| curl | CVE-2021-22945 | 严重 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: use-after-free and double-free in MQTT sending 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22945 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-09-23 13:15 修改: 2024-03-27 15:04 | 
                            
                            
                                | curl | CVE-2022-32207 | 严重 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Unpreserved file permissions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32207 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | curl | CVE-2022-32221 | 严重 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u5 | curl: POST following PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32221 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-05 22:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | curl | CVE-2023-23914 | 严重 | 7.74.0-1.3+deb11u1 |  | curl: HSTS ignored on multiple requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23914 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55 | 
                            
                            
                                | curl | CVE-2023-38545 | 严重 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u10 | curl: heap based buffer overflow in the SOCKS5 proxy handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38545 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-18 04:15 修改: 2024-10-17 22:35 | 
                            
                            
                                | git | CVE-2022-23521 | 严重 | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 | git: gitattributes parsing integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23521 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-01-17 23:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git | CVE-2022-41903 | 严重 | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 | git: Heap overflow in `git archive`, `git log --format` leading to RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41903 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-01-17 23:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git | CVE-2024-32002 | 严重 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: Recursive clones RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32002 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git-man | CVE-2022-23521 | 严重 | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 | git: gitattributes parsing integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23521 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-01-17 23:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2022-41903 | 严重 | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 | git: Heap overflow in `git archive`, `git log --format` leading to RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41903 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-01-17 23:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2024-32002 | 严重 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: Recursive clones RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32002 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | gstreamer1.0-plugins-base | CVE-2024-47538 | 严重 | 1.18.4-2 | 1.18.4-2+deb11u3 | gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47538 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-12 02:03 修改: 2024-12-19 22:15 | 
                            
                            
                                | gstreamer1.0-plugins-base | CVE-2024-47600 | 严重 | 1.18.4-2 | 1.18.4-2+deb11u3 | gstreamer1-plugins-base: GStreamer has an OOB-read in format_channel_mask 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47600 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-12 02:03 修改: 2024-12-18 21:43 | 
                            
                            
                                | gstreamer1.0-plugins-base | CVE-2024-47607 | 严重 | 1.18.4-2 | 1.18.4-2+deb11u3 | gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47607 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-12 02:03 修改: 2024-12-18 19:53 | 
                            
                            
                                | gstreamer1.0-plugins-base | CVE-2024-47615 | 严重 | 1.18.4-2 | 1.18.4-2+deb11u3 | gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47615 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-12 02:03 修改: 2024-12-18 19:57 | 
                            
                            
                                | krb5-locales | CVE-2024-37371 | 严重 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libaom0 | CVE-2021-30473 | 严重 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u1 | aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that i ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30473 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-05-06 15:15 修改: 2024-01-31 15:15 | 
                            
                            
                                | libaom0 | CVE-2021-30474 | 严重 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u1 | aom_dsp/grain_table.c in libaom in AOMedia before 2021-03-30 has a use ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30474 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-06-02 17:15 修改: 2024-01-31 15:15 | 
                            
                            
                                | libaom0 | CVE-2021-30475 | 严重 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u1 | aom_dsp/noise_model.c in libaom in AOMedia before 2021-03-24 has a buf ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30475 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-06-04 14:15 修改: 2024-01-31 15:15 | 
                            
                            
                                | libaom0 | CVE-2023-6879 | 严重 | 1.0.0.errata1-3 |  | aom: heap-buffer-overflow on frame size change 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6879 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-12-27 23:15 修改: 2024-02-02 02:27 | 
                            
                            
                                | libaom0 | CVE-2024-5171 | 严重 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u2 | libaom: Integer overflow in internal function img_alloc_helper 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5171 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-06-05 20:15 修改: 2024-07-23 18:09 | 
                            
                            
                                | libblas3 | CVE-2021-4048 | 严重 | 3.9.0-3 |  | lapack: Out-of-bounds read in *larrv 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4048 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-12-08 22:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libcurl3-gnutls | CVE-2021-22945 | 严重 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: use-after-free and double-free in MQTT sending 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22945 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-09-23 13:15 修改: 2024-03-27 15:04 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-32207 | 严重 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Unpreserved file permissions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32207 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-32221 | 严重 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u5 | curl: POST following PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32221 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-05 22:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-23914 | 严重 | 7.74.0-1.3+deb11u1 |  | curl: HSTS ignored on multiple requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23914 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-38545 | 严重 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u10 | curl: heap based buffer overflow in the SOCKS5 proxy handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38545 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-18 04:15 修改: 2024-10-17 22:35 | 
                            
                            
                                | libcurl4 | CVE-2021-22945 | 严重 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: use-after-free and double-free in MQTT sending 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22945 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-09-23 13:15 修改: 2024-03-27 15:04 | 
                            
                            
                                | libcurl4 | CVE-2022-32207 | 严重 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Unpreserved file permissions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32207 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4 | CVE-2022-32221 | 严重 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u5 | curl: POST following PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32221 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-05 22:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4 | CVE-2023-23914 | 严重 | 7.74.0-1.3+deb11u1 |  | curl: HSTS ignored on multiple requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23914 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55 | 
                            
                            
                                | libcurl4 | CVE-2023-38545 | 严重 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u10 | curl: heap based buffer overflow in the SOCKS5 proxy handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38545 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-18 04:15 修改: 2024-10-17 22:35 | 
                            
                            
                                | libdb5.3 | CVE-2019-8457 | 严重 | 5.3.28+dfsg1-0.8 |  | sqlite: heap out-of-bound read in function rtreenode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8457 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-05-30 16:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | libexpat1 | CVE-2024-45491 | 严重 | 2.2.10-2+deb11u3 | 2.2.10-2+deb11u6 | libexpat: Integer Overflow or Wraparound 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28 | 
                            
                            
                                | libexpat1 | CVE-2024-45492 | 严重 | 2.2.10-2+deb11u3 | 2.2.10-2+deb11u6 | libexpat: integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28 | 
                            
                            
                                | libfreetype6 | CVE-2022-27404 | 严重 | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 | FreeType: Buffer overflow in sfnt_init_face 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27404 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2024-37371 | 严重 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libgstreamer-plugins-base1.0-0 | CVE-2024-47538 | 严重 | 1.18.4-2 | 1.18.4-2+deb11u3 | gstreamer1-plugins-base: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47538 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-12 02:03 修改: 2024-12-19 22:15 | 
                            
                            
                                | libgstreamer-plugins-base1.0-0 | CVE-2024-47600 | 严重 | 1.18.4-2 | 1.18.4-2+deb11u3 | gstreamer1-plugins-base: GStreamer has an OOB-read in format_channel_mask 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47600 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-12 02:03 修改: 2024-12-18 21:43 | 
                            
                            
                                | libgstreamer-plugins-base1.0-0 | CVE-2024-47607 | 严重 | 1.18.4-2 | 1.18.4-2+deb11u3 | gstreamer1-plugins-base: stack-buffer overflow in gst_opus_dec_parse_header 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47607 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-12 02:03 修改: 2024-12-18 19:53 | 
                            
                            
                                | libgstreamer-plugins-base1.0-0 | CVE-2024-47615 | 严重 | 1.18.4-2 | 1.18.4-2+deb11u3 | gstreamer1-plugins-base: out-of-bounds write in Ogg demuxer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47615 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-12 02:03 修改: 2024-12-18 19:57 | 
                            
                            
                                | libgstreamer1.0-0 | CVE-2024-47606 | 严重 | 1.18.4-2.1 | 1.18.4-2.1+deb11u1 | gstreamer1-plugins-good: integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47606 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-12-12 02:03 修改: 2024-12-18 21:35 | 
                            
                            
                                | libjson-c5 | CVE-2021-32292 | 严重 | 0.15-2 | 0.15-2+deb11u1 | json-c: stack-buffer-overflow in parseit() in json_parse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32292 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-08-22 19:16 修改: 2023-09-29 22:15 | 
                            
                            
                                | libk5crypto3 | CVE-2024-37371 | 严重 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libkrb5-3 | CVE-2024-37371 | 严重 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libkrb5support0 | CVE-2024-37371 | 严重 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libksba8 | CVE-2022-3515 | 严重 | 1.5.0-3 | 1.5.0-3+deb11u1 | libksba: integer overflow may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3515 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-01-12 15:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | libksba8 | CVE-2022-47629 | 严重 | 1.5.0-3 | 1.5.0-3+deb11u2 | libksba: integer overflow to code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47629 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-20 23:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | liblapack3 | CVE-2021-4048 | 严重 | 3.9.0-3 |  | lapack: Out-of-bounds read in *larrv 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4048 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-12-08 22:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libpcre2-8-0 | CVE-2022-1586 | 严重 | 10.36-2 | 10.36-2+deb11u1 | pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1586 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-05-16 21:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | libpcre2-8-0 | CVE-2022-1587 | 严重 | 10.36-2 | 10.36-2+deb11u1 | pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1587 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-05-16 21:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | libpython3.9-minimal | CVE-2021-29921 | 严重 | 3.9.2-1 | 3.9.2-1+deb11u2 | python-ipaddress: Improper input validation of octal strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29921 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-06 13:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2021-29921 | 严重 | 3.9.2-1 | 3.9.2-1+deb11u2 | python-ipaddress: Improper input validation of octal strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29921 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-06 13:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | libssl1.1 | CVE-2022-2068 | 严重 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u3 | openssl: the c_rehash script allows command injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2068 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-06-21 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtasn1-6 | CVE-2021-46848 | 严重 | 4.16.0-2 | 4.16.0-2+deb11u1 | libtasn1: Out-of-bound access in ETYPE_OK 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46848 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-10-24 14:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | openssh-client | CVE-2023-38408 | 严重 | 1:8.4p1-5 | 1:8.4p1-5+deb11u2 | openssh: Remote code execution in ssh-agent PKCS#11 support 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38408 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-07-20 03:15 修改: 2024-10-15 19:35 | 
                            
                            
                                | openssl | CVE-2022-2068 | 严重 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u3 | openssl: the c_rehash script allows command injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2068 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-21 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | python3-pil | CVE-2022-24303 | 严重 | 8.1.2+dfsg-0.3+deb11u1 |  | python-pillow: temporary directory with a space character allows removal of unrelated file after im.show() and related actions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24303 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-03-28 02:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | python3.9 | CVE-2021-29921 | 严重 | 3.9.2-1 | 3.9.2-1+deb11u2 | python-ipaddress: Improper input validation of octal strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29921 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-06 13:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | python3.9-minimal | CVE-2021-29921 | 严重 | 3.9.2-1 | 3.9.2-1+deb11u2 | python-ipaddress: Improper input validation of octal strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29921 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-06 13:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | wget | CVE-2024-38428 | 严重 | 1.21-1+deb11u1 |  | wget: Misinterpretation of input may lead to improper behavior 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38428 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-16 03:15 修改: 2024-10-28 21:35 | 
                            
                            
                                | xserver-common | CVE-2023-6816 | 严重 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u11 | xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6816 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-01-18 05:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | xterm | CVE-2022-45063 | 严重 | 366-1+deb11u1 |  | xterm: code execution via OSC 50 input sequences 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45063 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-10 16:15 修改: 2024-06-17 15:15 | 
                            
                            
                                | xvfb | CVE-2023-6816 | 严重 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u11 | xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6816 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-01-18 05:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | zlib1g | CVE-2022-37434 | 严重 | 1:1.2.11.dfsg-2+deb11u1 | 1:1.2.11.dfsg-2+deb11u2 | zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37434 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-08-05 07:15 修改: 2023-07-19 00:56 | 
                            
                            
                                | zlib1g | CVE-2023-45853 | 严重 | 1:1.2.11.dfsg-2+deb11u1 |  | zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45853 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-10-14 02:15 修改: 2024-12-20 17:41 | 
                            
                            
                                | git | CVE-2024-32004 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: RCE while cloning local repos 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32004 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git | CVE-2024-32465 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: additional local RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32465 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | bind9-host | CVE-2023-2828 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.42-1~deb11u1 | bind: named's configured cache size limit can be significantly exceeded 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2828 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-06-21 17:15 修改: 2023-07-21 19:19 | 
                            
                            
                                | bind9-host | CVE-2023-2911 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.42-1~deb11u1 | bind: Exceeding the recursive-clients quota may cause named to terminate unexpectedly when stale-answer-client-timeout is set to 0 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2911 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-06-21 17:15 修改: 2023-07-03 19:09 | 
                            
                            
                                | bind9-host | CVE-2023-3341 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.44-1~deb11u1 | bind: stack exhaustion in control channel code may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3341 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-09-20 13:15 修改: 2024-02-16 18:39 | 
                            
                            
                                | git-man | CVE-2019-1387 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: Remote code execution in recursive clones with nested submodules 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1387 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2019-12-18 21:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git-man | CVE-2022-24765 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 | git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24765 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-04-12 18:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2022-29187 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 | git: Bypass of safe.directory protections 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29187 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-12 21:15 修改: 2024-01-14 10:15 | 
                            
                            
                                | git-man | CVE-2022-39260 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 | git: git shell function that splits command arguments can lead to arbitrary heap writes. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39260 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-19 12:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2023-23946 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u2 | git: git apply: a path outside the working tree can be overwritten with crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23946 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-14 20:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2023-25652 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25652 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-25 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git-man | CVE-2023-29007 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: arbitrary configuration injection when renaming or deleting a section from a configuration file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29007 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-25 21:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git-man | CVE-2024-32004 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: RCE while cloning local repos 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32004 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git-man | CVE-2024-32465 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: additional local RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32465 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | bind9-host | CVE-2023-4408 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.48-1 | bind9: Parsing large DNS messages may cause excessive CPU load 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4408 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-13 14:15 修改: 2024-10-21 21:02 | 
                            
                            
                                | bind9-host | CVE-2023-50387 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.48-1 | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | bind9-host | CVE-2023-50868 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.48-1 | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | bind9-host | CVE-2023-5517 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.48-1 | bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5517 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-13 14:15 修改: 2024-10-22 14:09 | 
                            
                            
                                | gstreamer1.0-plugins-base | CVE-2023-37328 | 高危 | 1.18.4-2 | 1.18.4-2+deb11u1 | gstreamer-plugins-base: heap overwrite in subtitle parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37328 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-05-03 02:15 修改: 2024-12-17 15:42 | 
                            
                            
                                | gstreamer1.0-plugins-base | CVE-2024-4453 | 高危 | 1.18.4-2 | 1.18.4-2+deb11u2 | gstreamer: EXIF Metadata Parsing Integer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4453 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-05-22 20:15 修改: 2024-12-17 16:05 | 
                            
                            
                                | gstreamer1.0-plugins-base | CVE-2024-47541 | 高危 | 1.18.4-2 | 1.18.4-2+deb11u3 | gstreamer1-plugins-base: GStreamer has an out-of-bounds write in SSA subtitle parser 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47541 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-12 02:03 修改: 2024-12-13 19:21 | 
                            
                            
                                | gstreamer1.0-plugins-base | CVE-2024-47542 | 高危 | 1.18.4-2 | 1.18.4-2+deb11u3 | gstreamer1-plugins-base: ID3v2 parser out-of-bounds read and NULL-pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47542 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-12 02:03 修改: 2024-12-13 19:03 | 
                            
                            
                                | gstreamer1.0-plugins-base | CVE-2024-47835 | 高危 | 1.18.4-2 | 1.18.4-2+deb11u3 | gstreamer1-plugins-base: NULL-pointer dereference in LRC subtitle parser 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47835 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-12 02:03 修改: 2024-12-18 19:45 | 
                            
                            
                                | bind9-host | CVE-2023-5679 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.48-1 | bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5679 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-13 14:15 修改: 2024-10-22 13:58 | 
                            
                            
                                | krb5-locales | CVE-2022-42898 | 高危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | krb5-locales | CVE-2024-37370 | 高危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | less | CVE-2022-48624 | 高危 | 551-2 | 551-2+deb11u2 | less: missing quoting of shell metacharacters in LESSCLOSE handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48624 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-19 01:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | less | CVE-2024-32487 | 高危 | 551-2 | 551-2+deb11u2 | less: OS command injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32487 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-04-13 15:15 修改: 2024-07-08 14:18 | 
                            
                            
                                | bind9-host | CVE-2023-6516 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.48-1 | bind9: Specific recursive query patterns may lead to an out-of-memory condition 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6516 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-13 14:15 修改: 2024-10-22 18:14 | 
                            
                            
                                | bind9-host | CVE-2024-1737 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.50-1~deb11u1 | bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1737 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-23 15:15 修改: 2024-08-01 13:46 | 
                            
                            
                                | bind9-host | CVE-2024-1975 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.50-1~deb11u1 | bind9: bind: SIG(0) can be used to exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1975 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-23 15:15 修改: 2024-08-01 13:46 | 
                            
                            
                                | bind9-host | CVE-2024-4076 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.50-1~deb11u1 | bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4076 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-23 15:15 修改: 2024-08-01 13:59 | 
                            
                            
                                | bind9-libs | CVE-2022-2881 | 高危 | 1:9.16.27-1~deb11u1 |  | bind: buffer overread in statistics channel code 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2881 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-09-21 11:15 修改: 2022-11-16 20:12 | 
                            
                            
                                | libaom0 | CVE-2020-0478 | 高危 | 1.0.0.errata1-3 |  | In extend_frame_lowbd of restoration.c, there is a possible out of bou ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-0478 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2020-12-15 16:15 修改: 2020-12-16 15:09 | 
                            
                            
                                | libaom0 | CVE-2020-36131 | 高危 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u1 | AOM v2.0.1 was discovered to contain a stack buffer overflow via the c ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36131 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-12-02 22:15 修改: 2024-01-31 15:15 | 
                            
                            
                                | libaom0 | CVE-2020-36133 | 高危 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u1 | AOM v2.0.1 was discovered to contain a global buffer overflow via the  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36133 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-12-02 22:15 修改: 2024-01-31 15:15 | 
                            
                            
                                | libavcodec58 | CVE-2022-3109 | 高危 | 7:4.3.4-0+deb11u1 | 7:4.3.6-0+deb11u1 | An issue was discovered in the FFmpeg package, where vp3_decode_frame  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3109 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-12-16 15:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | libavcodec58 | CVE-2022-48434 | 高危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48434 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-03-29 17:15 修改: 2024-10-21 16:35 | 
                            
                            
                                | libavcodec58 | CVE-2024-32230 | 高危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size- ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32230 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-01 21:15 修改: 2024-08-22 13:24 | 
                            
                            
                                | libavresample4 | CVE-2022-3109 | 高危 | 7:4.3.4-0+deb11u1 | 7:4.3.6-0+deb11u1 | An issue was discovered in the FFmpeg package, where vp3_decode_frame  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3109 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-12-16 15:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | libavresample4 | CVE-2022-48434 | 高危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48434 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-03-29 17:15 修改: 2024-10-21 16:35 | 
                            
                            
                                | libavresample4 | CVE-2024-32230 | 高危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size- ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32230 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-01 21:15 修改: 2024-08-22 13:24 | 
                            
                            
                                | libavutil56 | CVE-2022-3109 | 高危 | 7:4.3.4-0+deb11u1 | 7:4.3.6-0+deb11u1 | An issue was discovered in the FFmpeg package, where vp3_decode_frame  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3109 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-12-16 15:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | libavutil56 | CVE-2022-48434 | 高危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48434 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-03-29 17:15 修改: 2024-10-21 16:35 | 
                            
                            
                                | libavutil56 | CVE-2024-32230 | 高危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size- ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32230 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-01 21:15 修改: 2024-08-22 13:24 | 
                            
                            
                                | bind9-libs | CVE-2022-3080 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.33-1~deb11u1 | bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3080 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-09-21 11:15 修改: 2024-07-03 01:38 | 
                            
                            
                                | libblkid1 | CVE-2024-28085 | 高危 | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | libc-bin | CVE-2021-3999 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u4 | glibc: Off-by-one buffer overflow/underflow in getcwd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-08-24 16:15 修改: 2023-02-12 23:43 | 
                            
                            
                                | libc-bin | CVE-2023-4911 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u7 | glibc: buffer overflow in ld.so leading to privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4911 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-10-03 18:15 修改: 2024-09-17 19:46 | 
                            
                            
                                | libc-bin | CVE-2024-2961 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u9 | glibc: Out of bounds write in iconv may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc-bin | CVE-2024-33599 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: stack-based buffer overflow in netgroup cache 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc-l10n | CVE-2021-3999 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u4 | glibc: Off-by-one buffer overflow/underflow in getcwd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-24 16:15 修改: 2023-02-12 23:43 | 
                            
                            
                                | libc-l10n | CVE-2023-4911 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u7 | glibc: buffer overflow in ld.so leading to privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4911 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-03 18:15 修改: 2024-09-17 19:46 | 
                            
                            
                                | libc-l10n | CVE-2024-2961 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u9 | glibc: Out of bounds write in iconv may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc-l10n | CVE-2024-33599 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: stack-based buffer overflow in netgroup cache 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc6 | CVE-2021-3999 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u4 | glibc: Off-by-one buffer overflow/underflow in getcwd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-08-24 16:15 修改: 2023-02-12 23:43 | 
                            
                            
                                | libc6 | CVE-2023-4911 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u7 | glibc: buffer overflow in ld.so leading to privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4911 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-10-03 18:15 修改: 2024-09-17 19:46 | 
                            
                            
                                | libc6 | CVE-2024-2961 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u9 | glibc: Out of bounds write in iconv may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc6 | CVE-2024-33599 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: stack-based buffer overflow in netgroup cache 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libcap2 | CVE-2023-2603 | 高危 | 1:2.44-1 |  | libcap: Integer Overflow in _libcap_strdup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2603 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-06 20:15 修改: 2024-10-10 16:32 | 
                            
                            
                                | libcap2-bin | CVE-2023-2603 | 高危 | 1:2.44-1 |  | libcap: Integer Overflow in _libcap_strdup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2603 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-06 20:15 修改: 2024-10-10 16:32 | 
                            
                            
                                | libcom-err2 | CVE-2022-1304 | 高危 | 1.46.2-2 | 1.46.2-2+deb11u1 | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libcups2 | CVE-2023-34241 | 高危 | 2.3.3op2-3+deb11u1 | 2.3.3op2-3+deb11u3 | cups: use-after-free in cupsdAcceptClient() in scheduler/client.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34241 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-06-22 23:15 修改: 2023-11-17 19:33 | 
                            
                            
                                | libcups2 | CVE-2023-4504 | 高危 | 2.3.3op2-3+deb11u1 | 2.3.3op2-3+deb11u4 | libppd: Postscript Parsing Heap Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4504 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-09-21 23:15 修改: 2023-11-09 20:58 | 
                            
