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15 | 
                            
                            
                                | avahi-libs | CVE-2023-38469 | 中危 | 0.8-r13 | 0.8-r15 | avahi: Reachable assertion in avahi_dns_packet_append_record 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-libs | CVE-2023-38470 | 中危 | 0.8-r13 | 0.8-r16 | avahi: Reachable assertion in avahi_escape_label 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-libs | CVE-2023-38471 | 中危 | 0.8-r13 | 0.8-r15 | avahi: Reachable assertion in dbus_set_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | python3 | CVE-2023-27043 | 中危 | 3.11.6-r1 | 3.12.6-r0 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python3 | CVE-2024-6923 | 中危 | 3.11.6-r1 | 3.12.5-r0 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python3 | CVE-2024-8088 | 中危 | 3.11.6-r1 | 3.12.5-r1 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | python3 | CVE-2024-9287 | 中危 | 3.11.6-r1 | 3.12.8-r0 | python: Virtual environment (venv) activation scripts don't quote paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15 | 
                            
                            
                                | avahi-libs | CVE-2023-38472 | 中危 | 0.8-r13 | 0.8-r14 | avahi: Reachable assertion in avahi_rdata_parse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-libs | CVE-2023-38473 | 中危 | 0.8-r13 | 0.8-r14 | avahi: Reachable assertion in avahi_alternative_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46 | 
                            
                            
                                | busybox | CVE-2023-42363 | 中危 | 1.36.1-r15 | 1.36.1-r27 | busybox: use-after-free in awk 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42363 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2023-11-27 22:15 修改: 2023-11-30 05:06 | 
                            
                            
                                | python3-dev | CVE-2023-27043 | 中危 | 3.11.6-r1 | 3.12.6-r0 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python3-dev | CVE-2024-6923 | 中危 | 3.11.6-r1 | 3.12.5-r0 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python3-dev | CVE-2024-8088 | 中危 | 3.11.6-r1 | 3.12.5-r1 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | python3-dev | CVE-2024-9287 | 中危 | 3.11.6-r1 | 3.12.8-r0 | python: Virtual environment (venv) activation scripts don't quote paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15 | 
                            
                            
                                | busybox | CVE-2023-42364 | 中危 | 1.36.1-r15 | 1.36.1-r30 | busybox: use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42364 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2023-11-27 23:15 修改: 2024-10-11 21:36 | 
                            
                            
                                | busybox | CVE-2023-42365 | 中危 | 1.36.1-r15 | 1.36.1-r30 | busybox: use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42365 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2023-11-27 23:15 修改: 2023-11-30 05:08 | 
                            
                            
                                | busybox | CVE-2023-42366 | 中危 | 1.36.1-r15 | 1.36.1-r25 | busybox: A heap-buffer-overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42366 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2023-11-27 23:15 修改: 2024-12-06 14:15 | 
                            
                            
                                | python3-pyc | CVE-2023-27043 | 中危 | 3.11.6-r1 | 3.12.6-r0 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python3-pyc | CVE-2024-6923 | 中危 | 3.11.6-r1 | 3.12.5-r0 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python3-pyc | CVE-2024-8088 | 中危 | 3.11.6-r1 | 3.12.5-r1 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | python3-pyc | CVE-2024-9287 | 中危 | 3.11.6-r1 | 3.12.8-r0 | python: Virtual environment (venv) activation scripts don't quote paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15 | 
                            
                            
                                | busybox-binsh | CVE-2023-42363 | 中危 | 1.36.1-r15 | 1.36.1-r27 | busybox: use-after-free in awk 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42363 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2023-11-27 22:15 修改: 2023-11-30 05:06 | 
                            
                            
                                | busybox-binsh | CVE-2023-42364 | 中危 | 1.36.1-r15 | 1.36.1-r30 | busybox: use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42364 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2023-11-27 23:15 修改: 2024-10-11 21:36 | 
                            
                            
                                | busybox-binsh | CVE-2023-42365 | 中危 | 1.36.1-r15 | 1.36.1-r30 | busybox: use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42365 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2023-11-27 23:15 修改: 2023-11-30 05:08 | 
                            
                            
                                | python3-pycache-pyc0 | CVE-2023-27043 | 中危 | 3.11.6-r1 | 3.12.6-r0 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python3-pycache-pyc0 | CVE-2024-6923 | 中危 | 3.11.6-r1 | 3.12.5-r0 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python3-pycache-pyc0 | CVE-2024-8088 | 中危 | 3.11.6-r1 | 3.12.5-r1 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | python3-pycache-pyc0 | CVE-2024-9287 | 中危 | 3.11.6-r1 | 3.12.8-r0 | python: Virtual environment (venv) activation scripts don't quote paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15 | 
                            
                            
                                | qpdf-libs | CVE-2024-24246 | 中危 | 11.6.3-r0 | 11.9.1-r0 | qpdf: Heap Buffer Overflow vulnerability in qpdf 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24246 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-02-29 20:15 修改: 2024-08-09 15:35 | 
                            