                            
                                | libcups2 | CVE-2024-47175 | 高危 | 2.3.3op2-3+deb11u1 | 2.3.3op2-3+deb11u9 | cups: libppd: remote command injection via attacker controlled data in PPD file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47175 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-09-26 22:15 修改: 2024-09-30 12:46 | 
                            
                            
                                | bind9-libs | CVE-2022-3094 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.37-1~deb11u1 | bind: flooding with UPDATE requests may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3094 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-01-26 21:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | bind9-libs | CVE-2022-3736 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.37-1~deb11u1 | bind: sending specific queries to the resolver may cause a DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3736 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-01-26 21:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | bind9-libs | CVE-2022-38177 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.33-1~deb11u1 | bind: memory leak in ECDSA DNSSEC verification code 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38177 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-09-21 11:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | bind9-libs | CVE-2022-38178 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.33-1~deb11u1 | bind: memory leaks in EdDSA DNSSEC verification code 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38178 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-09-21 11:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | bind9-libs | CVE-2022-3924 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.37-1~deb11u1 | bind: sending specific queries to the resolver may cause a DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3924 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-01-26 21:16 修改: 2023-11-07 03:51 | 
                            
                            
                                | libcurl3-gnutls | CVE-2021-22946 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-22576 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: OAUTH2 bearer bypass in connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-27775 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: bad local IPv6 connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27775 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-27781 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: CERTINFO never-ending busy-loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-27782 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: TLS and SSH connection too eager reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-42916 | 高危 | 7.74.0-1.3+deb11u1 |  | curl: HSTS bypass via IDN 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42916 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-29 02:15 修改: 2024-03-27 14:59 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-43551 | 高危 | 7.74.0-1.3+deb11u1 |  | curl: HSTS bypass via IDN 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43551 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-23 15:15 修改: 2024-03-27 14:58 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27533 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: TELNET option IAC injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27534 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: SFTP path ~ resolving discrepancy 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl3-gnutls | CVE-2024-2398 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u12 | curl: HTTP/2 push headers memory-leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15 | 
                            
                            
                                | bind9-libs | CVE-2023-2828 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.42-1~deb11u1 | bind: named's configured cache size limit can be significantly exceeded 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2828 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-06-21 17:15 修改: 2023-07-21 19:19 | 
                            
                            
                                | bind9-libs | CVE-2023-2911 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.42-1~deb11u1 | bind: Exceeding the recursive-clients quota may cause named to terminate unexpectedly when stale-answer-client-timeout is set to 0 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2911 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-06-21 17:15 修改: 2023-07-03 19:09 | 
                            
                            
                                | bind9-libs | CVE-2023-3341 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.44-1~deb11u1 | bind: stack exhaustion in control channel code may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3341 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-09-20 13:15 修改: 2024-02-16 18:39 | 
                            
                            
                                | bind9-libs | CVE-2023-4408 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.48-1 | bind9: Parsing large DNS messages may cause excessive CPU load 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4408 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-13 14:15 修改: 2024-10-21 21:02 | 
                            
                            
                                | bind9-libs | CVE-2023-50387 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.48-1 | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libcurl4 | CVE-2021-22946 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcurl4 | CVE-2022-22576 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: OAUTH2 bearer bypass in connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl4 | CVE-2022-27775 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: bad local IPv6 connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27775 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl4 | CVE-2022-27781 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: CERTINFO never-ending busy-loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl4 | CVE-2022-27782 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: TLS and SSH connection too eager reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl4 | CVE-2022-42916 | 高危 | 7.74.0-1.3+deb11u1 |  | curl: HSTS bypass via IDN 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42916 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-29 02:15 修改: 2024-03-27 14:59 | 
                            
                            
                                | libcurl4 | CVE-2022-43551 | 高危 | 7.74.0-1.3+deb11u1 |  | curl: HSTS bypass via IDN 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43551 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-23 15:15 修改: 2024-03-27 14:58 | 
                            
                            
                                | libcurl4 | CVE-2023-27533 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: TELNET option IAC injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl4 | CVE-2023-27534 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: SFTP path ~ resolving discrepancy 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl4 | CVE-2024-2398 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u12 | curl: HTTP/2 push headers memory-leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15 | 
                            
                            
                                | bind9-libs | CVE-2023-50868 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.48-1 | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | bind9-libs | CVE-2023-5517 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.48-1 | bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5517 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-13 14:15 修改: 2024-10-22 14:09 | 
                            
                            
                                | bind9-libs | CVE-2023-5679 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.48-1 | bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5679 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-13 14:15 修改: 2024-10-22 13:58 | 
                            
                            
                                | libexpat1 | CVE-2022-40674 | 高危 | 2.2.10-2+deb11u3 | 2.2.10-2+deb11u4 | expat: a use-after-free in the doContent function in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40674 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-14 11:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libexpat1 | CVE-2022-43680 | 高危 | 2.2.10-2+deb11u3 | 2.2.10-2+deb11u5 | expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43680 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-24 14:15 修改: 2024-01-21 02:08 | 
                            
                            
                                | libexpat1 | CVE-2023-52425 | 高危 | 2.2.10-2+deb11u3 | 2.2.10-2+deb11u6 | expat: parsing large tokens can trigger a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-04 20:15 修改: 2024-08-26 20:35 | 
                            
                            
                                | libexpat1 | CVE-2024-45490 | 高危 | 2.2.10-2+deb11u3 | 2.2.10-2+deb11u6 | libexpat: Negative Length Parsing Vulnerability in libexpat 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24 | 
                            
                            
                                | libext2fs2 | CVE-2022-1304 | 高危 | 1.46.2-2 | 1.46.2-2+deb11u1 | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libflac8 | CVE-2020-22219 | 高危 | 1.3.3-2+deb11u1 | 1.3.3-2+deb11u2 | flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22219 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19 | 
                            
                            
                                | bind9-libs | CVE-2023-6516 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.48-1 | bind9: Specific recursive query patterns may lead to an out-of-memory condition 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6516 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-13 14:15 修改: 2024-10-22 18:14 | 
                            
                            
                                | libfreetype6 | CVE-2022-27405 | 高危 | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 | FreeType: Segmentation violation via FNT_Size_Request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27405 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34 | 
                            
                            
                                | libfreetype6 | CVE-2022-27406 | 高危 | 2.10.4+dfsg-1 | 2.10.4+dfsg-1+deb11u1 | Freetype: Segmentation violation via FT_Request_Size 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27406 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34 | 
                            
                            
                                | libfribidi0 | CVE-2022-25308 | 高危 | 1.0.8-2 | 1.0.8-2+deb11u1 | fribidi: Stack based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25308 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-06 18:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | libgcrypt20 | CVE-2021-33560 | 高危 | 1.8.7-6 |  | libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33560 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2021-06-08 11:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | libgdk-pixbuf-2.0-0 | CVE-2021-44648 | 高危 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 | gdk-pixbuf: heap-buffer overflow when decoding the lzw compressed stream of image data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44648 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-01-12 13:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libgdk-pixbuf-2.0-0 | CVE-2021-46829 | 高危 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 | gdk-pixbuf: heap-based buffer overflow when compositing or clearing frames in GIF files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46829 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-07-24 19:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libgdk-pixbuf-2.0-0 | CVE-2022-48622 | 高危 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u2 | gnome: heap memory corruption on gdk-pixbuf 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48622 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-01-26 09:15 修改: 2024-08-26 20:35 | 
                            
                            
                                | libgdk-pixbuf2.0-bin | CVE-2021-44648 | 高危 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 | gdk-pixbuf: heap-buffer overflow when decoding the lzw compressed stream of image data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44648 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-01-12 13:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libgdk-pixbuf2.0-bin | CVE-2021-46829 | 高危 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 | gdk-pixbuf: heap-based buffer overflow when compositing or clearing frames in GIF files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46829 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-07-24 19:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libgdk-pixbuf2.0-bin | CVE-2022-48622 | 高危 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u2 | gnome: heap memory corruption on gdk-pixbuf 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48622 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-01-26 09:15 修改: 2024-08-26 20:35 | 
                            
                            
                                | libgdk-pixbuf2.0-common | CVE-2021-44648 | 高危 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 | gdk-pixbuf: heap-buffer overflow when decoding the lzw compressed stream of image data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44648 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-01-12 13:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libgdk-pixbuf2.0-common | CVE-2021-46829 | 高危 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u1 | gdk-pixbuf: heap-based buffer overflow when compositing or clearing frames in GIF files 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46829 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-07-24 19:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libgdk-pixbuf2.0-common | CVE-2022-48622 | 高危 | 2.42.2+dfsg-1 | 2.42.2+dfsg-1+deb11u2 | gnome: heap memory corruption on gdk-pixbuf 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48622 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-01-26 09:15 修改: 2024-08-26 20:35 | 
                            
                            
                                | libglib2.0-0 | CVE-2023-29499 | 高危 | 2.66.8-1 | 2.66.8-1+deb11u1 | glib: GVariant offset table entry size is not checked in is_normal() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29499 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-0 | CVE-2024-52533 | 高危 | 2.66.8-1 | 2.66.8-1+deb11u5 | glib: buffer overflow in set_connect_msg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52533 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-11 23:15 修改: 2024-12-06 14:15 | 
                            
                            
                                | libglib2.0-bin | CVE-2023-29499 | 高危 | 2.66.8-1 | 2.66.8-1+deb11u1 | glib: GVariant offset table entry size is not checked in is_normal() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29499 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-bin | CVE-2024-52533 | 高危 | 2.66.8-1 | 2.66.8-1+deb11u5 | glib: buffer overflow in set_connect_msg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52533 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-11 23:15 修改: 2024-12-06 14:15 | 
                            
                            
                                | libglib2.0-data | CVE-2023-29499 | 高危 | 2.66.8-1 | 2.66.8-1+deb11u1 | glib: GVariant offset table entry size is not checked in is_normal() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29499 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-data | CVE-2024-52533 | 高危 | 2.66.8-1 | 2.66.8-1+deb11u5 | glib: buffer overflow in set_connect_msg() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52533 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-11 23:15 修改: 2024-12-06 14:15 | 
                            
                            
                                | libgnutls30 | CVE-2022-2509 | 高危 | 3.7.1-5 | 3.7.1-5+deb11u2 | gnutls: Double free during gnutls_pkcs7_verify 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2509 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-08-01 14:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libgnutls30 | CVE-2023-0361 | 高危 | 3.7.1-5 | 3.7.1-5+deb11u3 | gnutls: timing side-channel in the TLS RSA key exchange code 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0361 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-02-15 18:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | libgnutls30 | CVE-2024-0553 | 高危 | 3.7.1-5 | 3.7.1-5+deb11u5 | gnutls: incomplete fix for CVE-2023-5981 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0553 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-01-16 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | libgnutls30 | CVE-2024-0567 | 高危 | 3.7.1-5 | 3.7.1-5+deb11u5 | gnutls: rejects certificate chain with distributed trust 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0567 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-01-16 14:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | bind9-libs | CVE-2024-1737 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.50-1~deb11u1 | bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1737 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-23 15:15 修改: 2024-08-01 13:46 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2022-42898 | 高危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2024-37370 | 高危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | bind9-libs | CVE-2024-1975 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.50-1~deb11u1 | bind9: bind: SIG(0) can be used to exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1975 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-23 15:15 修改: 2024-08-01 13:46 | 
                            
                            
                                | bind9-libs | CVE-2024-4076 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.50-1~deb11u1 | bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4076 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-23 15:15 修改: 2024-08-01 13:59 | 
                            
                            
                                | bsdutils | CVE-2024-28085 | 高危 | 1:2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | bash | CVE-2022-3715 | 高危 | 5.1-2+b3 |  | bash: a heap-buffer-overflow in valid_parameter_transform 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3715 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-01-05 15:15 修改: 2023-02-24 18:38 | 
                            
                            
                                | libgstreamer-plugins-base1.0-0 | CVE-2023-37328 | 高危 | 1.18.4-2 | 1.18.4-2+deb11u1 | gstreamer-plugins-base: heap overwrite in subtitle parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37328 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-05-03 02:15 修改: 2024-12-17 15:42 | 
                            
                            
                                | libgstreamer-plugins-base1.0-0 | CVE-2024-4453 | 高危 | 1.18.4-2 | 1.18.4-2+deb11u2 | gstreamer: EXIF Metadata Parsing Integer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4453 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-05-22 20:15 修改: 2024-12-17 16:05 | 
                            
                            
                                | libgstreamer-plugins-base1.0-0 | CVE-2024-47541 | 高危 | 1.18.4-2 | 1.18.4-2+deb11u3 | gstreamer1-plugins-base: GStreamer has an out-of-bounds write in SSA subtitle parser 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47541 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-12 02:03 修改: 2024-12-13 19:21 | 
                            
                            
                                | libgstreamer-plugins-base1.0-0 | CVE-2024-47542 | 高危 | 1.18.4-2 | 1.18.4-2+deb11u3 | gstreamer1-plugins-base: ID3v2 parser out-of-bounds read and NULL-pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47542 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-12 02:03 修改: 2024-12-13 19:03 | 
                            
                            
                                | libgstreamer-plugins-base1.0-0 | CVE-2024-47835 | 高危 | 1.18.4-2 | 1.18.4-2+deb11u3 | gstreamer1-plugins-base: NULL-pointer dereference in LRC subtitle parser 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47835 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-12 02:03 修改: 2024-12-18 19:45 | 
                            
                            
                                | bind9-host | CVE-2022-2881 | 高危 | 1:9.16.27-1~deb11u1 |  | bind: buffer overread in statistics channel code 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2881 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-09-21 11:15 修改: 2022-11-16 20:12 | 
                            
                            
                                | libharfbuzz0b | CVE-2023-25193 | 高危 | 2.7.4-1 |  | harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25193 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-02-04 20:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | libimlib2 | CVE-2024-25447 | 高危 | 1.7.1-2 | 1.7.1-2+deb11u1 | An issue in the imlib_load_image_with_error_return function of imlib2  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25447 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-09 15:15 修改: 2024-02-15 04:39 | 
                            
                            
                                | libimlib2 | CVE-2024-25448 | 高危 | 1.7.1-2 | 1.7.1-2+deb11u1 | An issue in the imlib_free_image_and_decache function of imlib2 v1.9.1 ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25448 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-09 15:15 修改: 2024-08-19 17:35 | 
                            
                            
                                | libimlib2 | CVE-2024-25450 | 高危 | 1.7.1-2 | 1.7.1-2+deb11u1 | imlib2 v1.9.1 was discovered to mishandle memory allocation in the fun ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25450 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-09 15:15 修改: 2024-02-15 04:38 | 
                            
                            
                                | bind9-host | CVE-2022-3080 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.33-1~deb11u1 | bind: BIND 9 resolvers configured to answer from cache with zero stale-answer-timeout may terminate unexpectedly 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3080 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-09-21 11:15 修改: 2024-07-03 01:38 | 
                            
                            
                                | bind9-host | CVE-2022-3094 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.37-1~deb11u1 | bind: flooding with UPDATE requests may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3094 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-01-26 21:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | libk5crypto3 | CVE-2022-42898 | 高危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libk5crypto3 | CVE-2024-37370 | 高危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | bind9-host | CVE-2022-3736 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.37-1~deb11u1 | bind: sending specific queries to the resolver may cause a DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3736 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-01-26 21:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | libkrb5-3 | CVE-2022-42898 | 高危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkrb5-3 | CVE-2024-37370 | 高危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | curl | CVE-2021-22946 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libkrb5support0 | CVE-2022-42898 | 高危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u3 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libkrb5support0 | CVE-2024-37370 | 高危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u5 | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | curl | CVE-2022-22576 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: OAUTH2 bearer bypass in connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | curl | CVE-2022-27775 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: bad local IPv6 connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27775 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | curl | CVE-2022-27781 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: CERTINFO never-ending busy-loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libldap-2.4-2 | CVE-2023-2953 | 高危 | 2.4.57+dfsg-3+deb11u1 |  | openldap: null pointer dereference in  ber_memalloc_x  function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2953 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-30 22:15 修改: 2025-01-10 22:15 | 
                            
                            
                                | libldap-common | CVE-2023-2953 | 高危 | 2.4.57+dfsg-3+deb11u1 |  | openldap: null pointer dereference in  ber_memalloc_x  function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2953 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-30 22:15 修改: 2025-01-10 22:15 | 
                            
                            
                                | libmfx1 | CVE-2022-27170 | 高危 | 21.1.0-1 |  | Protection mechanism failure in the Intel(R) Media SDK software before ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27170 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-02-16 21:15 修改: 2023-02-24 20:46 | 
                            
                            
                                | libmfx1 | CVE-2022-34346 | 高危 | 21.1.0-1 |  | Out-of-bounds read in the Intel(R) Media SDK software before version 2 ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34346 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-02-16 21:15 修改: 2023-02-27 19:08 | 
                            
                            
                                | libmfx1 | CVE-2022-34841 | 高危 | 21.1.0-1 |  | Improper buffer restrictions in the Intel(R) Media SDK software before ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34841 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-02-16 21:15 修改: 2023-02-24 20:57 | 
                            
                            
                                | libmount1 | CVE-2024-28085 | 高危 | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | libncurses6 | CVE-2022-29458 | 高危 | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libncurses6 | CVE-2023-29491 | 高危 | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libncursesw6 | CVE-2022-29458 | 高危 | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libncursesw6 | CVE-2023-29491 | 高危 | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libnghttp2-14 | CVE-2023-44487 | 高危 | 1.43.0-1 | 1.43.0-1+deb11u1 | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-10 14:15 修改: 2024-12-20 17:40 | 
                            
                            
                                | libnss-systemd | CVE-2023-50387 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libnss-systemd | CVE-2023-50868 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libnss3 | CVE-2023-0767 | 高危 | 2:3.61-1+deb11u2 | 2:3.61-1+deb11u3 | nss: Arbitrary memory write via PKCS 12 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0767 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-06-02 17:15 修改: 2023-08-02 16:45 | 
                            
                            
                                | libnss3 | CVE-2024-0743 | 高危 | 2:3.61-1+deb11u2 | 2:3.61-1+deb11u4 | Mozilla: Crash in NSS TLS method 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0743 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-01-23 14:15 修改: 2024-03-25 17:15 | 
                            
                            
                                | libnss3 | CVE-2024-6609 | 高危 | 2:3.61-1+deb11u2 | 2:3.61-1+deb11u4 | When almost out-of-memory an elliptic curve key which was never alloca ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6609 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-09 15:15 修改: 2024-08-29 18:32 | 
                            
                            
                                | libopenjp2-7 | CVE-2021-3575 | 高危 | 2.4.0-3 |  | openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3575 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-03-04 18:15 修改: 2023-02-12 23:41 | 
                            
                            
                                | libpam-cap | CVE-2023-2603 | 高危 | 1:2.44-1 |  | libcap: Integer Overflow in _libcap_strdup() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2603 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-06 20:15 修改: 2024-10-10 16:32 | 
                            
                            
                                | libpam-systemd | CVE-2023-50387 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libpam-systemd | CVE-2023-50868 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | curl | CVE-2022-27782 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: TLS and SSH connection too eager reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | curl | CVE-2022-42916 | 高危 | 7.74.0-1.3+deb11u1 |  | curl: HSTS bypass via IDN 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42916 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-29 02:15 修改: 2024-03-27 14:59 | 
                            
                            
                                | libperl5.32 | CVE-2020-16156 | 高危 | 5.32.1-4+deb11u2 | 5.32.1-4+deb11u4 | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | libperl5.32 | CVE-2023-31484 | 高危 | 5.32.1-4+deb11u2 | 5.32.1-4+deb11u4 | perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43 | 
                            
                            
                                | libperl5.32 | CVE-2023-47038 | 高危 | 5.32.1-4+deb11u2 | 5.32.1-4+deb11u3 | perl: Write past buffer end via illegal user-defined Unicode property 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | libpixman-1-0 | CVE-2022-44638 | 高危 | 0.40.0-1 | 0.40.0-1.1~deb11u1 | pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44638 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-03 06:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpoppler-glib8 | CVE-2022-38784 | 高危 | 20.09.0-3.1 | 20.09.0-3.1+deb11u1 | poppler: integer overflow in JBIG2 decoder using malformed files 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38784 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-08-30 03:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | libpoppler102 | CVE-2022-38784 | 高危 | 20.09.0-3.1 | 20.09.0-3.1+deb11u1 | poppler: integer overflow in JBIG2 decoder using malformed files 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38784 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-08-30 03:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | curl | CVE-2022-43551 | 高危 | 7.74.0-1.3+deb11u1 |  | curl: HSTS bypass via IDN 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43551 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-23 15:15 修改: 2024-03-27 14:58 | 
                            
                            
                                | libpython3.9-minimal | CVE-2015-20107 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | libpython3.9-minimal | CVE-2020-10735 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython3.9-minimal | CVE-2021-28861 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15 | 
                            
                            
                                | libpython3.9-minimal | CVE-2021-3737 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: urllib: HTTP client possible infinite loop on a 100 Continue response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-03-04 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libpython3.9-minimal | CVE-2022-0391 | 高危 | 3.9.2-1 |  | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libpython3.9-minimal | CVE-2022-42919 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: local privilege escalation via the multiprocessing forkserver start method 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42919 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-07 00:15 修改: 2023-11-07 03:53 | 
                            
                            
                                | libpython3.9-minimal | CVE-2022-45061 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpython3.9-minimal | CVE-2023-24329 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | libpython3.9-minimal | CVE-2023-6597 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Path traversal on tempfile.TemporaryDirectory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libpython3.9-minimal | CVE-2024-6232 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | libpython3.9-minimal | CVE-2024-7592 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | cpython: python: Uncontrolled CPU resource consumption when in http.cookies module 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-19 19:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | curl | CVE-2023-27533 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: TELNET option IAC injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2015-20107 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2020-10735 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2021-28861 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2021-3737 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: urllib: HTTP client possible infinite loop on a 100 Continue response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-03-04 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2022-0391 | 高危 | 3.9.2-1 |  | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2022-42919 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: local privilege escalation via the multiprocessing forkserver start method 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42919 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-07 00:15 修改: 2023-11-07 03:53 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2022-45061 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2023-24329 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2023-6597 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Path traversal on tempfile.TemporaryDirectory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2024-6232 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2024-7592 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | cpython: python: Uncontrolled CPU resource consumption when in http.cookies module 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-19 19:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | libsdl2-2.0-0 | CVE-2021-33657 | 高危 | 2.0.14+dfsg2-3 | 2.0.14+dfsg2-3+deb11u1 | There is a heap overflow problem in video/SDL_pixels.c in SDL (Simple  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33657 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-04-01 23:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | libsdl2-2.0-0 | CVE-2022-4743 | 高危 | 2.0.14+dfsg2-3 |  | SDL2: memory leak in GLES_CreateTexture() in render/opengles/SDL_render_gles.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4743 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-01-12 19:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | libsmartcols1 | CVE-2024-28085 | 高危 | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | libsndfile1 | CVE-2021-4156 | 高危 | 1.0.31-2 |  | libsndfile: heap out-of-bounds read in src/flac.c in flac_buffer_copy 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4156 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-03-23 20:15 修改: 2023-09-29 13:15 | 
                            
                            
                                | libsndfile1 | CVE-2022-33064 | 高危 | 1.0.31-2 |  | libsndfile: off-by-one error in function wav_read_header in src/wav.c leads to code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33064 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-07-18 14:15 修改: 2023-07-27 15:14 | 
                            
                            
                                | libsndfile1 | CVE-2022-33065 | 高危 | 1.0.31-2 |  | libsndfile: integer overflow in src/mat4.c and src/au.c leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33065 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-07-18 14:15 修改: 2023-08-02 17:19 | 
                            
                            
                                | libsnmp-base | CVE-2022-24805 | 高危 | 5.9+dfsg-3 | 5.9+dfsg-4+deb11u1 | net-snmp: A buffer overflow in the handling of the INDEX of             NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24805 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-16 20:15 修改: 2025-01-17 16:04 | 
                            
                            
                                | libsnmp40 | CVE-2022-24805 | 高危 | 5.9+dfsg-3+b1 | 5.9+dfsg-4+deb11u1 | net-snmp: A buffer overflow in the handling of the INDEX of             NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24805 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-16 20:15 修改: 2025-01-17 16:04 | 
                            
                            
                                | libsqlite3-0 | CVE-2021-36690 | 高危 | 3.34.1-3 | 3.34.1-3+deb11u1 | A segmentation fault can occur in the sqlite3.exe command-line compone ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36690 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-08-24 14:15 修改: 2024-08-04 01:15 | 
                            
                            
                                | libsqlite3-0 | CVE-2023-7104 | 高危 | 3.34.1-3 | 3.34.1-3+deb11u1 | sqlite: heap-buffer-overflow at sessionfuzz 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7104 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-29 10:15 修改: 2024-05-17 02:34 | 
                            
                            
                                | libss2 | CVE-2022-1304 | 高危 | 1.46.2-2 | 1.46.2-2+deb11u1 | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libssh2-1 | CVE-2020-22218 | 高危 | 1.9.0-2 | 1.9.0-2+deb11u1 | libssh2: use-of-uninitialized-value in _libssh2_transport_read 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22218 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15 | 
                            
                            
                                | curl | CVE-2023-27534 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: SFTP path ~ resolving discrepancy 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libssl1.1 | CVE-2022-4450 | 高危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u4 | openssl: double free after calling PEM_read_bio_ex 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0215 | 高危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u4 | openssl: use-after-free following BIO_new_NDEF 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0286 | 高危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u4 | openssl: X.400 address type confusion in X.509 GeneralName 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0464 | 高危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u5 | openssl: Denial of service by excessive resource usage in verifying X509 policy constraints 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libswresample3 | CVE-2022-3109 | 高危 | 7:4.3.4-0+deb11u1 | 7:4.3.6-0+deb11u1 | An issue was discovered in the FFmpeg package, where vp3_decode_frame  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3109 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-12-16 15:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | libswresample3 | CVE-2022-48434 | 高危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48434 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-03-29 17:15 修改: 2024-10-21 16:35 | 
                            
                            
                                | libswresample3 | CVE-2024-32230 | 高危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size- ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32230 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-01 21:15 修改: 2024-08-22 13:24 | 
                            
                            
                                | libsystemd0 | CVE-2023-50387 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libsystemd0 | CVE-2023-50868 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | curl | CVE-2024-2398 | 高危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u12 | curl: HTTP/2 push headers memory-leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15 | 
                            
                            
                                | libtiff5 | CVE-2022-3970 | 高危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: integer overflow in function TIFFReadRGBATileExt of the file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3970 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-13 08:15 修改: 2023-11-17 19:04 | 
                            
                            
                                | libtiff5 | CVE-2023-25434 | 高危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u4 | libtiff: heap-buffer overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25434 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-14 20:15 修改: 2025-01-06 17:15 | 
                            
                            
                                | libtiff5 | CVE-2023-52355 | 高危 | 4.2.0-1+deb11u1 |  | libtiff: TIFFRasterScanlineSize64 produce too-big size and could cause OOM 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52355 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-01-25 20:15 修改: 2024-05-17 17:37 | 
                            
                            
                                | libtiff5 | CVE-2023-52356 | 高危 | 4.2.0-1+deb11u1 |  | libtiff: Segment fault in libtiff  in TIFFReadRGBATileExt() leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52356 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-01-25 20:15 修改: 2024-09-16 20:15 | 
                            
                            
                                | libtiff5 | CVE-2024-7006 | 高危 | 4.2.0-1+deb11u1 |  | libtiff: NULL pointer dereference in tif_dirinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7006 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-12 13:38 修改: 2024-11-06 10:15 | 
                            
                            
                                | libtinfo6 | CVE-2022-29458 | 高危 | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtinfo6 | CVE-2023-29491 | 高危 | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libtirpc-common | CVE-2021-46828 | 高危 | 1.3.1-1 | 1.3.1-1+deb11u1 | libtirpc: DoS vulnerability with lots of connections 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46828 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-07-20 06:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libtirpc3 | CVE-2021-46828 | 高危 | 1.3.1-1 | 1.3.1-1+deb11u1 | libtirpc: DoS vulnerability with lots of connections 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46828 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-07-20 06:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libudev1 | CVE-2023-50387 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libudev1 | CVE-2023-50868 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libuuid1 | CVE-2024-28085 | 高危 | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | libuv1 | CVE-2024-24806 | 高危 | 1.40.0-2 | 1.40.0-2+deb11u1 | libuv: Improper Domain Lookup that potentially leads to SSRF attacks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24806 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-07 22:15 修改: 2024-07-18 01:15 | 
                            
                            
                                | libvncclient1 | CVE-2020-29260 | 高危 | 0.9.13+dfsg-2 | 0.9.13+dfsg-2+deb11u1 | libvncserver: a memory leak via the function rfbClientCleanup() may lead to a DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29260 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-02 23:15 修改: 2022-10-05 20:56 | 
                            
                            
                                | libvncserver1 | CVE-2020-29260 | 高危 | 0.9.13+dfsg-2 | 0.9.13+dfsg-2+deb11u1 | libvncserver: a memory leak via the function rfbClientCleanup() may lead to a DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29260 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-02 23:15 修改: 2022-10-05 20:56 | 
                            
                            
                                | libvpx6 | CVE-2023-44488 | 高危 | 1.9.0-1 | 1.9.0-1+deb11u2 | libvpx: crash related to VP9 encoding in libvpx 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44488 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-09-30 20:15 修改: 2023-11-16 01:37 | 
                            
                            
                                | libvpx6 | CVE-2023-5217 | 高危 | 1.9.0-1 | 1.9.0-1+deb11u1 | libvpx: Heap buffer overflow in vp8 encoding in libvpx 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5217 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-09-28 16:15 修改: 2024-12-20 19:01 | 
                            
                            
                                | libvpx6 | CVE-2024-5197 | 高危 | 1.9.0-1 | 1.9.0-1+deb11u3 | libvpx: Integer overflow in vpx_img_alloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5197 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-06-03 14:15 修改: 2024-06-16 21:15 | 
                            
                            
                                | libwebp6 | CVE-2023-1999 | 高危 | 0.6.1-2.1 | 0.6.1-2.1+deb11u1 | Mozilla: libwebp: Double-free in libwebp 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1999 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-20 12:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwebp6 | CVE-2023-4863 | 高危 | 0.6.1-2.1 | 0.6.1-2.1+deb11u2 | libwebp: Heap buffer overflow in WebP Codec 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4863 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-09-12 15:15 修改: 2024-12-20 19:00 | 
                            
                            
                                | libwebpdemux2 | CVE-2023-1999 | 高危 | 0.6.1-2.1 | 0.6.1-2.1+deb11u1 | Mozilla: libwebp: Double-free in libwebp 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1999 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-20 12:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwebpdemux2 | CVE-2023-4863 | 高危 | 0.6.1-2.1 | 0.6.1-2.1+deb11u2 | libwebp: Heap buffer overflow in WebP Codec 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4863 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-09-12 15:15 修改: 2024-12-20 19:00 | 
                            
                            
                                | libwebpmux3 | CVE-2023-1999 | 高危 | 0.6.1-2.1 | 0.6.1-2.1+deb11u1 | Mozilla: libwebp: Double-free in libwebp 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1999 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-20 12:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwebpmux3 | CVE-2023-4863 | 高危 | 0.6.1-2.1 | 0.6.1-2.1+deb11u2 | libwebp: Heap buffer overflow in WebP Codec 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4863 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-09-12 15:15 修改: 2024-12-20 19:00 | 
                            
                            
                                | libx11-6 | CVE-2023-3138 | 高危 | 2:1.7.2-1 | 2:1.7.2-1+deb11u1 | libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3138 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-28 21:15 修改: 2023-12-08 19:15 | 
                            
                            
                                | libx11-6 | CVE-2023-43787 | 高危 | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 | libX11: integer overflow in XCreateImage() leading to a heap overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43787 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libx11-data | CVE-2023-3138 | 高危 | 2:1.7.2-1 | 2:1.7.2-1+deb11u1 | libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3138 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-28 21:15 修改: 2023-12-08 19:15 | 
                            
                            
                                | libx11-data | CVE-2023-43787 | 高危 | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 | libX11: integer overflow in XCreateImage() leading to a heap overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43787 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libx11-xcb1 | CVE-2023-3138 | 高危 | 2:1.7.2-1 | 2:1.7.2-1+deb11u1 | libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3138 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-28 21:15 修改: 2023-12-08 19:15 | 
                            
                            
                                | libx11-xcb1 | CVE-2023-43787 | 高危 | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 | libX11: integer overflow in XCreateImage() leading to a heap overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43787 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libxml2 | CVE-2022-2309 | 高危 | 2.9.10+dfsg-6.7+deb11u2 | 2.9.10+dfsg-6.7+deb11u5 | lxml: NULL Pointer Dereference in lxml 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2309 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-05 10:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libxml2 | CVE-2022-40303 | 高危 | 2.9.10+dfsg-6.7+deb11u2 | 2.9.10+dfsg-6.7+deb11u3 | libxml2: integer overflows with XML_PARSE_HUGE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40303 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-23 00:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libxml2 | CVE-2022-40304 | 高危 | 2.9.10+dfsg-6.7+deb11u2 | 2.9.10+dfsg-6.7+deb11u3 | libxml2: dict corruption caused by entity reference cycles 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40304 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-23 18:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libxml2 | CVE-2024-25062 | 高危 | 2.9.10+dfsg-6.7+deb11u2 |  | libxml2: use-after-free in XMLReader 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25062 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-04 16:15 修改: 2024-02-13 00:40 | 
                            
                            
                                | libxpm4 | CVE-2022-44617 | 高危 | 1:3.5.12-1 | 1:3.5.12-1.1~deb11u1 | libXpm: Runaway loop on width of 0 and enormous height 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44617 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-06 23:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | libxpm4 | CVE-2022-46285 | 高危 | 1:3.5.12-1 | 1:3.5.12-1.1~deb11u1 | libXpm: Infinite loop on unclosed comments 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46285 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-07 19:15 修改: 2023-10-17 15:55 | 
                            
                            
                                | libxpm4 | CVE-2022-4883 | 高危 | 1:3.5.12-1 | 1:3.5.12-1.1~deb11u1 | libXpm: compression commands depend on $PATH 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4883 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-07 19:15 修改: 2023-10-17 15:55 | 
                            
                            
                                | libzstd1 | CVE-2022-4899 | 高危 | 1.4.8+dfsg-2.1 |  | zstd: mysql: buffer overrun in util.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4899 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-03-31 20:15 修改: 2023-11-07 03:59 | 
                            
                            
                                | locales | CVE-2021-3999 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u4 | glibc: Off-by-one buffer overflow/underflow in getcwd() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-24 16:15 修改: 2023-02-12 23:43 | 
                            
                            
                                | locales | CVE-2023-4911 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u7 | glibc: buffer overflow in ld.so leading to privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4911 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-03 18:15 修改: 2024-09-17 19:46 | 
                            
                            
                                | locales | CVE-2024-2961 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u9 | glibc: Out of bounds write in iconv may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | locales | CVE-2024-33599 | 高危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: stack-based buffer overflow in netgroup cache 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | logsave | CVE-2022-1304 | 高危 | 1.46.2-2 | 1.46.2-2+deb11u1 | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | mount | CVE-2024-28085 | 高危 | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | ncurses-base | CVE-2022-29458 | 高危 | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | ncurses-base | CVE-2023-29491 | 高危 | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | ncurses-bin | CVE-2022-29458 | 高危 | 6.2+20201114-2 | 6.2+20201114-2+deb11u1 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | ncurses-bin | CVE-2023-29491 | 高危 | 6.2+20201114-2 | 6.2+20201114-2+deb11u2 | ncurses: Local users can trigger security-relevant memory corruption via malformed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29491 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-04-14 01:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | e2fsprogs | CVE-2022-1304 | 高危 | 1.46.2-2 | 1.46.2-2+deb11u1 | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | openssh-client | CVE-2021-41617 | 高危 | 1:8.4p1-5 | 1:8.4p1-5+deb11u3 | openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15 | 
                            
                            
                                | bind9-host | CVE-2022-38177 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.33-1~deb11u1 | bind: memory leak in ECDSA DNSSEC verification code 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38177 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-09-21 11:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | openssl | CVE-2022-4450 | 高危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u4 | openssl: double free after calling PEM_read_bio_ex 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | openssl | CVE-2023-0215 | 高危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u4 | openssl: use-after-free following BIO_new_NDEF 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | openssl | CVE-2023-0286 | 高危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u4 | openssl: X.400 address type confusion in X.509 GeneralName 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | openssl | CVE-2023-0464 | 高危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u5 | openssl: Denial of service by excessive resource usage in verifying X509 policy constraints 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | perl | CVE-2020-16156 | 高危 | 5.32.1-4+deb11u2 | 5.32.1-4+deb11u4 | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | perl | CVE-2023-31484 | 高危 | 5.32.1-4+deb11u2 | 5.32.1-4+deb11u4 | perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43 | 
                            
                            
                                | perl | CVE-2023-47038 | 高危 | 5.32.1-4+deb11u2 | 5.32.1-4+deb11u3 | perl: Write past buffer end via illegal user-defined Unicode property 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | perl-base | CVE-2020-16156 | 高危 | 5.32.1-4+deb11u2 | 5.32.1-4+deb11u4 | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | perl-base | CVE-2023-31484 | 高危 | 5.32.1-4+deb11u2 | 5.32.1-4+deb11u4 | perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43 | 
                            
                            
                                | perl-base | CVE-2023-47038 | 高危 | 5.32.1-4+deb11u2 | 5.32.1-4+deb11u3 | perl: Write past buffer end via illegal user-defined Unicode property 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | perl-modules-5.32 | CVE-2020-16156 | 高危 | 5.32.1-4+deb11u2 | 5.32.1-4+deb11u4 | perl-CPAN: Bypass of verification of signatures in CHECKSUMS files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18 | 
                            
                            
                                | perl-modules-5.32 | CVE-2023-31484 | 高危 | 5.32.1-4+deb11u2 | 5.32.1-4+deb11u4 | perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43 | 
                            
                            
                                | perl-modules-5.32 | CVE-2023-47038 | 高危 | 5.32.1-4+deb11u2 | 5.32.1-4+deb11u3 | perl: Write past buffer end via illegal user-defined Unicode property 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | python3-cryptography | CVE-2023-49083 | 高危 | 3.3.2-1 | 3.3.2-1+deb11u1 | python-cryptography: NULL-dereference when loading PKCS7 certificates 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49083 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-29 19:15 修改: 2024-09-05 16:09 | 
                            
                            
                                | python3-cryptography | CVE-2023-50782 | 高危 | 3.3.2-1 |  | python-cryptography: Bleichenbacher timing oracle attack against RSA decryption - incomplete fix for CVE-2020-25659 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50782 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-05 21:15 修改: 2024-09-27 19:15 | 
                            
                            
                                | python3-idna | CVE-2024-3651 | 高危 | 2.10-1 | 2.10-1+deb11u1 | python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-07-07 18:15 修改: 2024-07-11 14:58 | 
                            
                            
                                | bind9-host | CVE-2022-38178 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.33-1~deb11u1 | bind: memory leaks in EdDSA DNSSEC verification code 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38178 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-09-21 11:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | python3-pil | CVE-2021-23437 | 高危 | 8.1.2+dfsg-0.3+deb11u1 |  | python-pillow: possible ReDoS via the getrgb function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23437 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-09-03 16:15 修改: 2024-03-22 11:15 | 
                            
                            
                                | python3-pil | CVE-2022-45198 | 高危 | 8.1.2+dfsg-0.3+deb11u1 |  | Pillow before 9.2.0 performs Improper Handling of Highly Compressed GI ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45198 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-14 07:15 修改: 2023-01-10 20:11 | 
                            
                            
                                | python3-pil | CVE-2023-44271 | 高危 | 8.1.2+dfsg-0.3+deb11u1 | 8.1.2+dfsg-0.3+deb11u2 | python-pillow: uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44271 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-03 05:15 修改: 2024-03-22 11:15 | 
                            
                            
                                | python3-pil | CVE-2023-50447 | 高危 | 8.1.2+dfsg-0.3+deb11u1 | 8.1.2+dfsg-0.3+deb11u2 | pillow: Arbitrary Code Execution via the environment parameter 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50447 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-01-19 20:15 修改: 2024-08-01 13:45 | 
                            
                            
                                | python3-pkg-resources | CVE-2024-6345 | 高危 | 52.0.0-4 | 52.0.0-4+deb11u1 | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | python3-setuptools | CVE-2024-6345 | 高危 | 52.0.0-4 | 52.0.0-4+deb11u1 | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | python3-urllib3 | CVE-2023-43804 | 高危 | 1.26.5-1~exp1 | 1.26.5-1~exp1+deb11u1 | python-urllib3: Cookie request header isn't stripped during cross-origin redirects 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43804 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-04 17:15 修改: 2024-12-13 14:15 | 
                            
                            
                                | bind9-host | CVE-2022-3924 | 高危 | 1:9.16.27-1~deb11u1 | 1:9.16.37-1~deb11u1 | bind: sending specific queries to the resolver may cause a DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3924 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-01-26 21:16 修改: 2023-11-07 03:51 | 
                            
                            
                                | python3.9 | CVE-2015-20107 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | python3.9 | CVE-2020-10735 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | python3.9 | CVE-2021-28861 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15 | 
                            
                            
                                | python3.9 | CVE-2021-3737 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: urllib: HTTP client possible infinite loop on a 100 Continue response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-03-04 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | python3.9 | CVE-2022-0391 | 高危 | 3.9.2-1 |  | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | python3.9 | CVE-2022-42919 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: local privilege escalation via the multiprocessing forkserver start method 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42919 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-07 00:15 修改: 2023-11-07 03:53 | 
                            
                            
                                | python3.9 | CVE-2022-45061 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | python3.9 | CVE-2023-24329 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | python3.9 | CVE-2023-6597 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Path traversal on tempfile.TemporaryDirectory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python3.9 | CVE-2024-6232 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python3.9 | CVE-2024-7592 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | cpython: python: Uncontrolled CPU resource consumption when in http.cookies module 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-19 19:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | git | CVE-2019-1387 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: Remote code execution in recursive clones with nested submodules 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1387 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2019-12-18 21:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | python3.9-minimal | CVE-2015-20107 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: mailcap: findmatch() function does not sanitize the second argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-20107 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-04-13 16:15 修改: 2023-11-07 02:25 | 
                            
                            
                                | python3.9-minimal | CVE-2020-10735 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | python3.9-minimal | CVE-2021-28861 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: open redirection vulnerability in lib/http/server.py may lead to information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15 | 
                            
                            
                                | python3.9-minimal | CVE-2021-3737 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: urllib: HTTP client possible infinite loop on a 100 Continue response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3737 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-03-04 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | python3.9-minimal | CVE-2022-0391 | 高危 | 3.9.2-1 |  | python: urllib.parse does not sanitize URLs containing ASCII newline and tabs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | python3.9-minimal | CVE-2022-42919 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: local privilege escalation via the multiprocessing forkserver start method 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42919 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-07 00:15 修改: 2023-11-07 03:53 | 
                            
                            
                                | python3.9-minimal | CVE-2022-45061 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | python3.9-minimal | CVE-2023-24329 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: urllib.parse url blocklisting bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08 | 
                            
                            
                                | python3.9-minimal | CVE-2023-6597 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Path traversal on tempfile.TemporaryDirectory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python3.9-minimal | CVE-2024-6232 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python3.9-minimal | CVE-2024-7592 | 高危 | 3.9.2-1 | 3.9.2-1+deb11u2 | cpython: python: Uncontrolled CPU resource consumption when in http.cookies module 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-19 19:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | sudo | CVE-2023-22809 | 高危 | 1.9.5p2-3 | 1.9.5p2-3+deb11u1 | sudo: arbitrary file write with privileges of the RunAs user 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22809 镜像层: sha256:ea2e5a084e30f7b660444743088d544904ec3d20671381d183c7c09f39c081a6 发布日期: 2023-01-18 17:15 修改: 2023-11-17 19:32 | 
                            
                            
                                | sudo | CVE-2023-42465 | 高危 | 1.9.5p2-3 |  | sudo: Targeted Corruption of Register and Stack Variables 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42465 镜像层: sha256:ea2e5a084e30f7b660444743088d544904ec3d20671381d183c7c09f39c081a6 发布日期: 2023-12-22 16:15 修改: 2024-02-18 03:15 | 
                            
                            
                                | systemd | CVE-2023-50387 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | systemd | CVE-2023-50868 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | systemd-sysv | CVE-2023-50387 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | systemd-sysv | CVE-2023-50868 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | systemd-timesyncd | CVE-2023-50387 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | systemd-timesyncd | CVE-2023-50868 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | udev | CVE-2023-50387 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | udev | CVE-2023-50868 | 高危 | 247.3-7 | 247.3-7+deb11u6 | bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | util-linux | CVE-2024-28085 | 高危 | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | uuid-runtime | CVE-2024-28085 | 高危 | 2.36.1-8+deb11u1 | 2.36.1-8+deb11u2 | util-linux: CVE-2024-28085: wall: escape sequence injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35 | 
                            