                            
                                | ssl_client | CVE-2023-42363 | 中危 | 1.36.1-r15 | 1.36.1-r27 | busybox: use-after-free in awk 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42363 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2023-11-27 22:15 修改: 2023-11-30 05:06 | 
                            
                            
                                | ssl_client | CVE-2023-42364 | 中危 | 1.36.1-r15 | 1.36.1-r30 | busybox: use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42364 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2023-11-27 23:15 修改: 2024-10-11 21:36 | 
                            
                            
                                | ssl_client | CVE-2023-42365 | 中危 | 1.36.1-r15 | 1.36.1-r30 | busybox: use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42365 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2023-11-27 23:15 修改: 2023-11-30 05:08 | 
                            
                            
                                | ssl_client | CVE-2023-42366 | 中危 | 1.36.1-r15 | 1.36.1-r25 | busybox: A heap-buffer-overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42366 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2023-11-27 23:15 修改: 2024-12-06 14:15 | 
                            
                            
                                | busybox-binsh | CVE-2023-42366 | 中危 | 1.36.1-r15 | 1.36.1-r25 | busybox: A heap-buffer-overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42366 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2023-11-27 23:15 修改: 2024-12-06 14:15 | 
                            
                            
                                | wget | CVE-2024-10524 | 中危 | 1.21.4-r0 | 1.25.0-r0 | wget: GNU Wget is vulnerable to an SSRF attack when accessing partially-user-controlled shorthand URLs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10524 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-11-19 15:15 修改: 2024-11-19 21:57 | 
                            
                            
                                | avahi | CVE-2023-1981 | 中危 | 0.8-r13 | 0.8-r14 | avahi: avahi-daemon can be crashed via DBus 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1981 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2023-05-26 18:15 修改: 2023-06-02 19:06 | 
                            
                            
                                | cups | CVE-2024-35235 | 中危 | 2.4.7-r0 | 2.4.9-r0 | cups: Cupsd Listen arbitrary chmod 0140777 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35235 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-06-11 15:16 修改: 2024-06-14 03:15 | 
                            
                            
                                | libssl3 | CVE-2024-9143 | 低危 | 3.1.4-r2 | 3.3.2-r3 | openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35 | 
                            
                            
                                | glib | CVE-2024-34397 | 低危 | 2.78.3-r0 | 2.80.1-r0 | glib2: Signal subscription vulnerabilities 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34397 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-05-07 18:15 修改: 2024-11-15 18:35 | 
                            
                            
                                | python3 | CVE-2024-4032 | 低危 | 3.11.6-r1 | 3.12.6-r0 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | python3-pycache-pyc0 | CVE-2024-4032 | 低危 | 3.11.6-r1 | 3.12.6-r0 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | openssl | CVE-2024-2511 | 低危 | 3.1.4-r2 | 3.2.1-r2 | openssl: Unbounded memory growth with session handling in TLSv1.3 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | pyc | CVE-2024-4032 | 低危 | 3.11.6-r1 | 3.12.6-r0 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | openssl | CVE-2024-9143 | 低危 | 3.1.4-r2 | 3.3.2-r3 | openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35 | 
                            
                            
                                | libcrypto3 | CVE-2024-2511 | 低危 | 3.1.4-r2 | 3.2.1-r2 | openssl: Unbounded memory growth with session handling in TLSv1.3 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | python3-pyc | CVE-2024-4032 | 低危 | 3.11.6-r1 | 3.12.6-r0 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | libcrypto3 | CVE-2024-9143 | 低危 | 3.1.4-r2 | 3.3.2-r3 | openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35 | 
                            
                            
                                | glib-dev | CVE-2024-34397 | 低危 | 2.78.3-r0 | 2.80.1-r0 | glib2: Signal subscription vulnerabilities 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34397 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-05-07 18:15 修改: 2024-11-15 18:35 | 
                            
                            
                                | libssl3 | CVE-2024-2511 | 低危 | 3.1.4-r2 | 3.2.1-r2 | openssl: Unbounded memory growth with session handling in TLSv1.3 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511 镜像层: sha256:5af4f8f59b764c64c6def53f52ada809fe38d528441d08d01c206dfb3fc3b691 发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | python3-dev | CVE-2024-4032 | 低危 | 3.11.6-r1 | 3.12.6-r0 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | python3-pycache-pyc0 | CVE-2015-2104 | 未知 | 3.11.6-r1 | 3.12.6-r0 | 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2104 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2020-02-19 14:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | python3-dev | CVE-2015-2104 | 未知 | 3.11.6-r1 | 3.12.6-r0 | 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2104 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2020-02-19 14:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | pyc | CVE-2015-2104 | 未知 | 3.11.6-r1 | 3.12.6-r0 | 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2104 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2020-02-19 14:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | python3 | CVE-2015-2104 | 未知 | 3.11.6-r1 | 3.12.6-r0 | 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2104 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2020-02-19 14:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | python3-pyc | CVE-2015-2104 | 未知 | 3.11.6-r1 | 3.12.6-r0 | 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2104 镜像层: sha256:4d00a6a7298a0792055c4c5172a91d12bcbd36b8b10c62eae120d71771c04e42 发布日期: 2020-02-19 14:15 修改: 2023-11-07 02:25 |