                            
                                | vim | CVE-2021-3872 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in win_redr_status() in drawscreen.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3872 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-10-19 13:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim | CVE-2021-4019 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in find_help_tags() in help.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4019 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-01 10:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim | CVE-2021-4173 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free with nested :def function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4173 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-27 13:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim | CVE-2021-4187 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4187 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-29 17:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim | CVE-2022-0261 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in block_insert() in src/ops.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0261 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-18 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0351 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: access of memory location before start of buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0351 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-25 18:15 修改: 2022-11-09 19:20 | 
                            
                            
                                | vim | CVE-2022-0359 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in init_ccline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0359 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-26 12:15 修改: 2022-11-09 18:58 | 
                            
                            
                                | vim | CVE-2022-0361 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0361 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-26 13:15 修改: 2022-11-09 18:57 | 
                            
                            
                                | vim | CVE-2022-0392 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0392 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-28 22:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | vim | CVE-2022-0417 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based-buffer-overflow in ex_retab() of src/indent.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0417 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-01 13:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0572 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap overflow in ex_retab() may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0572 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-14 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-1616 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in append_command of src/ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1616 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-07 19:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1785 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-bounds Write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1785 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-19 13:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim | CVE-2022-1897 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds write in vim_regsub_both() in regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1897 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-27 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1942 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1942 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-31 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-2000 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds write in function append_command 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2000 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-09 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2129 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2129 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2304 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: stack buffer overflow in spell_dump_compl() at spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2304 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-3099 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free in do_cmdline() in ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3099 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-03 16:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim | CVE-2022-3134 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap use-after-free in do_tag() at src/tag.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3134 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-06 20:15 修改: 2024-01-25 21:05 | 
                            
                            
                                | vim | CVE-2022-3324 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: stack buffer overflow in win_redr_ruler() at drawscreen.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3324 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-27 23:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim | CVE-2022-4141 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: invalid memory access in substitute with function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4141 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-11-25 14:15 修改: 2023-11-07 03:57 | 
                            
                            
                                | vim | CVE-2023-0054 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds write in do_string_sub() in eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0054 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-04 19:15 修改: 2023-06-12 20:15 | 
                            
                            
                                | vim | CVE-2023-2610 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: integer overflow vulnerability in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2610 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-05-09 22:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | vim | CVE-2023-4738 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in vim_regsub_both in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4738 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-02 20:15 修改: 2024-02-01 16:16 | 
                            
                            
                                | vim | CVE-2023-4752 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function ins_compl_get_exp in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4752 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-04 14:15 修改: 2024-02-01 17:59 | 
                            
                            
                                | vim | CVE-2023-4781 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in function vim_regsub_both in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4781 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-05 19:15 修改: 2024-02-01 17:57 | 
                            
                            
                                | vim | CVE-2023-5344 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in trunc_string() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5344 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-02 20:15 修改: 2023-12-13 01:15 | 
                            
                            
                                | vim | CVE-2024-22667 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Stack buffer over flow in did_set_langmap function in map.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22667 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-02-05 08:15 修改: 2024-02-23 16:15 | 
                            
                            
                                | vim-common | CVE-2021-3872 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in win_redr_status() in drawscreen.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3872 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-10-19 13:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-common | CVE-2021-4019 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in find_help_tags() in help.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4019 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-01 10:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-common | CVE-2021-4173 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free with nested :def function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4173 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-27 13:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-common | CVE-2021-4187 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4187 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-29 17:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-common | CVE-2022-0261 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in block_insert() in src/ops.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0261 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-18 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0351 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: access of memory location before start of buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0351 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-25 18:15 修改: 2022-11-09 19:20 | 
                            
                            
                                | vim-common | CVE-2022-0359 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in init_ccline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0359 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-26 12:15 修改: 2022-11-09 18:58 | 
                            
                            
                                | vim-common | CVE-2022-0361 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0361 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-26 13:15 修改: 2022-11-09 18:57 | 
                            
                            
                                | vim-common | CVE-2022-0392 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0392 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-28 22:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | vim-common | CVE-2022-0417 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based-buffer-overflow in ex_retab() of src/indent.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0417 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-01 13:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0572 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap overflow in ex_retab() may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0572 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-14 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-1616 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in append_command of src/ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1616 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-07 19:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1785 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-bounds Write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1785 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-19 13:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-common | CVE-2022-1897 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds write in vim_regsub_both() in regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1897 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-27 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1942 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1942 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-31 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-2000 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds write in function append_command 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2000 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-09 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2129 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2129 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2304 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: stack buffer overflow in spell_dump_compl() at spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2304 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-3099 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free in do_cmdline() in ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3099 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-03 16:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim-common | CVE-2022-3134 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap use-after-free in do_tag() at src/tag.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3134 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-06 20:15 修改: 2024-01-25 21:05 | 
                            
                            
                                | vim-common | CVE-2022-3324 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: stack buffer overflow in win_redr_ruler() at drawscreen.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3324 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-27 23:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim-common | CVE-2022-4141 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: invalid memory access in substitute with function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4141 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-11-25 14:15 修改: 2023-11-07 03:57 | 
                            
                            
                                | vim-common | CVE-2023-0054 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds write in do_string_sub() in eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0054 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-04 19:15 修改: 2023-06-12 20:15 | 
                            
                            
                                | vim-common | CVE-2023-2610 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: integer overflow vulnerability in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2610 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-05-09 22:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | vim-common | CVE-2023-4738 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in vim_regsub_both in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4738 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-02 20:15 修改: 2024-02-01 16:16 | 
                            
                            
                                | vim-common | CVE-2023-4752 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function ins_compl_get_exp in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4752 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-04 14:15 修改: 2024-02-01 17:59 | 
                            
                            
                                | vim-common | CVE-2023-4781 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in function vim_regsub_both in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4781 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-05 19:15 修改: 2024-02-01 17:57 | 
                            
                            
                                | vim-common | CVE-2023-5344 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in trunc_string() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5344 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-02 20:15 修改: 2023-12-13 01:15 | 
                            
                            
                                | vim-common | CVE-2024-22667 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Stack buffer over flow in did_set_langmap function in map.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22667 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-02-05 08:15 修改: 2024-02-23 16:15 | 
                            
                            
                                | vim-runtime | CVE-2021-3872 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in win_redr_status() in drawscreen.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3872 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-10-19 13:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-runtime | CVE-2021-4019 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in find_help_tags() in help.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4019 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-01 10:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-runtime | CVE-2021-4173 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free with nested :def function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4173 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-27 13:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-runtime | CVE-2021-4187 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4187 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-29 17:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-runtime | CVE-2022-0261 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in block_insert() in src/ops.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0261 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-18 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0351 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: access of memory location before start of buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0351 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-25 18:15 修改: 2022-11-09 19:20 | 
                            
                            
                                | vim-runtime | CVE-2022-0359 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in init_ccline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0359 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-26 12:15 修改: 2022-11-09 18:58 | 
                            
                            
                                | vim-runtime | CVE-2022-0361 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0361 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-26 13:15 修改: 2022-11-09 18:57 | 
                            
                            
                                | vim-runtime | CVE-2022-0392 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0392 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-28 22:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | vim-runtime | CVE-2022-0417 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based-buffer-overflow in ex_retab() of src/indent.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0417 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-01 13:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0572 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap overflow in ex_retab() may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0572 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-14 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-1616 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in append_command of src/ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1616 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-07 19:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1785 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-bounds Write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1785 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-19 13:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-runtime | CVE-2022-1897 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds write in vim_regsub_both() in regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1897 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-27 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1942 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1942 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-31 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-2000 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds write in function append_command 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2000 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-09 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2129 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2129 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2304 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: stack buffer overflow in spell_dump_compl() at spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2304 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-3099 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free in do_cmdline() in ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3099 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-03 16:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim-runtime | CVE-2022-3134 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap use-after-free in do_tag() at src/tag.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3134 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-06 20:15 修改: 2024-01-25 21:05 | 
                            
                            
                                | vim-runtime | CVE-2022-3324 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: stack buffer overflow in win_redr_ruler() at drawscreen.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3324 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-27 23:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim-runtime | CVE-2022-4141 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: invalid memory access in substitute with function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4141 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-11-25 14:15 修改: 2023-11-07 03:57 | 
                            
                            
                                | vim-runtime | CVE-2023-0054 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds write in do_string_sub() in eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0054 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-04 19:15 修改: 2023-06-12 20:15 | 
                            
                            
                                | vim-runtime | CVE-2023-2610 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: integer overflow vulnerability in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2610 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-05-09 22:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | vim-runtime | CVE-2023-4738 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in vim_regsub_both in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4738 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-02 20:15 修改: 2024-02-01 16:16 | 
                            
                            
                                | vim-runtime | CVE-2023-4752 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function ins_compl_get_exp in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4752 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-04 14:15 修改: 2024-02-01 17:59 | 
                            
                            
                                | vim-runtime | CVE-2023-4781 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in function vim_regsub_both in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4781 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-05 19:15 修改: 2024-02-01 17:57 | 
                            
                            
                                | vim-runtime | CVE-2023-5344 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in trunc_string() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5344 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-02 20:15 修改: 2023-12-13 01:15 | 
                            
                            
                                | vim-runtime | CVE-2024-22667 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Stack buffer over flow in did_set_langmap function in map.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22667 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-02-05 08:15 修改: 2024-02-23 16:15 | 
                            
                            
                                | git | CVE-2022-24765 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 | git: On multi-user machines Git users might find themselves unexpectedly in a Git worktree 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24765 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-04-12 18:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git | CVE-2022-29187 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 | git: Bypass of safe.directory protections 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29187 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-12 21:15 修改: 2024-01-14 10:15 | 
                            
                            
                                | xserver-common | CVE-2022-2319 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u2 | xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2319 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-01 21:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | xserver-common | CVE-2022-2320 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u2 | xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2320 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-01 21:15 修改: 2024-02-01 02:27 | 
                            
                            
                                | xserver-common | CVE-2022-3550 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u3 | xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3550 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-17 13:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | xserver-common | CVE-2022-4283 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u4 | xorg-x11-server: XkbGetKbdByName use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4283 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-14 21:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | xserver-common | CVE-2022-46340 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u4 | xorg-x11-server: XTestSwapFakeInput stack overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46340 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-14 21:15 修改: 2023-05-30 06:15 | 
                            
                            
                                | xserver-common | CVE-2022-46341 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u4 | xorg-x11-server: XIPassiveUngrab out-of-bounds access 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46341 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-14 21:15 修改: 2023-05-30 06:15 | 
                            
                            
                                | xserver-common | CVE-2022-46342 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u4 | xorg-x11-server: XvdiSelectVideoNotify use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46342 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-14 21:15 修改: 2023-05-30 06:15 | 
                            
                            
                                | xserver-common | CVE-2022-46343 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u4 | xorg-x11-server: ScreenSaverSetAttributes use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46343 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-14 21:15 修改: 2023-05-30 06:15 | 
                            
                            
                                | xserver-common | CVE-2022-46344 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u4 | xorg-x11-server: XIChangeProperty out-of-bounds access 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46344 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-14 21:15 修改: 2023-12-13 15:15 | 
                            
                            
                                | xserver-common | CVE-2023-0494 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u5 | xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0494 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-27 21:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | xserver-common | CVE-2023-1393 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u6 | xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1393 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 21:15 修改: 2023-11-07 04:03 | 
                            
                            
                                | xserver-common | CVE-2023-5367 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u8 | xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5367 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-25 20:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | xserver-common | CVE-2023-5574 | 高危 | 2:1.20.11-1+deb11u1 |  | xorg-x11-server: Use-after-free bug in DamageDestroy 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5574 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-25 20:15 修改: 2024-09-16 17:16 | 
                            
                            
                                | xserver-common | CVE-2023-6377 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u10 | xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6377 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-13 07:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | xserver-common | CVE-2023-6478 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u9 | xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6478 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-13 07:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | xserver-common | CVE-2024-0229 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u11 | xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0229 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-09 07:16 修改: 2024-11-23 03:15 | 
                            
                            
                                | xserver-common | CVE-2024-0409 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u11 | xorg-x11-server: SELinux context corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0409 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-01-18 16:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | xserver-common | CVE-2024-21885 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u11 | xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21885 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-28 13:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | xserver-common | CVE-2024-21886 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u11 | xorg-x11-server: heap buffer overflow in DisableDevice 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21886 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-28 13:15 修改: 2024-05-22 17:16 | 
                            
                            
                                | xserver-common | CVE-2024-31080 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u13 | xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31080 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-04-04 14:15 修改: 2024-11-12 15:15 | 
                            
                            
                                | xserver-common | CVE-2024-31081 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u13 | xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31081 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-04-04 14:15 修改: 2024-11-12 15:15 | 
                            
                            
                                | xserver-common | CVE-2024-31083 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u13 | xorg-x11-server: Use-after-free in ProcRenderAddGlyphs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31083 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-04-05 12:15 修改: 2024-11-12 15:15 | 
                            
                            
                                | xserver-common | CVE-2024-9632 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u14 | xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9632 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-10-30 08:15 修改: 2024-11-21 19:15 | 
                            
                            
                                | git | CVE-2022-39260 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 | git: git shell function that splits command arguments can lead to arbitrary heap writes. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39260 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-19 12:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git | CVE-2023-23946 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u2 | git: git apply: a path outside the working tree can be overwritten with crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23946 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-14 20:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | xvfb | CVE-2022-2319 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u2 | xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2319 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-01 21:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | xvfb | CVE-2022-2320 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u2 | xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2320 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-01 21:15 修改: 2024-02-01 02:27 | 
                            
                            
                                | xvfb | CVE-2022-3550 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u3 | xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3550 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-17 13:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | xvfb | CVE-2022-4283 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u4 | xorg-x11-server: XkbGetKbdByName use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4283 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-14 21:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | xvfb | CVE-2022-46340 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u4 | xorg-x11-server: XTestSwapFakeInput stack overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46340 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-14 21:15 修改: 2023-05-30 06:15 | 
                            
                            
                                | xvfb | CVE-2022-46341 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u4 | xorg-x11-server: XIPassiveUngrab out-of-bounds access 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46341 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-14 21:15 修改: 2023-05-30 06:15 | 
                            
                            
                                | xvfb | CVE-2022-46342 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u4 | xorg-x11-server: XvdiSelectVideoNotify use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46342 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-14 21:15 修改: 2023-05-30 06:15 | 
                            
                            
                                | xvfb | CVE-2022-46343 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u4 | xorg-x11-server: ScreenSaverSetAttributes use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46343 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-14 21:15 修改: 2023-05-30 06:15 | 
                            
                            
                                | xvfb | CVE-2022-46344 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u4 | xorg-x11-server: XIChangeProperty out-of-bounds access 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46344 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-14 21:15 修改: 2023-12-13 15:15 | 
                            
                            
                                | xvfb | CVE-2023-0494 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u5 | xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0494 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-27 21:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | xvfb | CVE-2023-1393 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u6 | xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1393 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 21:15 修改: 2023-11-07 04:03 | 
                            
                            
                                | xvfb | CVE-2023-5367 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u8 | xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5367 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-25 20:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | xvfb | CVE-2023-5574 | 高危 | 2:1.20.11-1+deb11u1 |  | xorg-x11-server: Use-after-free bug in DamageDestroy 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5574 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-25 20:15 修改: 2024-09-16 17:16 | 
                            
                            
                                | xvfb | CVE-2023-6377 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u10 | xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6377 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-13 07:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | xvfb | CVE-2023-6478 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u9 | xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6478 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-13 07:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | xvfb | CVE-2024-0229 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u11 | xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0229 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-09 07:16 修改: 2024-11-23 03:15 | 
                            
                            
                                | xvfb | CVE-2024-0409 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u11 | xorg-x11-server: SELinux context corruption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0409 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-01-18 16:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | xvfb | CVE-2024-21885 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u11 | xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21885 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-28 13:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | xvfb | CVE-2024-21886 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u11 | xorg-x11-server: heap buffer overflow in DisableDevice 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21886 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-28 13:15 修改: 2024-05-22 17:16 | 
                            
                            
                                | xvfb | CVE-2024-31080 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u13 | xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31080 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-04-04 14:15 修改: 2024-11-12 15:15 | 
                            
                            
                                | xvfb | CVE-2024-31081 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u13 | xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31081 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-04-04 14:15 修改: 2024-11-12 15:15 | 
                            
                            
                                | xvfb | CVE-2024-31083 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u13 | xorg-x11-server: Use-after-free in ProcRenderAddGlyphs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31083 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-04-05 12:15 修改: 2024-11-12 15:15 | 
                            
                            
                                | xvfb | CVE-2024-9632 | 高危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u14 | xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9632 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-10-30 08:15 修改: 2024-11-21 19:15 | 
                            
                            
                                | xxd | CVE-2021-3872 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in win_redr_status() in drawscreen.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3872 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-10-19 13:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | xxd | CVE-2021-4019 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in find_help_tags() in help.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4019 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-01 10:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | xxd | CVE-2021-4173 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free with nested :def function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4173 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-27 13:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | xxd | CVE-2021-4187 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4187 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-29 17:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | xxd | CVE-2022-0261 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in block_insert() in src/ops.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0261 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-18 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0351 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: access of memory location before start of buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0351 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-25 18:15 修改: 2022-11-09 19:20 | 
                            
                            
                                | xxd | CVE-2022-0359 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in init_ccline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0359 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-26 12:15 修改: 2022-11-09 18:58 | 
                            
                            
                                | xxd | CVE-2022-0361 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0361 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-26 13:15 修改: 2022-11-09 18:57 | 
                            
                            
                                | xxd | CVE-2022-0392 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0392 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-28 22:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | xxd | CVE-2022-0417 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based-buffer-overflow in ex_retab() of src/indent.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0417 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-01 13:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0572 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap overflow in ex_retab() may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0572 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-14 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-1616 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in append_command of src/ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1616 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-07 19:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1785 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-bounds Write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1785 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-19 13:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | xxd | CVE-2022-1897 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds write in vim_regsub_both() in regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1897 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-27 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1942 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1942 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-31 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-2000 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds write in function append_command 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2000 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-09 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2129 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds write in vim_regsub_both() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2129 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2304 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: stack buffer overflow in spell_dump_compl() at spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2304 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-05 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-3099 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free in do_cmdline() in ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3099 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-03 16:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | xxd | CVE-2022-3134 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap use-after-free in do_tag() at src/tag.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3134 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-06 20:15 修改: 2024-01-25 21:05 | 
                            
                            
                                | xxd | CVE-2022-3324 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: stack buffer overflow in win_redr_ruler() at drawscreen.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3324 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-27 23:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | xxd | CVE-2022-4141 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: invalid memory access in substitute with function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4141 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-11-25 14:15 修改: 2023-11-07 03:57 | 
                            
                            
                                | xxd | CVE-2023-0054 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds write in do_string_sub() in eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0054 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-04 19:15 修改: 2023-06-12 20:15 | 
                            
                            
                                | xxd | CVE-2023-2610 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: integer overflow vulnerability in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2610 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-05-09 22:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | xxd | CVE-2023-4738 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in vim_regsub_both in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4738 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-02 20:15 修改: 2024-02-01 16:16 | 
                            
                            
                                | xxd | CVE-2023-4752 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function ins_compl_get_exp in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4752 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-04 14:15 修改: 2024-02-01 17:59 | 
                            
                            
                                | xxd | CVE-2023-4781 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in function vim_regsub_both in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4781 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-05 19:15 修改: 2024-02-01 17:57 | 
                            
                            
                                | xxd | CVE-2023-5344 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in trunc_string() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5344 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-02 20:15 修改: 2023-12-13 01:15 | 
                            
                            
                                | xxd | CVE-2024-22667 | 高危 | 2:8.2.2434-3+deb11u1 |  | vim: Stack buffer over flow in did_set_langmap function in map.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22667 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-02-05 08:15 修改: 2024-02-23 16:15 | 
                            
                            
                                | git | CVE-2023-25652 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25652 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-25 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git | CVE-2023-29007 | 高危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: arbitrary configuration injection when renaming or deleting a section from a configuration file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29007 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-25 21:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | libsnmp40 | CVE-2022-24808 | 中危 | 5.9+dfsg-3+b1 | 5.9+dfsg-4+deb11u1 | net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24808 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-16 20:15 修改: 2025-01-17 16:16 | 
                            
                            
                                | libsnmp40 | CVE-2022-24809 | 中危 | 5.9+dfsg-3+b1 | 5.9+dfsg-4+deb11u1 | net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24809 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-16 20:15 修改: 2025-01-17 16:17 | 
                            
                            
                                | libsnmp40 | CVE-2022-24810 | 中危 | 5.9+dfsg-3+b1 | 5.9+dfsg-4+deb11u1 | net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24810 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | libsnmp40 | CVE-2022-44792 | 中危 | 5.9+dfsg-3+b1 |  | net-snmp: NULL Pointer Exception when handling ipDefaultTTL 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44792 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:16 | 
                            
                            
                                | libsnmp40 | CVE-2022-44793 | 中危 | 5.9+dfsg-3+b1 |  | net-snmp: NULL Pointer Exception when handling pv6IpForwarding 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44793 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:17 | 
                            
                            
                                | libspeex1 | CVE-2020-23903 | 中危 | 1.2~rc1.2-1.1 |  | speex: divide by zero in read_samples() via crafted WAV file 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-23903 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-11-10 22:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | dirmngr | CVE-2022-34903 | 中危 | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | avahi-daemon | CVE-2021-3502 | 中危 | 0.8-5 | 0.8-5+deb11u1 | avahi: reachable assertion in avahi_s_host_name_resolver_start when trying to resolve badly-formatted hostnames 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3502 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-05-07 12:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libcurl3-gnutls | CVE-2021-22947 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Server responses received before STARTTLS processed after TLS handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-27774 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: credential leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-27776 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: auth/cookie leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-32205 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Set-Cookie denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32205 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-32206 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: HTTP compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-32208 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: FTP-KRB bad message verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-43552 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u5 | curl: Use-after-free triggered by an HTTP proxy deny response 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35 | 
                            
                            
                                | libssl1.1 | CVE-2022-2097 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u4 | openssl: AES OCB fails to encrypt some bytes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2022-4304 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u4 | openssl: timing attack in RSA Decryption implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0465 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u5 | openssl: Invalid certificate policies in leaf certificates are silently ignored 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0466 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u5 | openssl: Certificate policy check not enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-2650 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u5 | openssl: Possible DoS translating ASN.1 object identifiers 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-05-30 14:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-3446 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1v-0~deb11u1 | openssl: Excessive time spent checking DH keys and parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3446 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-07-19 12:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-3817 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1v-0~deb11u1 | OpenSSL: Excessive time spent checking DH q parameter value 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3817 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-07-31 16:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-5678 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1w-0+deb11u2 | openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5678 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-11-06 16:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl1.1 | CVE-2024-0727 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1w-0+deb11u2 | openssl: denial of service via null dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl1.1 | CVE-2024-4741 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1w-0+deb11u2 | openssl: Use After Free with SSL_free_buffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01 | 
                            
                            
                                | libssl1.1 | CVE-2024-5535 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1w-0+deb11u2 | openssl: SSL_select_next_proto buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-23915 | 中危 | 7.74.0-1.3+deb11u1 |  | curl: HSTS amnesia with --parallel 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23915 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-23916 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u7 | curl: HTTP multi-header compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27535 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: FTP too eager connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47 | 
                            
                            
                                | libswresample3 | CVE-2022-3341 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.6-0+deb11u1 | A null pointer dereference issue was discovered in 'FFmpeg' in decode_ ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3341 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-01-12 15:15 修改: 2023-06-13 17:15 | 
                            
                            
                                | libswresample3 | CVE-2023-49502 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.8-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49502 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42 | 
                            
                            
                                | libswresample3 | CVE-2023-50010 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50010 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42 | 
                            
                            
                                | libswresample3 | CVE-2023-51793 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51793 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43 | 
                            
                            
                                | libswresample3 | CVE-2023-51794 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51794 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-26 15:15 修改: 2024-08-01 13:45 | 
                            
                            
                                | libswresample3 | CVE-2023-51798 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51798 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43 | 
                            
                            
                                | libswresample3 | CVE-2024-31578 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.8-0+deb11u1 | FFmpeg version n6.1.1 was discovered to contain a heap use-after-free  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31578 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-17 14:15 修改: 2024-07-03 01:55 | 
                            
                            
                                | libswresample3 | CVE-2024-7055 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.8-0+deb11u1 | A vulnerability was found in FFmpeg up to 7.0.1. It has been classifie ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7055 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-08-06 06:15 修改: 2024-08-06 16:30 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27536 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: GSS delegation too eager connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-27538 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: SSH connection too eager reuse still 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libsystemd0 | CVE-2022-3821 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: buffer overrun in format_timespan() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-11-08 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | libsystemd0 | CVE-2022-4415 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19 | 
                            
                            
                                | libsystemd0 | CVE-2023-7008 | 中危 | 247.3-7 | 247.3-7+deb11u6 | systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-28321 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u9 | curl: IDN wildcard match may lead to Improper Cerificate Validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28321 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-26 21:15 修改: 2025-01-15 16:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-46218 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u11 | curl: information disclosure by exploiting a mixed case flaw 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-46219 | 中危 | 7.74.0-1.3+deb11u1 |  | curl: excessively long file name may lead to unknown HSTS status 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-12 02:15 修改: 2024-01-19 16:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2024-11053 | 中危 | 7.74.0-1.3+deb11u1 |  | curl: curl netrc password leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-12-11 08:15 修改: 2024-12-15 17:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2024-7264 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u13 | curl: libcurl: ASN.1 date parser overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-07-31 08:15 修改: 2024-10-30 20:35 | 
                            
                            
                                | libcurl3-gnutls | CVE-2024-8096 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u14 | curl: OCSP stapling bypass with GnuTLS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26 | 
                            
                            
                                | libtiff5 | CVE-2022-1354 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: heap-buffer-overflow in TIFFReadRawDataStriped() in tiffinfo.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1354 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:50 | 
                            
                            
                                | libtiff5 | CVE-2022-1355 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: stack-buffer-overflow in tiffcp.c in main() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1355 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:52 | 
                            
                            
                                | libtiff5 | CVE-2022-1622 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: out-of-bounds read in LZWDecode 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1622 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-05-11 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | libtiff5 | CVE-2022-1623 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: out-of-bounds read in LZWDecode 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1623 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-05-11 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | libtiff5 | CVE-2022-2056 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2056 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiff5 | CVE-2022-2057 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2057 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiff5 | CVE-2022-2058 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: division by zero issues in tiffcrop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2058 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-30 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libtiff5 | CVE-2022-2519 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: Double free or corruption in rotateImage() function at tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2519 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:57 | 
                            
                            
                                | libtiff5 | CVE-2022-2520 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: Assertion fail in rotateImage() function at tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2520 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-31 16:15 修改: 2023-02-28 15:39 | 
                            
                            
                                | libtiff5 | CVE-2022-2521 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2521 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:59 | 
                            
                            
                                | libtiff5 | CVE-2022-2867 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: uint32_t underflow leads to out of bounds read and write in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2867 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiff5 | CVE-2022-2868 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: Invalid crop_width and/or crop_length could cause an out-of-bounds read in reverseSamples16bits() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2868 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiff5 | CVE-2022-2869 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: tiffcrop.c has uint32_t underflow which leads to out of bounds read and write in extractContigSamples8bits() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2869 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-17 22:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | libtiff5 | CVE-2022-2953 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2953 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-29 15:15 修改: 2023-02-23 16:01 | 
                            
                            
                                | libtiff5 | CVE-2022-34526 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34526 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-29 23:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libtiff5 | CVE-2022-3570 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: heap Buffer overflows in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3570 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:02 | 
                            
                            
                                | libtiff5 | CVE-2022-3597 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3597 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:04 | 
                            
                            
                                | libtiff5 | CVE-2022-3598 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3598 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-21 16:15 修改: 2023-03-31 16:05 | 
                            
                            
                                | libtiff5 | CVE-2022-3599 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3599 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:06 | 
                            
                            
                                | libtiff5 | CVE-2022-3626 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3626 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-21 16:15 修改: 2023-03-31 16:06 | 
                            
                            
                                | libtiff5 | CVE-2022-3627 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3627 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-21 16:15 修改: 2023-02-23 16:07 | 
                            
                            
                                | libtiff5 | CVE-2022-40090 | 中危 | 4.2.0-1+deb11u1 |  | libtiff: infinite loop via a crafted TIFF file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40090 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:13 | 
                            
                            
                                | libtiff5 | CVE-2022-4645 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4645 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-03 16:15 修改: 2023-11-07 03:58 | 
                            
                            
                                | libtiff5 | CVE-2022-48281 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: heap-based buffer overflow in processCropSelections() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48281 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-01-23 03:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0795 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u4 | libtiff: out-of-bounds read in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0795 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0796 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u4 | libtiff: out-of-bounds read in extractContigSamplesShifted24bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0796 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0797 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u4 | libtiff: out-of-bounds read in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0797 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0798 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u4 | libtiff: out-of-bounds read in extractContigSamplesShifted8bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0798 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0799 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u4 | libtiff: use-after-free in extractContigSamplesShifted32bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0799 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0800 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u4 | libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0800 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0801 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u4 | libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0801 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0802 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u4 | libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0802 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0803 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u4 | libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0803 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16 | 
                            
                            
                                | libtiff5 | CVE-2023-0804 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u4 | libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0804 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-13 23:15 修改: 2023-11-07 04:01 | 
                            
                            
                                | libtiff5 | CVE-2023-25433 | 中危 | 4.2.0-1+deb11u1 |  | libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25433 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-29 20:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | libtiff5 | CVE-2023-25435 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u4 | libtiff: tiffcrop: heap-buffer-overflow in extractContigSamplesShifted8bits() in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25435 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-21 20:15 修改: 2024-12-06 20:15 | 
                            
                            
                                | libtiff5 | CVE-2023-26965 | 中危 | 4.2.0-1+deb11u1 |  | libtiff: heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26965 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-14 21:15 修改: 2025-01-06 17:15 | 
                            
                            
                                | libtiff5 | CVE-2023-26966 | 中危 | 4.2.0-1+deb11u1 |  | libtiff: Buffer Overflow in uv_encode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26966 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-29 20:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | libtiff5 | CVE-2023-2908 | 中危 | 4.2.0-1+deb11u1 |  | libtiff: null pointer dereference in tif_dir.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2908 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-30 22:15 修改: 2023-11-07 04:13 | 
                            
                            
                                | libtiff5 | CVE-2023-30086 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: Heap buffer overflow in tiffcp() at tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30086 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-09 16:15 修改: 2023-06-16 15:15 | 
                            
                            
                                | libtiff5 | CVE-2023-30774 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u3 | libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30774 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-19 15:15 修改: 2024-01-09 02:51 | 
                            
                            
                                | libtiff5 | CVE-2023-3316 | 中危 | 4.2.0-1+deb11u1 |  | libtiff: tiffcrop: null pointer dereference in TIFFClose() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3316 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-19 12:15 修改: 2023-08-01 02:15 | 
                            
                            
                                | libtiff5 | CVE-2023-3576 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u5 | libtiff: memory leak in tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3576 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-04 19:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | libtiff5 | CVE-2023-3618 | 中危 | 4.2.0-1+deb11u1 |  | libtiff: segmentation fault in Fax3Encode in libtiff/tif_fax3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3618 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-07-12 15:15 修改: 2024-03-23 11:15 | 
                            
                            
                                | libtiff5 | CVE-2023-40745 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u5 | libtiff: integer overflow in tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40745 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-05 19:15 修改: 2024-09-16 17:15 | 
                            
                            
                                | libtiff5 | CVE-2023-41175 | 中危 | 4.2.0-1+deb11u1 | 4.2.0-1+deb11u5 | libtiff: potential integer overflow in raw2tiff.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41175 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-05 19:15 修改: 2024-12-04 08:15 | 
                            
                            
                                | libtiff5 | CVE-2023-6277 | 中危 | 4.2.0-1+deb11u1 |  | libtiff: Out-of-memory in TIFFOpen via a craft file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6277 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-24 19:15 修改: 2024-09-17 01:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2024-9681 | 中危 | 7.74.0-1.3+deb11u1 |  | curl: HSTS subdomain overwrites parent cache entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-06 08:15 修改: 2024-12-13 14:15 | 
                            
                            
                                | krb5-locales | CVE-2023-36054 | 中危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | libtinfo6 | CVE-2023-50495 | 中危 | 6.2+20201114-2 |  | ncurses: segmentation fault via _nc_wrap_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | file | CVE-2022-48554 | 中危 | 1:5.39-3 | 1:5.39-3+deb11u1 | file: stack-based buffer over-read in file_copystr in funcs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48554 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-08-22 19:16 修改: 2024-03-13 22:15 | 
                            
                            
                                | avahi-daemon | CVE-2023-1981 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: avahi-daemon can be crashed via DBus 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1981 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-05-26 18:15 修改: 2025-01-15 22:15 | 
                            
                            
                                | libturbojpeg0 | CVE-2021-46822 | 中危 | 1:2.0.6-4 |  | libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46822 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-18 16:15 修改: 2022-08-15 15:52 | 
                            
                            
                                | avahi-daemon | CVE-2023-38469 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_dns_packet_append_record 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-daemon | CVE-2023-38470 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_escape_label 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libudev1 | CVE-2022-3821 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: buffer overrun in format_timespan() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-11-08 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | libudev1 | CVE-2022-4415 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19 | 
                            
                            
                                | libudev1 | CVE-2023-7008 | 中危 | 247.3-7 | 247.3-7+deb11u6 | systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | avahi-daemon | CVE-2023-38471 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in dbus_set_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-daemon | CVE-2023-38472 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_rdata_parse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | avahi-daemon | CVE-2023-38473 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_alternative_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46 | 
                            
                            
                                | bind9-libs | CVE-2022-2795 | 中危 | 1:9.16.27-1~deb11u1 | 1:9.16.33-1~deb11u1 | bind: processing large delegations may severely degrade resolver performance 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2795 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-09-21 11:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | avahi-daemon | CVE-2024-52615 | 中危 | 0.8-5 |  | avahi: Avahi Wide-Area DNS Uses Constant Source Port 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52615 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-21 21:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | avahi-daemon | CVE-2024-52616 | 中危 | 0.8-5 |  | avahi: Avahi Wide-Area DNS Predictable Transaction IDs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52616 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-21 21:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | libaom0 | CVE-2020-36130 | 中危 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u1 | AOM v2.0.1 was discovered to contain a NULL pointer dereference via th ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36130 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-12-02 22:15 修改: 2024-01-31 15:15 | 
                            
                            
                                | libvpx6 | CVE-2023-6349 | 中危 | 1.9.0-1 | 1.9.0-1+deb11u2 | libvpx: Heap buffer overflow related to VP9 encoding 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6349 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-05-27 12:15 修改: 2024-05-28 12:39 | 
                            
                            
                                | libwavpack1 | CVE-2022-2476 | 中危 | 5.4.0-1 |  | wavpack: null pointer dereference in main() in cli/wvunpack.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2476 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-07-19 20:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libwayland-client0 | CVE-2021-3782 | 中危 | 1.18.0-2~exp1.1 |  | wayland: libwayland-server wl_shm reference-count overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3782 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-23 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libwayland-cursor0 | CVE-2021-3782 | 中危 | 1.18.0-2~exp1.1 |  | wayland: libwayland-server wl_shm reference-count overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3782 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-09-23 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libwayland-egl1 | CVE-2021-3782 | 中危 | 1.18.0-2~exp1.1 |  | wayland: libwayland-server wl_shm reference-count overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3782 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-09-23 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libwayland-server0 | CVE-2021-3782 | 中危 | 1.18.0-2~exp1.1 |  | wayland: libwayland-server wl_shm reference-count overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3782 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-09-23 16:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libaom0 | CVE-2020-36135 | 中危 | 1.0.0.errata1-3 | 1.0.0.errata1-3+deb11u1 | AOM v2.0.1 was discovered to contain a NULL pointer dereference via th ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36135 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-12-02 22:15 修改: 2024-01-31 15:15 | 
                            
                            
                                | libavahi-client3 | CVE-2021-3468 | 中危 | 0.8-5 | 0.8-5+deb11u2 | avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3468 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-06-02 16:15 修改: 2023-06-22 02:15 | 
                            
                            
                                | libavahi-client3 | CVE-2021-3502 | 中危 | 0.8-5 | 0.8-5+deb11u1 | avahi: reachable assertion in avahi_s_host_name_resolver_start when trying to resolve badly-formatted hostnames 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3502 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-07 12:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libcurl4 | CVE-2021-22947 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Server responses received before STARTTLS processed after TLS handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03 | 
                            
                            
                                | libcurl4 | CVE-2022-27774 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: credential leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl4 | CVE-2022-27776 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: auth/cookie leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl4 | CVE-2022-32205 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Set-Cookie denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32205 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl4 | CVE-2022-32206 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: HTTP compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libx11-6 | CVE-2023-43785 | 中危 | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 | libX11: out-of-bounds memory access in _XkbReadKeySyms() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43785 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libx11-6 | CVE-2023-43786 | 中危 | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 | libX11: stack exhaustion from infinite recursion in PutSubImage() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43786 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libcurl4 | CVE-2022-32208 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: FTP-KRB bad message verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4 | CVE-2022-43552 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u5 | curl: Use-after-free triggered by an HTTP proxy deny response 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35 | 
                            
                            
                                | libx11-data | CVE-2023-43785 | 中危 | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 | libX11: out-of-bounds memory access in _XkbReadKeySyms() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43785 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libx11-data | CVE-2023-43786 | 中危 | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 | libX11: stack exhaustion from infinite recursion in PutSubImage() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43786 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libcurl4 | CVE-2023-23915 | 中危 | 7.74.0-1.3+deb11u1 |  | curl: HSTS amnesia with --parallel 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23915 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55 | 
                            
                            
                                | libcurl4 | CVE-2023-23916 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u7 | curl: HTTP multi-header compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libx11-xcb1 | CVE-2023-43785 | 中危 | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 | libX11: out-of-bounds memory access in _XkbReadKeySyms() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43785 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libx11-xcb1 | CVE-2023-43786 | 中危 | 2:1.7.2-1 | 2:1.7.2-1+deb11u2 | libX11: stack exhaustion from infinite recursion in PutSubImage() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43786 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libcurl4 | CVE-2023-27535 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: FTP too eager connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47 | 
                            
                            
                                | libcurl4 | CVE-2023-27536 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: GSS delegation too eager connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libcurl4 | CVE-2023-27538 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: SSH connection too eager reuse still 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libcurl4 | CVE-2023-28321 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u9 | curl: IDN wildcard match may lead to Improper Cerificate Validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28321 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-26 21:15 修改: 2025-01-15 16:15 | 
                            
                            
                                | libxml2 | CVE-2016-3709 | 中危 | 2.9.10+dfsg-6.7+deb11u2 | 2.9.10+dfsg-6.7+deb11u5 | libxml2: Incorrect server side include parsing can lead to XSS 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3709 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-28 17:15 修改: 2022-12-07 16:39 | 
                            
                            
                                | libxml2 | CVE-2023-28484 | 中危 | 2.9.10+dfsg-6.7+deb11u2 | 2.9.10+dfsg-6.7+deb11u4 | libxml2: NULL dereference in xmlSchemaFixupComplexType 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28484 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-24 21:15 修改: 2024-02-01 17:15 | 
                            
                            
                                | libxml2 | CVE-2023-29469 | 中危 | 2.9.10+dfsg-6.7+deb11u2 | 2.9.10+dfsg-6.7+deb11u4 | libxml2: Hashing of empty dict strings isn't deterministic 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29469 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-24 21:15 修改: 2023-06-01 14:15 | 
                            
                            
                                | libxml2 | CVE-2023-39615 | 中危 | 2.9.10+dfsg-6.7+deb11u2 |  | libxml2: crafted xml can cause global buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39615 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-08-29 17:15 修改: 2024-08-02 19:15 | 
                            
                            
                                | libxml2 | CVE-2023-45322 | 中危 | 2.9.10+dfsg-6.7+deb11u2 |  | libxml2: use-after-free in xmlUnlinkNode() in tree.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45322 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-06 22:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | libcurl4 | CVE-2023-46218 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u11 | curl: information disclosure by exploiting a mixed case flaw 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15 | 
                            
                            
                                | libcurl4 | CVE-2023-46219 | 中危 | 7.74.0-1.3+deb11u1 |  | curl: excessively long file name may lead to unknown HSTS status 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-12 02:15 修改: 2024-01-19 16:15 | 
                            
                            
                                | libcurl4 | CVE-2024-11053 | 中危 | 7.74.0-1.3+deb11u1 |  | curl: curl netrc password leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-12-11 08:15 修改: 2024-12-15 17:15 | 
                            
                            
                                | libxpm4 | CVE-2023-43788 | 中危 | 1:3.5.12-1 | 1:3.5.12-1.1+deb11u1 | libXpm: out of bounds read in XpmCreateXpmImageFromBuffer() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43788 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libxpm4 | CVE-2023-43789 | 中危 | 1:3.5.12-1 | 1:3.5.12-1.1+deb11u1 | libXpm: out of bounds read on XPM with corrupted colormap 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43789 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-12 12:15 修改: 2024-09-16 15:15 | 
                            
                            
                                | libcurl4 | CVE-2024-7264 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u13 | curl: libcurl: ASN.1 date parser overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-07-31 08:15 修改: 2024-10-30 20:35 | 
                            
                            
                                | libcurl4 | CVE-2024-8096 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u14 | curl: OCSP stapling bypass with GnuTLS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26 | 
                            
                            
                                | libcurl4 | CVE-2024-9681 | 中危 | 7.74.0-1.3+deb11u1 |  | curl: HSTS subdomain overwrites parent cache entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-06 08:15 修改: 2024-12-13 14:15 | 
                            
                            
                                | libdav1d4 | CVE-2023-32570 | 中危 | 0.7.1-3 |  | VideoLAN dav1d before 1.2.0 has a thread_task.c race condition that ca ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32570 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-05-10 05:15 修改: 2023-11-07 04:14 | 
                            
                            
                                | libavahi-client3 | CVE-2023-1981 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: avahi-daemon can be crashed via DBus 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1981 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-26 18:15 修改: 2025-01-15 22:15 | 
                            
                            
                                | locales | CVE-2023-4806 | 中危 | 2.31-13+deb11u3 |  | glibc: potential use-after-free in getaddrinfo() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | locales | CVE-2023-4813 | 中危 | 2.31-13+deb11u3 |  | glibc: potential use-after-free in gaih_inet() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | locales | CVE-2024-33600 | 中危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: null pointer dereferences after failed netgroup cache insertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | locales | CVE-2024-33601 | 中危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: netgroup cache may terminate daemon on memory allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | locales | CVE-2024-33602 | 中危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: netgroup cache assumes NSS callback uses in-buffer strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | login | CVE-2023-4641 | 中危 | 1:4.8.1-1 |  | shadow-utils: possible password leak during passwd(1) change 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4641 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-12-27 16:15 修改: 2024-05-03 16:15 | 
                            
                            
                                | libdbus-1-3 | CVE-2022-42010 | 中危 | 1.12.20-2 | 1.12.24-0+deb11u1 | dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42010 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49 | 
                            
                            
                                | libdbus-1-3 | CVE-2022-42011 | 中危 | 1.12.20-2 | 1.12.24-0+deb11u1 | dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42011 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49 | 
                            
                            
                                | libdbus-1-3 | CVE-2022-42012 | 中危 | 1.12.20-2 | 1.12.24-0+deb11u1 | dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42012 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49 | 
                            
                            
                                | libdbus-1-3 | CVE-2023-34969 | 中危 | 1.12.20-2 | 1.12.28-0+deb11u1 | dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34969 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-08 03:15 修改: 2023-12-27 16:36 | 
                            
                            
                                | ncurses-base | CVE-2023-50495 | 中危 | 6.2+20201114-2 |  | ncurses: segmentation fault via _nc_wrap_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libavahi-client3 | CVE-2023-38469 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_dns_packet_append_record 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libavahi-client3 | CVE-2023-38470 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_escape_label 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | ncurses-bin | CVE-2023-50495 | 中危 | 6.2+20201114-2 |  | ncurses: segmentation fault via _nc_wrap_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | libavahi-client3 | CVE-2023-38471 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in dbus_set_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libavahi-client3 | CVE-2023-38472 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_rdata_parse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | openssh-client | CVE-2023-48795 | 中危 | 1:8.4p1-5 | 1:8.4p1-5+deb11u3 | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48795 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-18 16:15 修改: 2024-12-02 14:54 | 
                            
                            
                                | openssh-client | CVE-2023-51385 | 中危 | 1:8.4p1-5 | 1:8.4p1-5+deb11u3 | openssh: potential command injection via shell metacharacters 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51385 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-18 19:15 修改: 2024-03-13 21:15 | 
                            
                            
                                | libavahi-client3 | CVE-2023-38473 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_alternative_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46 | 
                            
                            
                                | libavahi-client3 | CVE-2024-52615 | 中危 | 0.8-5 |  | avahi: Avahi Wide-Area DNS Uses Constant Source Port 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52615 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-21 21:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | libexpat1 | CVE-2024-50602 | 中危 | 2.2.10-2+deb11u3 |  | libexpat: expat: DoS via XML_ResumeParser 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-10-27 05:15 修改: 2024-10-30 18:35 | 
                            
                            
                                | libavahi-client3 | CVE-2024-52616 | 中危 | 0.8-5 |  | avahi: Avahi Wide-Area DNS Predictable Transaction IDs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52616 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-21 21:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | libavahi-common-data | CVE-2021-3468 | 中危 | 0.8-5 | 0.8-5+deb11u2 | avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3468 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-06-02 16:15 修改: 2023-06-22 02:15 | 
                            
                            
                                | openssl | CVE-2022-2097 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u4 | openssl: AES OCB fails to encrypt some bytes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | openssl | CVE-2022-4304 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u4 | openssl: timing attack in RSA Decryption implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | openssl | CVE-2023-0465 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u5 | openssl: Invalid certificate policies in leaf certificates are silently ignored 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | openssl | CVE-2023-0466 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u5 | openssl: Certificate policy check not enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | openssl | CVE-2023-2650 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1n-0+deb11u5 | openssl: Possible DoS translating ASN.1 object identifiers 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-30 14:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | openssl | CVE-2023-3446 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1v-0~deb11u1 | openssl: Excessive time spent checking DH keys and parameters 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3446 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-07-19 12:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | openssl | CVE-2023-3817 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1v-0~deb11u1 | OpenSSL: Excessive time spent checking DH q parameter value 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3817 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-07-31 16:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | openssl | CVE-2023-5678 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1w-0+deb11u2 | openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5678 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-06 16:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | openssl | CVE-2024-0727 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1w-0+deb11u2 | openssl: denial of service via null dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | openssl | CVE-2024-4741 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1w-0+deb11u2 | openssl: Use After Free with SSL_free_buffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01 | 
                            
                            
                                | openssl | CVE-2024-5535 | 中危 | 1.1.1n-0+deb11u2 | 1.1.1w-0+deb11u2 | openssl: SSL_select_next_proto buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15 | 
                            
                            
                                | passwd | CVE-2023-4641 | 中危 | 1:4.8.1-1 |  | shadow-utils: possible password leak during passwd(1) change 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4641 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-12-27 16:15 修改: 2024-05-03 16:15 | 
                            
                            
                                | libavahi-common-data | CVE-2021-3502 | 中危 | 0.8-5 | 0.8-5+deb11u1 | avahi: reachable assertion in avahi_s_host_name_resolver_start when trying to resolve badly-formatted hostnames 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3502 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-07 12:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libavahi-common-data | CVE-2023-1981 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: avahi-daemon can be crashed via DBus 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1981 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-26 18:15 修改: 2025-01-15 22:15 | 
                            
                            
                                | libavahi-common-data | CVE-2023-38469 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_dns_packet_append_record 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libavahi-common-data | CVE-2023-38470 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_escape_label 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libfribidi0 | CVE-2022-25309 | 中危 | 1.0.8-2 | 1.0.8-2+deb11u1 | fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25309 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-06 18:15 修改: 2023-02-12 22:15 | 
                            
                            
                                | libfribidi0 | CVE-2022-25310 | 中危 | 1.0.8-2 | 1.0.8-2+deb11u1 | fribidi: SEGV in fribidi_remove_bidi_marks 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25310 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-06 18:15 修改: 2023-06-23 17:50 | 
                            
                            
                                | libavahi-common-data | CVE-2023-38471 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in dbus_set_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libgcrypt20 | CVE-2024-2236 | 中危 | 1.8.7-6 |  | libgcrypt: vulnerable to Marvin Attack 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2236 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-03-06 22:15 修改: 2024-11-12 18:15 | 
                            
                            
                                | libgd3 | CVE-2021-38115 | 中危 | 2.3.0-2 |  | read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) thr ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38115 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-08-04 21:15 修改: 2024-04-07 01:17 | 
                            
                            
                                | policykit-1 | CVE-2021-4115 | 中危 | 0.105-31+deb11u1 |  | polkit: file descriptor leak allows an unprivileged user to cause a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4115 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-02-21 22:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libgd3 | CVE-2021-40812 | 中危 | 2.3.0-2 |  | The GD Graphics Library (aka LibGD) through 2.3.2 has an out-of-bounds ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40812 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-09-08 21:15 修改: 2024-10-29 14:35 | 
                            
                            
                                | libavahi-common-data | CVE-2023-38472 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_rdata_parse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | python3-cryptography | CVE-2023-23931 | 中危 | 3.3.2-1 | 3.3.2-1+deb11u1 | python-cryptography: memory corruption via immutable objects 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23931 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-07 21:15 修改: 2024-09-05 16:09 | 
                            
                            
                                | libavahi-common-data | CVE-2023-38473 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_alternative_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46 | 
                            
                            
                                | python3-jwcrypto | CVE-2023-6681 | 中危 | 0.8.0-1 |  | JWCrypto: denail of service  Via specifically crafted JWE 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6681 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-12 14:15 修改: 2024-11-12 18:15 | 
                            
                            
                                | python3-jwcrypto | CVE-2024-28102 | 中危 | 0.8.0-1 | 0.8.0-1+deb11u1 | python-jwcrypto: malicious JWE token can cause denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28102 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-21 02:52 修改: 2024-03-21 12:58 | 
                            
                            
                                | python3-numpy | CVE-2021-33430 | 中危 | 1:1.19.5-1 |  | numpy: buffer overflow in the PyArray_NewFromDescr_int() in ctors.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33430 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-12-17 19:15 修改: 2024-08-04 00:15 | 
                            
                            
                                | python3-oslo.utils | CVE-2022-0718 | 中危 | 4.6.0-2 |  | python-oslo-utils: incorrect password masking in debug output 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0718 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-29 15:15 修改: 2023-07-21 17:12 | 
                            
                            
                                | libavahi-common-data | CVE-2024-52615 | 中危 | 0.8-5 |  | avahi: Avahi Wide-Area DNS Uses Constant Source Port 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52615 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-21 21:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | libavahi-common-data | CVE-2024-52616 | 中危 | 0.8-5 |  | avahi: Avahi Wide-Area DNS Predictable Transaction IDs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52616 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-21 21:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | libavahi-common3 | CVE-2021-3468 | 中危 | 0.8-5 | 0.8-5+deb11u2 | avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3468 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-06-02 16:15 修改: 2023-06-22 02:15 | 
                            
                            
                                | libavahi-common3 | CVE-2021-3502 | 中危 | 0.8-5 | 0.8-5+deb11u1 | avahi: reachable assertion in avahi_s_host_name_resolver_start when trying to resolve badly-formatted hostnames 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3502 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-07 12:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libavahi-common3 | CVE-2023-1981 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: avahi-daemon can be crashed via DBus 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1981 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-26 18:15 修改: 2025-01-15 22:15 | 
                            
                            
                                | python3-pil | CVE-2024-28219 | 中危 | 8.1.2+dfsg-0.3+deb11u1 | 8.1.2+dfsg-0.3+deb11u2 | python-pillow: buffer overflow in _imagingcms.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-04-03 03:15 修改: 2024-08-20 20:35 | 
                            
                            
                                | libavahi-common3 | CVE-2023-38469 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_dns_packet_append_record 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | python3-pkg-resources | CVE-2022-40897 | 中危 | 52.0.0-4 | 52.0.0-4+deb11u1 | pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40897 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-23 00:15 修改: 2024-10-29 15:35 | 
                            
                            
                                | python3-pygments | CVE-2022-40896 | 中危 | 2.7.1+dfsg-2.1 |  | pygments: ReDoS in pygments 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40896 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-07-19 15:15 修改: 2024-03-28 03:15 | 
                            
                            
                                | python3-requests | CVE-2023-32681 | 中危 | 2.25.1+dfsg-2 |  | python-requests: Unintended leak of Proxy-Authorization header 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32681 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-26 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | python3-requests | CVE-2024-35195 | 中危 | 2.25.1+dfsg-2 |  | requests: subsequent requests to the same host ignore cert verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35195 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-20 21:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | libavahi-common3 | CVE-2023-38470 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_escape_label 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | python3-setuptools | CVE-2022-40897 | 中危 | 52.0.0-4 | 52.0.0-4+deb11u1 | pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40897 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-23 00:15 修改: 2024-10-29 15:35 | 
                            
                            
                                | libavahi-common3 | CVE-2023-38471 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in dbus_set_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | python3-urllib3 | CVE-2023-45803 | 中危 | 1.26.5-1~exp1 | 1.26.5-1~exp1+deb11u1 | urllib3: Request body not stripped after redirect from 303 status changes request method to GET 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45803 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-17 20:15 修改: 2023-11-03 22:15 | 
                            
                            
                                | python3-urllib3 | CVE-2024-37891 | 中危 | 1.26.5-1~exp1 | 1.26.5-1~exp1+deb11u1 | urllib3: proxy-authorization request header is not stripped during cross-origin redirects 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37891 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44 | 
                            
                            
                                | python3-zipp | CVE-2024-5569 | 中危 | 1.0.0-3 |  | github.com/jaraco/zipp: Denial of Service (infinite loop) via crafted zip file in jaraco/zipp 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5569 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-07-09 00:15 修改: 2024-07-09 18:19 | 
                            
                            
                                | libavahi-common3 | CVE-2023-38472 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_rdata_parse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libglib2.0-0 | CVE-2023-32611 | 中危 | 2.66.8-1 | 2.66.8-1+deb11u1 | glib: g_variant_byteswap() can take a long time with some non-normal inputs 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32611 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-0 | CVE-2023-32665 | 中危 | 2.66.8-1 | 2.66.8-1+deb11u1 | glib: GVariant deserialisation does not match spec for non-normal data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32665 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-09-14 20:15 修改: 2024-04-26 09:15 | 
                            
                            
                                | libavahi-common3 | CVE-2023-38473 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_alternative_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46 | 
                            
                            
                                | libavahi-common3 | CVE-2024-52615 | 中危 | 0.8-5 |  | avahi: Avahi Wide-Area DNS Uses Constant Source Port 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52615 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-21 21:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | libglib2.0-bin | CVE-2023-32611 | 中危 | 2.66.8-1 | 2.66.8-1+deb11u1 | glib: g_variant_byteswap() can take a long time with some non-normal inputs 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32611 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-bin | CVE-2023-32665 | 中危 | 2.66.8-1 | 2.66.8-1+deb11u1 | glib: GVariant deserialisation does not match spec for non-normal data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32665 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-09-14 20:15 修改: 2024-04-26 09:15 | 
                            
                            
                                | libavahi-common3 | CVE-2024-52616 | 中危 | 0.8-5 |  | avahi: Avahi Wide-Area DNS Predictable Transaction IDs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52616 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-21 21:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | libavahi-core7 | CVE-2021-3468 | 中危 | 0.8-5 | 0.8-5+deb11u2 | avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3468 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-06-02 16:15 修改: 2023-06-22 02:15 | 
                            
                            
                                | libglib2.0-data | CVE-2023-32611 | 中危 | 2.66.8-1 | 2.66.8-1+deb11u1 | glib: g_variant_byteswap() can take a long time with some non-normal inputs 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32611 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-09-14 20:15 修改: 2023-11-27 14:15 | 
                            
                            
                                | libglib2.0-data | CVE-2023-32665 | 中危 | 2.66.8-1 | 2.66.8-1+deb11u1 | glib: GVariant deserialisation does not match spec for non-normal data 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32665 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-09-14 20:15 修改: 2024-04-26 09:15 | 
                            
                            
                                | libavahi-core7 | CVE-2021-3502 | 中危 | 0.8-5 | 0.8-5+deb11u1 | avahi: reachable assertion in avahi_s_host_name_resolver_start when trying to resolve badly-formatted hostnames 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3502 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-05-07 12:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | python3.9 | CVE-2021-3426 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Information disclosure via pydoc 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3426 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-20 13:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | python3.9 | CVE-2021-3733 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-03-10 17:42 修改: 2023-06-30 23:15 | 
                            
                            
                                | python3.9 | CVE-2021-4189 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: ftplib should not use the host from the PASV response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-24 16:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | python3.9 | CVE-2023-27043 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python3.9 | CVE-2023-40217 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: TLS handshake bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-08-25 01:15 修改: 2023-11-07 04:20 | 
                            
                            
                                | python3.9 | CVE-2024-0397 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | cpython: python: Memory race condition in ssl.SSLContext certificate store methods 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | python3.9 | CVE-2024-0450 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python3.9 | CVE-2024-6923 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-01 14:15 修改: 2025-01-11 15:15 | 
                            
                            
                                | python3.9 | CVE-2024-8088 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | python3.9 | CVE-2024-9287 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Virtual environment (venv) activation scripts don't quote paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15 | 
                            
                            
                                | libavahi-core7 | CVE-2023-1981 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: avahi-daemon can be crashed via DBus 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1981 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-05-26 18:15 修改: 2025-01-15 22:15 | 
                            
                            
                                | libavahi-core7 | CVE-2023-38469 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_dns_packet_append_record 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libavahi-core7 | CVE-2023-38470 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_escape_label 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libgnutls30 | CVE-2021-4209 | 中危 | 3.7.1-5 | 3.7.1-5+deb11u1 | GnuTLS: Null pointer dereference in MD_UPDATE 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4209 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-08-24 16:15 修改: 2022-10-27 16:57 | 
                            
                            
                                | libgnutls30 | CVE-2023-5981 | 中危 | 3.7.1-5 | 3.7.1-5+deb11u4 | gnutls: timing side-channel in the RSA-PSK authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-11-28 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | libgnutls30 | CVE-2024-28834 | 中危 | 3.7.1-5 | 3.7.1-5+deb11u6 | gnutls: vulnerable to Minerva side-channel information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28834 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-03-21 14:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | libgnutls30 | CVE-2024-28835 | 中危 | 3.7.1-5 | 3.7.1-5+deb11u6 | gnutls: potential crash during chain building/verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28835 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-03-21 06:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libavahi-core7 | CVE-2023-38471 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in dbus_set_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libavahi-core7 | CVE-2023-38472 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_rdata_parse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58 | 
                            
                            
                                | libavahi-core7 | CVE-2023-38473 | 中危 | 0.8-5 | 0.8-5+deb11u3 | avahi: Reachable assertion in avahi_alternative_host_name 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2023-36054 | 中危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | libavahi-core7 | CVE-2024-52615 | 中危 | 0.8-5 |  | avahi: Avahi Wide-Area DNS Uses Constant Source Port 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52615 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-21 21:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | python3.9-minimal | CVE-2021-3426 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Information disclosure via pydoc 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3426 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-20 13:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | python3.9-minimal | CVE-2021-3733 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-03-10 17:42 修改: 2023-06-30 23:15 | 
                            
                            
                                | python3.9-minimal | CVE-2021-4189 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: ftplib should not use the host from the PASV response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-24 16:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | python3.9-minimal | CVE-2023-27043 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python3.9-minimal | CVE-2023-40217 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: TLS handshake bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-08-25 01:15 修改: 2023-11-07 04:20 | 
                            
                            
                                | python3.9-minimal | CVE-2024-0397 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | cpython: python: Memory race condition in ssl.SSLContext certificate store methods 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | python3.9-minimal | CVE-2024-0450 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python3.9-minimal | CVE-2024-6923 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-01 14:15 修改: 2025-01-11 15:15 | 
                            
                            
                                | python3.9-minimal | CVE-2024-8088 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | python3.9-minimal | CVE-2024-9287 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Virtual environment (venv) activation scripts don't quote paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15 | 
                            
                            
                                | libavahi-core7 | CVE-2024-52616 | 中危 | 0.8-5 |  | avahi: Avahi Wide-Area DNS Predictable Transaction IDs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52616 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-21 21:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | bind9-host | CVE-2022-2795 | 中危 | 1:9.16.27-1~deb11u1 | 1:9.16.33-1~deb11u1 | bind: processing large delegations may severely degrade resolver performance 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2795 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-09-21 11:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | sudo | CVE-2023-28486 | 中危 | 1.9.5p2-3 |  | sudo: Sudo does not escape control characters in log messages 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28486 镜像层: sha256:ea2e5a084e30f7b660444743088d544904ec3d20671381d183c7c09f39c081a6 发布日期: 2023-03-16 01:15 修改: 2024-02-03 11:15 | 
                            
                            
                                | sudo | CVE-2023-28487 | 中危 | 1.9.5p2-3 |  | sudo: Sudo does not escape control characters in sudoreplay output 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28487 镜像层: sha256:ea2e5a084e30f7b660444743088d544904ec3d20671381d183c7c09f39c081a6 发布日期: 2023-03-16 01:15 修改: 2024-02-03 11:15 | 
                            
                            
                                | avahi-daemon | CVE-2021-3468 | 中危 | 0.8-5 | 0.8-5+deb11u2 | avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3468 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-06-02 16:15 修改: 2023-06-22 02:15 | 
                            
                            
                                | curl | CVE-2021-22947 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Server responses received before STARTTLS processed after TLS handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03 | 
                            
                            
                                | systemd | CVE-2022-3821 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: buffer overrun in format_timespan() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-08 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | systemd | CVE-2022-4415 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19 | 
                            
                            
                                | systemd | CVE-2023-7008 | 中危 | 247.3-7 | 247.3-7+deb11u6 | systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libavcodec58 | CVE-2022-3341 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.6-0+deb11u1 | A null pointer dereference issue was discovered in 'FFmpeg' in decode_ ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3341 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-01-12 15:15 修改: 2023-06-13 17:15 | 
                            
                            
                                | libavcodec58 | CVE-2023-49502 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.8-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49502 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42 | 
                            
                            
                                | systemd-sysv | CVE-2022-3821 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: buffer overrun in format_timespan() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-08 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | systemd-sysv | CVE-2022-4415 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19 | 
                            
                            
                                | systemd-sysv | CVE-2023-7008 | 中危 | 247.3-7 | 247.3-7+deb11u6 | systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libavcodec58 | CVE-2023-50010 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50010 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42 | 
                            
                            
                                | libavcodec58 | CVE-2023-51793 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51793 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43 | 
                            
                            
                                | systemd-timesyncd | CVE-2022-3821 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: buffer overrun in format_timespan() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-08 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | systemd-timesyncd | CVE-2022-4415 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19 | 
                            
                            
                                | systemd-timesyncd | CVE-2023-7008 | 中危 | 247.3-7 | 247.3-7+deb11u6 | systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libavcodec58 | CVE-2023-51794 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51794 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-26 15:15 修改: 2024-08-01 13:45 | 
                            
                            
                                | libavcodec58 | CVE-2023-51798 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51798 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43 | 
                            
                            
                                | udev | CVE-2022-3821 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: buffer overrun in format_timespan() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-11-08 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | udev | CVE-2022-4415 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19 | 
                            
                            
                                | udev | CVE-2023-7008 | 中危 | 247.3-7 | 247.3-7+deb11u6 | systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libharfbuzz0b | CVE-2022-33068 | 中危 | 2.7.4-1 |  | harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33068 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-06-23 17:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libavcodec58 | CVE-2024-31578 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.8-0+deb11u1 | FFmpeg version n6.1.1 was discovered to contain a heap use-after-free  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31578 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-17 14:15 修改: 2024-07-03 01:55 | 
                            
                            
                                | libavcodec58 | CVE-2024-7055 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.8-0+deb11u1 | A vulnerability was found in FFmpeg up to 7.0.1. It has been classifie ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7055 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-08-06 06:15 修改: 2024-08-06 16:30 | 
                            
                            
                                | git | CVE-2022-39253 | 中危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 | git: exposure of sensitive information to a malicious actor 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39253 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-19 11:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libjpeg-turbo-progs | CVE-2021-46822 | 中危 | 1:2.0.6-4 |  | libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46822 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-18 16:15 修改: 2022-08-15 15:52 | 
                            
                            
                                | libjpeg62-turbo | CVE-2021-46822 | 中危 | 1:2.0.6-4 |  | libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46822 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-18 16:15 修改: 2022-08-15 15:52 | 
                            
                            
                                | git | CVE-2023-22490 | 中危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u2 | git: data exfiltration with maliciously crafted repository 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22490 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-14 20:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git | CVE-2024-52006 | 中危 | 1:2.30.2-1 |  | git: Newline confusion in credential helpers can lead to credential exfiltration in git 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52006 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2025-01-14 19:15 修改: 2025-01-14 19:15 | 
                            
                            
                                | libavresample4 | CVE-2022-3341 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.6-0+deb11u1 | A null pointer dereference issue was discovered in 'FFmpeg' in decode_ ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3341 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-01-12 15:15 修改: 2023-06-13 17:15 | 
                            
                            
                                | libavresample4 | CVE-2023-49502 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.8-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49502 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42 | 
                            
                            
                                | libk5crypto3 | CVE-2023-36054 | 中危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | libavresample4 | CVE-2023-50010 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50010 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42 | 
                            
                            
                                | libavresample4 | CVE-2023-51793 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51793 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43 | 
                            
                            
                                | libavresample4 | CVE-2023-51794 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51794 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-26 15:15 修改: 2024-08-01 13:45 | 
                            
                            
                                | libkrb5-3 | CVE-2023-36054 | 中危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | libavresample4 | CVE-2023-51798 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51798 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43 | 
                            
                            
                                | libavresample4 | CVE-2024-31578 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.8-0+deb11u1 | FFmpeg version n6.1.1 was discovered to contain a heap use-after-free  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31578 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-17 14:15 修改: 2024-07-03 01:55 | 
                            
                            
                                | libavresample4 | CVE-2024-7055 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.8-0+deb11u1 | A vulnerability was found in FFmpeg up to 7.0.1. It has been classifie ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7055 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-08-06 06:15 修改: 2024-08-06 16:30 | 
                            
                            
                                | libkrb5support0 | CVE-2023-36054 | 中危 | 1.18.3-6+deb11u1 | 1.18.3-6+deb11u4 | krb5: Denial of service through freeing uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36054 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-08-07 19:15 修改: 2023-11-15 03:23 | 
                            
                            
                                | curl | CVE-2022-27774 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: credential leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | curl | CVE-2022-27776 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: auth/cookie leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | curl | CVE-2022-32205 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Set-Cookie denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32205 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libavutil56 | CVE-2022-3341 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.6-0+deb11u1 | A null pointer dereference issue was discovered in 'FFmpeg' in decode_ ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3341 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-01-12 15:15 修改: 2023-06-13 17:15 | 
                            
                            
                                | libavutil56 | CVE-2023-49502 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.8-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49502 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42 | 
                            
                            
                                | libmagic-mgc | CVE-2022-48554 | 中危 | 1:5.39-3 | 1:5.39-3+deb11u1 | file: stack-based buffer over-read in file_copystr in funcs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48554 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-08-22 19:16 修改: 2024-03-13 22:15 | 
                            
                            
                                | libmagic1 | CVE-2022-48554 | 中危 | 1:5.39-3 | 1:5.39-3+deb11u1 | file: stack-based buffer over-read in file_copystr in funcs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48554 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-08-22 19:16 修改: 2024-03-13 22:15 | 
                            
                            
                                | libavutil56 | CVE-2023-50010 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50010 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42 | 
                            
                            
                                | libavutil56 | CVE-2023-51793 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51793 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43 | 
                            
                            
                                | libavutil56 | CVE-2023-51794 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51794 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-26 15:15 修改: 2024-08-01 13:45 | 
                            
                            
                                | libmfx1 | CVE-2022-35883 | 中危 | 21.1.0-1 |  | NULL pointer dereference in the Intel(R) Media SDK software before ver ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35883 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-02-16 21:15 修改: 2023-02-27 19:09 | 
                            
                            
                                | libmfx1 | CVE-2022-36289 | 中危 | 21.1.0-1 |  | Protection mechanism failure in the Intel(R) Media SDK software before ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36289 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-02-16 21:15 修改: 2023-02-27 18:52 | 
                            
                            
                                | vim | CVE-2023-1175 | 中危 | 2:8.2.2434-3+deb11u1 |  | vim: Incorrect Calculation of Buffer Size 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1175 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-04 16:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | vim | CVE-2023-2426 | 中危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-range Pointer offset in mb_charlen() of mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2426 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-04-29 22:15 修改: 2023-12-23 07:15 | 
                            
                            
                                | vim | CVE-2024-43802 | 中危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap Buffer Overflow in Vim's Typeahead Buffer Handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43802 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-26 19:15 修改: 2024-08-27 13:02 | 
                            
                            
                                | libmfx1 | CVE-2023-45221 | 中危 | 21.1.0-1 |  | Improper buffer restrictions in Intel(R) Media SDK all versions may al ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45221 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-05-16 21:15 修改: 2024-05-17 18:36 | 
                            
                            
                                | libmfx1 | CVE-2023-47169 | 中危 | 21.1.0-1 |  | Improper buffer restrictions in Intel(R) Media SDK software all versio ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47169 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-05-16 21:16 修改: 2024-07-03 01:42 | 
                            
                            
                                | libmfx1 | CVE-2023-48368 | 中危 | 21.1.0-1 |  | Improper input validation in Intel(R) Media SDK software all versions  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48368 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-05-16 21:16 修改: 2024-07-03 01:42 | 
                            
                            
                                | libavutil56 | CVE-2023-51798 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51798 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43 | 
                            
                            
                                | libavutil56 | CVE-2024-31578 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.8-0+deb11u1 | FFmpeg version n6.1.1 was discovered to contain a heap use-after-free  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31578 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-17 14:15 修改: 2024-07-03 01:55 | 
                            
                            
                                | libavutil56 | CVE-2024-7055 | 中危 | 7:4.3.4-0+deb11u1 | 7:4.3.8-0+deb11u1 | A vulnerability was found in FFmpeg up to 7.0.1. It has been classifie ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7055 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-08-06 06:15 修改: 2024-08-06 16:30 | 
                            
                            
                                | libncurses6 | CVE-2023-50495 | 中危 | 6.2+20201114-2 |  | ncurses: segmentation fault via _nc_wrap_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | curl | CVE-2022-32206 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: HTTP compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | curl | CVE-2022-32208 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: FTP-KRB bad message verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libncursesw6 | CVE-2023-50495 | 中危 | 6.2+20201114-2 |  | ncurses: segmentation fault via _nc_wrap_entry() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15 | 
                            
                            
                                | curl | CVE-2022-43552 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u5 | curl: Use-after-free triggered by an HTTP proxy deny response 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35 | 
                            
                            
                                | libnghttp2-14 | CVE-2024-28182 | 中危 | 1.43.0-1 | 1.43.0-1+deb11u2 | nghttp2: CONTINUATION frames DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28182 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-04-04 15:15 修改: 2024-05-01 18:15 | 
                            
                            
                                | curl | CVE-2023-23915 | 中危 | 7.74.0-1.3+deb11u1 |  | curl: HSTS amnesia with --parallel 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23915 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55 | 
                            
                            
                                | curl | CVE-2023-23916 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u7 | curl: HTTP multi-header compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libnss-systemd | CVE-2022-3821 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: buffer overrun in format_timespan() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-08 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | libnss-systemd | CVE-2022-4415 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19 | 
                            
                            
                                | libnss-systemd | CVE-2023-7008 | 中危 | 247.3-7 | 247.3-7+deb11u6 | systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | curl | CVE-2023-27535 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: FTP too eager connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47 | 
                            
                            
                                | libc-bin | CVE-2023-4806 | 中危 | 2.31-13+deb11u3 |  | glibc: potential use-after-free in getaddrinfo() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | libc-bin | CVE-2023-4813 | 中危 | 2.31-13+deb11u3 |  | glibc: potential use-after-free in gaih_inet() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | libnss3 | CVE-2023-5388 | 中危 | 2:3.61-1+deb11u2 |  | nss: timing attack against RSA decryption 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5388 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-19 12:15 修改: 2024-11-14 22:35 | 
                            
                            
                                | libnss3 | CVE-2023-6135 | 中危 | 2:3.61-1+deb11u2 |  | nss: vulnerable to Minerva side-channel information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6135 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-12-19 14:15 修改: 2024-01-07 11:15 | 
                            
                            
                                | libnss3 | CVE-2024-6602 | 中危 | 2:3.61-1+deb11u2 | 2:3.61-1+deb11u4 | Mozilla: Memory corruption in NSS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6602 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-09 15:15 修改: 2024-11-26 14:15 | 
                            
                            
                                | libc-bin | CVE-2024-33600 | 中危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: null pointer dereferences after failed netgroup cache insertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libopenjp2-7 | CVE-2021-29338 | 中危 | 2.4.0-3 |  | openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29338 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-04-14 14:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | libopenjp2-7 | CVE-2022-1122 | 中危 | 2.4.0-3 |  | openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1122 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-03-29 18:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | libopenjp2-7 | CVE-2023-39327 | 中危 | 2.4.0-3 |  | openjpeg: Malicious files can cause the program to enter a large loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39327 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-13 03:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | libopenjp2-7 | CVE-2023-39328 | 中危 | 2.4.0-3 |  | openjpeg: denail of service via crafted image file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39328 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-09 14:15 修改: 2024-07-09 18:19 | 
                            
                            
                                | libopenjp2-7 | CVE-2023-39329 | 中危 | 2.4.0-3 |  | openjpeg: Resource exhaustion will occur in the opj_t1_decode_cblks function in the tcd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39329 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-13 03:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | vim-common | CVE-2023-1175 | 中危 | 2:8.2.2434-3+deb11u1 |  | vim: Incorrect Calculation of Buffer Size 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1175 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-04 16:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | vim-common | CVE-2023-2426 | 中危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-range Pointer offset in mb_charlen() of mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2426 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-04-29 22:15 修改: 2023-12-23 07:15 | 
                            
                            
                                | vim-common | CVE-2024-43802 | 中危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap Buffer Overflow in Vim's Typeahead Buffer Handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43802 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-26 19:15 修改: 2024-08-27 13:02 | 
                            
                            
                                | libopenjp2-7 | CVE-2024-56826 | 中危 | 2.4.0-3 |  | openjpeg: heap buffer overflow in bin/common/color.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56826 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-09 04:15 修改: 2025-01-09 04:15 | 
                            
                            
                                | libopenjp2-7 | CVE-2024-56827 | 中危 | 2.4.0-3 |  | openjpeg: heap buffer overflow in lib/openjp2/j2k.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56827 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-09 04:15 修改: 2025-01-09 04:15 | 
                            
                            
                                | liborc-0.4-0 | CVE-2024-40897 | 中危 | 1:0.4.32-1 |  | orc: Stack-based buffer overflow vulnerability in ORC 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40897 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-07-26 06:15 修改: 2024-08-27 13:52 | 
                            
                            
                                | libc-bin | CVE-2024-33601 | 中危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: netgroup cache may terminate daemon on memory allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libpam-modules | CVE-2024-10041 | 中危 | 1.4.0-9+deb11u1 |  | pam: libpam: Libpam vulnerable to read hashed password 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15 | 
                            
                            
                                | libpam-modules | CVE-2024-22365 | 中危 | 1.4.0-9+deb11u1 |  | pam: allowing unprivileged user to block another user namespace 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27 | 
                            
                            
                                | libpam-modules-bin | CVE-2024-10041 | 中危 | 1.4.0-9+deb11u1 |  | pam: libpam: Libpam vulnerable to read hashed password 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15 | 
                            
                            
                                | libpam-modules-bin | CVE-2024-22365 | 中危 | 1.4.0-9+deb11u1 |  | pam: allowing unprivileged user to block another user namespace 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27 | 
                            
                            
                                | libpam-runtime | CVE-2024-10041 | 中危 | 1.4.0-9+deb11u1 |  | pam: libpam: Libpam vulnerable to read hashed password 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15 | 
                            
                            
                                | libpam-runtime | CVE-2024-22365 | 中危 | 1.4.0-9+deb11u1 |  | pam: allowing unprivileged user to block another user namespace 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27 | 
                            
                            
                                | libc-bin | CVE-2024-33602 | 中危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: netgroup cache assumes NSS callback uses in-buffer strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | curl | CVE-2023-27536 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: GSS delegation too eager connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libpam-systemd | CVE-2022-3821 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: buffer overrun in format_timespan() function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3821 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-11-08 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | libpam-systemd | CVE-2022-4415 | 中危 | 247.3-7 | 247.3-7+deb11u2 | systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19 | 
                            
                            
                                | libpam-systemd | CVE-2023-7008 | 中危 | 247.3-7 | 247.3-7+deb11u6 | systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | libpam0g | CVE-2024-10041 | 中危 | 1.4.0-9+deb11u1 |  | pam: libpam: Libpam vulnerable to read hashed password 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15 | 
                            
                            
                                | libpam0g | CVE-2024-22365 | 中危 | 1.4.0-9+deb11u1 |  | pam: allowing unprivileged user to block another user namespace 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27 | 
                            
                            
                                | curl | CVE-2023-27538 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u8 | curl: SSH connection too eager reuse still 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | curl | CVE-2023-28321 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u9 | curl: IDN wildcard match may lead to Improper Cerificate Validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28321 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-26 21:15 修改: 2025-01-15 16:15 | 
                            
                            
                                | git-man | CVE-2022-39253 | 中危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u1 | git: exposure of sensitive information to a malicious actor 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39253 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-19 11:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libc-l10n | CVE-2023-4806 | 中危 | 2.31-13+deb11u3 |  | glibc: potential use-after-free in getaddrinfo() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | libc-l10n | CVE-2023-4813 | 中危 | 2.31-13+deb11u3 |  | glibc: potential use-after-free in gaih_inet() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | libc-l10n | CVE-2024-33600 | 中危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: null pointer dereferences after failed netgroup cache insertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libpolkit-agent-1-0 | CVE-2021-4115 | 中危 | 0.105-31+deb11u1 |  | polkit: file descriptor leak allows an unprivileged user to cause a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4115 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-02-21 22:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libpolkit-gobject-1-0 | CVE-2021-4115 | 中危 | 0.105-31+deb11u1 |  | polkit: file descriptor leak allows an unprivileged user to cause a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4115 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-02-21 22:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | libc-l10n | CVE-2024-33601 | 中危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: netgroup cache may terminate daemon on memory allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libpoppler-glib8 | CVE-2020-36023 | 中危 | 20.09.0-3.1 |  | poppler: Stack-Overflow in `FoFiType1C::cvtGlyph` 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36023 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-08-11 14:15 修改: 2023-09-27 16:17 | 
                            
                            
                                | libpoppler-glib8 | CVE-2020-36024 | 中危 | 20.09.0-3.1 |  | poppler: NULL pointer dereference in `FoFiType1C::convertToType1` 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36024 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-08-11 14:15 修改: 2023-08-17 02:09 | 
                            
                            
                                | libpoppler-glib8 | CVE-2022-27337 | 中危 | 20.09.0-3.1 | 20.09.0-3.1+deb11u1 | poppler: A logic error in the Hints::Hints function can cause denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27337 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-05-05 19:15 修改: 2023-11-07 03:45 | 
                            
                            
                                | vim-runtime | CVE-2023-1175 | 中危 | 2:8.2.2434-3+deb11u1 |  | vim: Incorrect Calculation of Buffer Size 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1175 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-04 16:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | vim-runtime | CVE-2023-2426 | 中危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-range Pointer offset in mb_charlen() of mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2426 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-04-29 22:15 修改: 2023-12-23 07:15 | 
                            
                            
                                | vim-runtime | CVE-2024-43802 | 中危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap Buffer Overflow in Vim's Typeahead Buffer Handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43802 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-26 19:15 修改: 2024-08-27 13:02 | 
                            
                            
                                | libpoppler-glib8 | CVE-2022-37050 | 中危 | 20.09.0-3.1 |  | poppler: abort in PDFDoc::savePageAs in PDFDoc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37050 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-08-22 19:16 修改: 2023-12-08 20:57 | 
                            
                            
                                | wget | CVE-2021-31879 | 中危 | 1.21-1+deb11u1 |  | wget: authorization header disclosure on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31879 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-04-29 05:15 修改: 2022-05-13 20:52 | 
                            
                            
                                | wget | CVE-2024-10524 | 中危 | 1.21-1+deb11u1 |  | wget: GNU Wget is vulnerable to an SSRF attack when accessing partially-user-controlled shorthand URLs 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10524 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-19 15:15 修改: 2024-11-19 21:57 | 
                            
                            
                                | libpoppler-glib8 | CVE-2022-37051 | 中危 | 20.09.0-3.1 |  | poppler: abort in main() in pdfunite.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37051 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-08-22 19:16 修改: 2023-12-08 20:53 | 
                            
                            
                                | libpoppler-glib8 | CVE-2022-37052 | 中危 | 20.09.0-3.1 |  | poppler: reachable assertion due to a failure in markObject() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37052 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-08-22 19:16 修改: 2023-08-25 20:17 | 
                            
                            
                                | libpoppler-glib8 | CVE-2022-38349 | 中危 | 20.09.0-3.1 |  | poppler: Reachable assertion in Object.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38349 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-08-22 19:16 修改: 2023-08-28 18:29 | 
                            
                            
                                | libpoppler-glib8 | CVE-2024-56378 | 中危 | 20.09.0-3.1 |  | Poppler: out-of-bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56378 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-23 00:15 修改: 2024-12-26 20:15 | 
                            
                            
                                | libc-l10n | CVE-2024-33602 | 中危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: netgroup cache assumes NSS callback uses in-buffer strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libpoppler102 | CVE-2020-36023 | 中危 | 20.09.0-3.1 |  | poppler: Stack-Overflow in `FoFiType1C::cvtGlyph` 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36023 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-08-11 14:15 修改: 2023-09-27 16:17 | 
                            
                            
                                | libpoppler102 | CVE-2020-36024 | 中危 | 20.09.0-3.1 |  | poppler: NULL pointer dereference in `FoFiType1C::convertToType1` 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36024 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-08-11 14:15 修改: 2023-08-17 02:09 | 
                            
                            
                                | libpoppler102 | CVE-2022-27337 | 中危 | 20.09.0-3.1 | 20.09.0-3.1+deb11u1 | poppler: A logic error in the Hints::Hints function can cause denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27337 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-05-05 19:15 修改: 2023-11-07 03:45 | 
                            
                            
                                | libpoppler102 | CVE-2022-37050 | 中危 | 20.09.0-3.1 |  | poppler: abort in PDFDoc::savePageAs in PDFDoc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37050 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-08-22 19:16 修改: 2023-12-08 20:57 | 
                            
                            
                                | libpoppler102 | CVE-2022-37051 | 中危 | 20.09.0-3.1 |  | poppler: abort in main() in pdfunite.cc 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37051 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-08-22 19:16 修改: 2023-12-08 20:53 | 
                            
                            
                                | libpoppler102 | CVE-2022-37052 | 中危 | 20.09.0-3.1 |  | poppler: reachable assertion due to a failure in markObject() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37052 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-08-22 19:16 修改: 2023-08-25 20:17 | 
                            
                            
                                | libpoppler102 | CVE-2022-38349 | 中危 | 20.09.0-3.1 |  | poppler: Reachable assertion in Object.h 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38349 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-08-22 19:16 修改: 2023-08-28 18:29 | 
                            
                            
                                | libpoppler102 | CVE-2024-56378 | 中危 | 20.09.0-3.1 |  | Poppler: out-of-bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56378 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-23 00:15 修改: 2024-12-26 20:15 | 
                            
                            
                                | libprotobuf-c1 | CVE-2022-33070 | 中危 | 1.3.3-1+b2 |  | protobuf-c: invalid arithmetic shift via the function parse_tag_and_wiretype may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33070 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-06-23 17:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libprotobuf-c1 | CVE-2022-48468 | 中危 | 1.3.3-1+b2 |  | protobuf-c: unsigned integer overflow in parse_required_member 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48468 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-04-13 21:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | git-man | CVE-2023-22490 | 中危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u2 | git: data exfiltration with maliciously crafted repository 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22490 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-14 20:15 修改: 2023-12-27 10:15 | 
                            
                            
                                | git-man | CVE-2024-52006 | 中危 | 1:2.30.2-1 |  | git: Newline confusion in credential helpers can lead to credential exfiltration in git 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52006 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2025-01-14 19:15 修改: 2025-01-14 19:15 | 
                            
                            
                                | gnupg | CVE-2022-34903 | 中危 | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gnupg-l10n | CVE-2022-34903 | 中危 | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libc6 | CVE-2023-4806 | 中危 | 2.31-13+deb11u3 |  | glibc: potential use-after-free in getaddrinfo() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | libc6 | CVE-2023-4813 | 中危 | 2.31-13+deb11u3 |  | glibc: potential use-after-free in gaih_inet() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15 | 
                            
                            
                                | libc6 | CVE-2024-33600 | 中危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: null pointer dereferences after failed netgroup cache insertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc6 | CVE-2024-33601 | 中危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: netgroup cache may terminate daemon on memory allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libc6 | CVE-2024-33602 | 中危 | 2.31-13+deb11u3 | 2.31-13+deb11u10 | glibc: netgroup cache assumes NSS callback uses in-buffer strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | xserver-common | CVE-2022-3551 | 中危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u3 | xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3551 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-17 13:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | xserver-common | CVE-2023-5380 | 中危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u8 | xorg-x11-server: Use-after-free bug in DestroyWindow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5380 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-25 20:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | xserver-common | CVE-2024-0408 | 中危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u11 | xorg-x11-server: SELinux unlabeled GLX PBuffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0408 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-01-18 16:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | gnupg-utils | CVE-2022-34903 | 中危 | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gnupg2 | CVE-2022-34903 | 中危 | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpg | CVE-2022-34903 | 中危 | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libpython3.9-minimal | CVE-2021-3426 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Information disclosure via pydoc 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3426 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-20 13:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libpython3.9-minimal | CVE-2021-3733 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-03-10 17:42 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython3.9-minimal | CVE-2021-4189 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: ftplib should not use the host from the PASV response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-24 16:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython3.9-minimal | CVE-2023-27043 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | libpython3.9-minimal | CVE-2023-40217 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: TLS handshake bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-08-25 01:15 修改: 2023-11-07 04:20 | 
                            
                            
                                | libpython3.9-minimal | CVE-2024-0397 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | cpython: python: Memory race condition in ssl.SSLContext certificate store methods 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | libpython3.9-minimal | CVE-2024-0450 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libpython3.9-minimal | CVE-2024-6923 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-01 14:15 修改: 2025-01-11 15:15 | 
                            
                            
                                | libpython3.9-minimal | CVE-2024-8088 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | libpython3.9-minimal | CVE-2024-9287 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Virtual environment (venv) activation scripts don't quote paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15 | 
                            
                            
                                | gpg-agent | CVE-2022-34903 | 中危 | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpg-wks-client | CVE-2022-34903 | 中危 | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpg-wks-server | CVE-2022-34903 | 中危 | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libcups2 | CVE-2022-26691 | 中危 | 2.3.3op2-3+deb11u1 | 2.3.3op2-3+deb11u2 | cups: authorization bypass when using "local" authorization 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26691 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-05-26 18:15 修改: 2023-11-07 03:45 | 
                            
                            
                                | libcups2 | CVE-2023-32324 | 中危 | 2.3.3op2-3+deb11u1 | 2.3.3op2-3+deb11u3 | cups: heap buffer overflow may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32324 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-06-01 17:15 修改: 2023-06-08 14:32 | 
                            
                            
                                | libcups2 | CVE-2023-32360 | 中危 | 2.3.3op2-3+deb11u1 | 2.3.3op2-3+deb11u4 | cups: Information leak through Cups-Get-Document operation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32360 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-06-23 18:15 修改: 2024-12-05 17:15 | 
                            
                            
                                | libcups2 | CVE-2024-35235 | 中危 | 2.3.3op2-3+deb11u1 | 2.3.3op2-3+deb11u7 | cups: Cupsd Listen arbitrary chmod 0140777 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35235 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-06-11 15:16 修改: 2024-06-14 03:15 | 
                            
                            
                                | gpgconf | CVE-2022-34903 | 中危 | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpgsm | CVE-2022-34903 | 中危 | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | gpgv | CVE-2022-34903 | 中危 | 2.2.27-2+deb11u1 | 2.2.27-2+deb11u2 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | curl | CVE-2023-46218 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u11 | curl: information disclosure by exploiting a mixed case flaw 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15 | 
                            
                            
                                | curl | CVE-2023-46219 | 中危 | 7.74.0-1.3+deb11u1 |  | curl: excessively long file name may lead to unknown HSTS status 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-12 02:15 修改: 2024-01-19 16:15 | 
                            
                            
                                | xvfb | CVE-2022-3551 | 中危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u3 | xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3551 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-17 13:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | xvfb | CVE-2023-5380 | 中危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u8 | xorg-x11-server: Use-after-free bug in DestroyWindow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5380 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-25 20:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | xvfb | CVE-2024-0408 | 中危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u11 | xorg-x11-server: SELinux unlabeled GLX PBuffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0408 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-01-18 16:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2021-3426 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Information disclosure via pydoc 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3426 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-20 13:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2021-3733 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: urllib: Regular expression DoS in AbstractBasicAuthHandler 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3733 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-03-10 17:42 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2021-4189 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: ftplib should not use the host from the PASV response 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4189 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-24 16:15 修改: 2023-06-30 23:15 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2023-27043 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2023-40217 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: TLS handshake bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40217 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-08-25 01:15 修改: 2023-11-07 04:20 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2024-0397 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | cpython: python: Memory race condition in ssl.SSLContext certificate store methods 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2024-0450 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2024-6923 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-01 14:15 修改: 2025-01-11 15:15 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2024-8088 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2024-9287 | 中危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Virtual environment (venv) activation scripts don't quote paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15 | 
                            
                            
                                | librsvg2-2 | CVE-2023-38633 | 中危 | 2.50.3+dfsg-1 | 2.50.3+dfsg-1+deb11u1 | librsvg: Arbitrary file read when xinclude href has special characters 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38633 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-07-22 17:15 修改: 2024-01-24 16:41 | 
                            
                            
                                | librsvg2-common | CVE-2023-38633 | 中危 | 2.50.3+dfsg-1 | 2.50.3+dfsg-1+deb11u1 | librsvg: Arbitrary file read when xinclude href has special characters 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38633 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-07-22 17:15 修改: 2024-01-24 16:41 | 
                            
                            
                                | curl | CVE-2024-11053 | 中危 | 7.74.0-1.3+deb11u1 |  | curl: curl netrc password leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-12-11 08:15 修改: 2024-12-15 17:15 | 
                            
                            
                                | curl | CVE-2024-7264 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u13 | curl: libcurl: ASN.1 date parser overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-07-31 08:15 修改: 2024-10-30 20:35 | 
                            
                            
                                | curl | CVE-2024-8096 | 中危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u14 | curl: OCSP stapling bypass with GnuTLS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26 | 
                            
                            
                                | curl | CVE-2024-9681 | 中危 | 7.74.0-1.3+deb11u1 |  | curl: HSTS subdomain overwrites parent cache entry 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-06 08:15 修改: 2024-12-13 14:15 | 
                            
                            
                                | dbus | CVE-2022-42010 | 中危 | 1.12.20-2 | 1.12.24-0+deb11u1 | dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42010 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49 | 
                            
                            
                                | dbus | CVE-2022-42011 | 中危 | 1.12.20-2 | 1.12.24-0+deb11u1 | dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42011 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49 | 
                            
                            
                                | libsndfile1 | CVE-2024-50612 | 中危 | 1.0.31-2 |  | libsndfile: Segmentation fault error in ogg_vorbis.c:417 vorbis_analysis_wrote() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50612 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-10-27 22:15 修改: 2024-11-05 16:14 | 
                            
                            
                                | libsndfile1 | CVE-2024-50613 | 中危 | 1.0.31-2 |  | libsndfile: Reachable assertion in mpeg_l3_encoder_close 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50613 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-10-27 22:15 修改: 2024-10-31 00:58 | 
                            
                            
                                | dbus | CVE-2022-42012 | 中危 | 1.12.20-2 | 1.12.24-0+deb11u1 | dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42012 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49 | 
                            
                            
                                | libsnmp-base | CVE-2022-24806 | 中危 | 5.9+dfsg-3 | 5.9+dfsg-4+deb11u1 | net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24806 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-16 20:15 修改: 2025-01-17 16:09 | 
                            
                            
                                | libsnmp-base | CVE-2022-24807 | 中危 | 5.9+dfsg-3 | 5.9+dfsg-4+deb11u1 | net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24807 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-16 20:15 修改: 2025-01-17 16:15 | 
                            
                            
                                | libsnmp-base | CVE-2022-24808 | 中危 | 5.9+dfsg-3 | 5.9+dfsg-4+deb11u1 | net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24808 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-16 20:15 修改: 2025-01-17 16:16 | 
                            
                            
                                | libsnmp-base | CVE-2022-24809 | 中危 | 5.9+dfsg-3 | 5.9+dfsg-4+deb11u1 | net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24809 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-16 20:15 修改: 2025-01-17 16:17 | 
                            
                            
                                | libsnmp-base | CVE-2022-24810 | 中危 | 5.9+dfsg-3 | 5.9+dfsg-4+deb11u1 | net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24810 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | libsnmp-base | CVE-2022-44792 | 中危 | 5.9+dfsg-3 |  | net-snmp: NULL Pointer Exception when handling ipDefaultTTL 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44792 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:16 | 
                            
                            
                                | libsnmp-base | CVE-2022-44793 | 中危 | 5.9+dfsg-3 |  | net-snmp: NULL Pointer Exception when handling pv6IpForwarding 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44793 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:17 | 
                            
                            
                                | dbus | CVE-2023-34969 | 中危 | 1.12.20-2 | 1.12.28-0+deb11u1 | dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34969 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-08 03:15 修改: 2023-12-27 16:36 | 
                            
                            
                                | xxd | CVE-2023-1175 | 中危 | 2:8.2.2434-3+deb11u1 |  | vim: Incorrect Calculation of Buffer Size 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1175 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-04 16:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | xxd | CVE-2023-2426 | 中危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-range Pointer offset in mb_charlen() of mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2426 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-04-29 22:15 修改: 2023-12-23 07:15 | 
                            
                            
                                | xxd | CVE-2024-43802 | 中危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap Buffer Overflow in Vim's Typeahead Buffer Handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43802 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-26 19:15 修改: 2024-08-27 13:02 | 
                            
                            
                                | libsnmp40 | CVE-2022-24806 | 中危 | 5.9+dfsg-3+b1 | 5.9+dfsg-4+deb11u1 | net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24806 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-16 20:15 修改: 2025-01-17 16:09 | 
                            
                            
                                | libsnmp40 | CVE-2022-24807 | 中危 | 5.9+dfsg-3+b1 | 5.9+dfsg-4+deb11u1 | net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24807 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-16 20:15 修改: 2025-01-17 16:15 | 
                            
                            
                                | mesa-vulkan-drivers | CVE-2023-45922 | 低危 | 20.3.5-1 |  | glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45922 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 05:15 修改: 2024-11-19 19:35 | 
                            
                            
                                | mesa-vulkan-drivers | CVE-2023-45931 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a NULL pointer dereference in ch ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45931 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 04:15 修改: 2024-09-04 15:35 | 
                            
                            
                                | libglapi-mesa | CVE-2023-45913 | 低危 | 20.3.5-1 |  | Mesa v23.0.4 was discovered to contain a NULL pointer dereference via  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45913 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 04:15 修改: 2024-11-07 12:35 | 
                            
                            
                                | mount | CVE-2022-0563 | 低危 | 2.36.1-8+deb11u1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libglapi-mesa | CVE-2023-45919 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a buffer over-read in glXQuerySe ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45919 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | libglapi-mesa | CVE-2023-45922 | 低危 | 20.3.5-1 |  | glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45922 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 05:15 修改: 2024-11-19 19:35 | 
                            
                            
                                | libglapi-mesa | CVE-2023-45931 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a NULL pointer dereference in ch ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45931 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 04:15 修改: 2024-09-04 15:35 | 
                            
                            
                                | libavutil56 | CVE-2020-22038 | 低危 | 7:4.3.4-0+deb11u1 |  | A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22038 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:36 | 
                            
                            
                                | libpoppler102 | CVE-2013-4472 | 低危 | 20.09.0-3.1 |  | xpdf: insecure temporary file 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4472 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2014-04-22 14:23 修改: 2014-04-23 12:20 | 
                            
                            
                                | libpoppler102 | CVE-2017-2814 | 低危 | 20.09.0-3.1 |  | poppler: Heap-buffer overflow in DCTStream::readScan() 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2814 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-07-12 17:29 修改: 2022-04-19 19:15 | 
                            
                            
                                | net-tools | CVE-2002-1976 | 低危 | 1.60+git20181103.0eebece-1 |  | ifconfig, when used on the Linux kernel 2.2 and later, does not report ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2002-1976 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2002-12-31 05:00 修改: 2008-09-05 20:32 | 
                            
                            
                                | libpoppler102 | CVE-2017-2818 | 低危 | 20.09.0-3.1 |  | poppler: Heap-buffer overflow in the image rendering functionality 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2818 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-07-12 17:29 修改: 2022-04-19 19:15 | 
                            
                            
                                | libpoppler102 | CVE-2017-2820 | 低危 | 20.09.0-3.1 |  | poppler: Integer overflow in the JPEG 2000 image parsing functionality 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2820 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-07-12 17:29 修改: 2023-01-27 20:57 | 
                            
                            
                                | libpoppler102 | CVE-2017-9083 | 低危 | 20.09.0-3.1 |  | poppler: Null pointer dereference in the JPXStream::readUByte function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9083 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-05-19 16:29 修改: 2019-03-14 19:00 | 
                            
                            
                                | libpoppler102 | CVE-2019-9543 | 低危 | 20.09.0-3.1 |  | poppler: recursive function call in JBIG2Stream::readGenericBitmap() in JBIG2Stream.cc causing denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9543 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2019-03-01 19:29 修改: 2021-07-21 11:39 | 
                            
                            
                                | openssh-client | CVE-2007-2243 | 低危 | 1:8.4p1-5 |  | OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabl ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-2243 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2007-04-25 16:19 修改: 2017-07-29 01:31 | 
                            
                            
                                | openssh-client | CVE-2007-2768 | 低危 | 1:8.4p1-5 |  | OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-2768 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2007-05-21 20:30 修改: 2021-04-01 15:32 | 
                            
                            
                                | openssh-client | CVE-2008-3234 | 低危 | 1:8.4p1-5 |  | sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapsh ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3234 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2008-07-18 16:41 修改: 2017-09-29 01:31 | 
                            
                            
                                | openssh-client | CVE-2016-20012 | 低危 | 1:8.4p1-5 |  | openssh: Public key information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-20012 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-09-15 20:15 修改: 2024-08-06 04:16 | 
                            
                            
                                | openssh-client | CVE-2018-15919 | 低危 | 1:8.4p1-5 |  | openssh: User enumeration via malformed packets in authentication requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15919 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2018-08-28 08:29 修改: 2019-03-07 16:29 | 
                            
                            
                                | openssh-client | CVE-2019-6110 | 低危 | 1:8.4p1-5 |  | openssh: Acceptance and display of arbitrary stderr allows for spoofing of scp client output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6110 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2019-01-31 18:29 修改: 2023-02-23 23:29 | 
                            
                            
                                | openssh-client | CVE-2020-14145 | 低危 | 1:8.4p1-5 |  | openssh: Observable discrepancy leading to an information leak in the algorithm negotiation 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14145 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2020-06-29 18:15 修改: 2022-04-28 19:34 | 
                            
                            
                                | openssh-client | CVE-2020-15778 | 低危 | 1:8.4p1-5 |  | openssh: scp allows command injection when using backtick characters in the destination argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15778 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2020-07-24 14:15 修改: 2024-08-04 14:15 | 
                            
                            
                                | openssh-client | CVE-2021-36368 | 低危 | 1:8.4p1-5 |  | openssh: possible bypass of fido 2 devices and ssh-askpass 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36368 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-03-13 00:15 修改: 2024-08-04 01:15 | 
                            
                            
                                | openssh-client | CVE-2023-51767 | 低危 | 1:8.4p1-5 |  | openssh: authentication bypass via row hammer attack 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51767 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-24 07:15 修改: 2024-02-27 15:51 | 
                            
                            
                                | libpoppler102 | CVE-2019-9545 | 低危 | 20.09.0-3.1 |  | poppler: recursive function call in JBIG2Stream::readTextRegion() in JBIG2Stream.cc causing denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9545 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2019-03-01 19:29 修改: 2021-07-21 11:39 | 
                            
                            
                                | libpoppler102 | CVE-2022-24106 | 低危 | 20.09.0-3.1 |  | In Xpdf prior to 4.04, the DCT (JPEG) decoder was incorrectly allowing ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24106 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-08-30 04:15 修改: 2022-10-28 20:08 | 
                            
                            
                                | libpoppler102 | CVE-2024-6239 | 低危 | 20.09.0-3.1 |  | poppler: pdfinfo: crash in broken documents when using -dests parameter 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6239 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-06-21 14:15 修改: 2024-11-12 17:15 | 
                            
                            
                                | libprocps8 | CVE-2023-4016 | 低危 | 2:3.3.17-5 |  | procps: ps buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4016 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-08-02 05:15 修改: 2023-12-15 18:19 | 
                            
                            
                                | libavutil56 | CVE-2024-36613 | 低危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | ffmpeg: Integer overflow in ffmpeg 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36613 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-03 18:15 修改: 2025-01-03 21:15 | 
                            
                            
                                | curl | CVE-2023-28322 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u9 | curl: more POST-after-PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15 | 
                            
                            
                                | curl | CVE-2023-38546 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u10 | curl: cookie injection with none file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15 | 
                            
                            
                                | libglib2.0-0 | CVE-2012-0039 | 低危 | 2.66.8-1 |  | glib2: hash table collisions CPU usage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2012-0039 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2012-01-14 17:55 修改: 2024-08-06 18:15 | 
                            
                            
                                | libglib2.0-0 | CVE-2024-34397 | 低危 | 2.66.8-1 | 2.66.8-1+deb11u2 | glib2: Signal subscription vulnerabilities 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34397 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-07 18:15 修改: 2024-11-15 18:35 | 
                            
                            
                                | libblkid1 | CVE-2022-0563 | 低危 | 2.36.1-8+deb11u1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | curl | CVE-2024-2379 | 低危 | 7.74.0-1.3+deb11u1 |  | curl: QUIC certificate check bypass with wolfSSL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2379 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 08:15 修改: 2024-11-14 20:35 | 
                            
                            
                                | coreutils | CVE-2017-18018 | 低危 | 8.32-4+b1 |  | coreutils: race condition vulnerability in chown and chgrp 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18018 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2018-01-04 04:29 修改: 2018-01-19 15:46 | 
                            
                            
                                | bash | TEMP-0841856-B18BAF | 低危 | 5.1-2+b3 |  | [Privilege escalation possible to other user than root] 漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libglib2.0-bin | CVE-2012-0039 | 低危 | 2.66.8-1 |  | glib2: hash table collisions CPU usage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2012-0039 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2012-01-14 17:55 修改: 2024-08-06 18:15 | 
                            
                            
                                | libglib2.0-bin | CVE-2024-34397 | 低危 | 2.66.8-1 | 2.66.8-1+deb11u2 | glib2: Signal subscription vulnerabilities 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34397 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-07 18:15 修改: 2024-11-15 18:35 | 
                            
                            
                                | apt | CVE-2011-3374 | 低危 | 2.2.4 |  | It was found that apt-key in apt, all versions, do not correctly valid ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3374 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-11-26 00:15 修改: 2021-02-09 16:08 | 
                            
                            
                                | openssl | CVE-2024-2511 | 低危 | 1.1.1n-0+deb11u2 | 1.1.1w-0+deb11u2 | openssl: Unbounded memory growth with session handling in TLSv1.3 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | openssl | CVE-2024-9143 | 低危 | 1.1.1n-0+deb11u2 | 1.1.1w-0+deb11u2 | openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35 | 
                            
                            
                                | packagekit | CVE-2022-0987 | 低危 | 1.2.2-2 |  | PackageKit: Information Disclosure in Transaction Interface via timing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0987 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-28 17:15 修改: 2022-07-09 02:16 | 
                            
                            
                                | packagekit-tools | CVE-2022-0987 | 低危 | 1.2.2-2 |  | PackageKit: Information Disclosure in Transaction Interface via timing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0987 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-28 17:15 修改: 2022-07-09 02:16 | 
                            
                            
                                | bsdutils | CVE-2022-0563 | 低危 | 1:2.36.1-8+deb11u1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | passwd | CVE-2007-5686 | 低危 | 1:4.8.1-1 |  | initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-5686 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2007-10-28 17:08 修改: 2018-10-15 21:45 | 
                            
                            
                                | passwd | CVE-2013-4235 | 低危 | 1:4.8.1-1 |  | shadow-utils: TOCTOU race conditions by copying and removing directory trees 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4235 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-12-03 15:15 修改: 2023-02-13 00:28 | 
                            
                            
                                | passwd | CVE-2023-29383 | 低危 | 1:4.8.1-1 |  | shadow: Improper input validation in shadow-utils package utility chfn 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05 | 
                            
                            
                                | passwd | CVE-2024-56433 | 低危 | 1:4.8.1-1 |  | shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56433 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-12-26 09:15 修改: 2024-12-26 09:15 | 
                            
                            
                                | passwd | TEMP-0628843-DBAD28 | 低危 | 1:4.8.1-1 |  | [more related to CVE-2005-4890] 漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | patch | CVE-2010-4651 | 低危 | 2.7.6-7 |  | patch: directory traversal flaw allows for arbitrary file creation 漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4651 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2011-03-11 22:55 修改: 2016-11-28 19:07 | 
                            
                            
                                | patch | CVE-2018-6951 | 低危 | 2.7.6-7 |  | patch: NULL pointer dereference in pch.c:intuit_diff_type() causes a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6951 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2018-02-13 19:29 修改: 2019-04-17 20:29 | 
                            
                            
                                | patch | CVE-2018-6952 | 低危 | 2.7.6-7 |  | patch: Double free of memory in pch.c:another_hunk() causes a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6952 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2018-02-13 19:29 修改: 2019-04-17 20:29 | 
                            
                            
                                | patch | CVE-2021-45261 | 低危 | 2.7.6-7 |  | patch: Invalid Pointer via another_hunk function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45261 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-12-22 18:15 修改: 2021-12-28 14:24 | 
                            
                            
                                | krb5-locales | CVE-2018-5709 | 低危 | 1.18.3-6+deb11u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | krb5-locales | CVE-2024-26458 | 低危 | 1.18.3-6+deb11u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | libglib2.0-data | CVE-2012-0039 | 低危 | 2.66.8-1 |  | glib2: hash table collisions CPU usage DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2012-0039 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2012-01-14 17:55 修改: 2024-08-06 18:15 | 
                            
                            
                                | perl | CVE-2011-4116 | 低危 | 5.32.1-4+deb11u2 |  | perl: File:: Temp insecure temporary file handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2020-01-31 18:15 修改: 2020-02-05 22:10 | 
                            
                            
                                | perl | CVE-2023-31486 | 低危 | 5.32.1-4+deb11u2 |  | http-tiny: insecure TLS cert default 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31486 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-29 00:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | libglib2.0-data | CVE-2024-34397 | 低危 | 2.66.8-1 | 2.66.8-1+deb11u2 | glib2: Signal subscription vulnerabilities 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34397 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-07 18:15 修改: 2024-11-15 18:35 | 
                            
                            
                                | libglvnd0 | CVE-2023-45924 | 低危 | 1.3.2-1 |  | libglxproto.c in OpenGL libglvnd bb06db5a was discovered to contain a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45924 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | libglx-mesa0 | CVE-2023-45913 | 低危 | 20.3.5-1 |  | Mesa v23.0.4 was discovered to contain a NULL pointer dereference via  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45913 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 04:15 修改: 2024-11-07 12:35 | 
                            
                            
                                | perl-base | CVE-2011-4116 | 低危 | 5.32.1-4+deb11u2 |  | perl: File:: Temp insecure temporary file handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2020-01-31 18:15 修改: 2020-02-05 22:10 | 
                            
                            
                                | perl-base | CVE-2023-31486 | 低危 | 5.32.1-4+deb11u2 |  | http-tiny: insecure TLS cert default 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31486 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-04-29 00:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | libglx-mesa0 | CVE-2023-45919 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a buffer over-read in glXQuerySe ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45919 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | libglx-mesa0 | CVE-2023-45922 | 低危 | 20.3.5-1 |  | glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45922 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 05:15 修改: 2024-11-19 19:35 | 
                            
                            
                                | libglx-mesa0 | CVE-2023-45931 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a NULL pointer dereference in ch ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45931 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 04:15 修改: 2024-09-04 15:35 | 
                            
                            
                                | perl-modules-5.32 | CVE-2011-4116 | 低危 | 5.32.1-4+deb11u2 |  | perl: File:: Temp insecure temporary file handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2020-01-31 18:15 修改: 2020-02-05 22:10 | 
                            
                            
                                | perl-modules-5.32 | CVE-2023-31486 | 低危 | 5.32.1-4+deb11u2 |  | http-tiny: insecure TLS cert default 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31486 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-29 00:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | libglx0 | CVE-2023-45924 | 低危 | 1.3.2-1 |  | libglxproto.c in OpenGL libglvnd bb06db5a was discovered to contain a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45924 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | policykit-1 | CVE-2016-2568 | 低危 | 0.105-31+deb11u1 |  | polkit: Program run via pkexec as unprivileged user can escape to parent session via TIOCSTI ioctl 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2568 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2017-02-13 18:59 修改: 2022-04-18 17:59 | 
                            
                            
                                | procps | CVE-2023-4016 | 低危 | 2:3.3.17-5 |  | procps: ps buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4016 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-08-02 05:15 修改: 2023-12-15 18:19 | 
                            
                            
                                | python3-certifi | CVE-2022-23491 | 低危 | 2020.6.20-1 |  | python-certifi: untrusted root certificates 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23491 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-12-07 22:15 修改: 2023-03-24 18:12 | 
                            
                            
                                | python3-certifi | CVE-2023-37920 | 低危 | 2020.6.20-1 |  | python-certifi: Removal of e-Tugra root certificate 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37920 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-07-25 21:15 修改: 2023-08-12 06:16 | 
                            
                            
                                | python3-certifi | CVE-2024-39689 | 低危 | 2020.6.20-1 |  | python-certifi: Remove root certificates from `GLOBALTRUST` from the root store 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39689 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-07-05 19:15 修改: 2024-12-06 14:15 | 
                            
                            
                                | krb5-locales | CVE-2024-26461 | 低危 | 1.18.3-6+deb11u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | libpython3.9-minimal | CVE-2022-37454 | 低危 | 3.9.2-1 |  | XKCP: buffer overflow in the SHA-3 reference implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | libpython3.9-minimal | CVE-2024-11168 | 低危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Improper validation of IPv6 and IPvFuture addresses 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-12 22:15 修改: 2025-01-06 18:15 | 
                            
                            
                                | libpython3.9-minimal | CVE-2024-4032 | 低危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | libpython3.9-minimal | CVE-2024-5642 | 低危 | 3.9.2-1 |  | python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-27 21:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | coreutils | CVE-2016-2781 | 低危 | 8.32-4+b1 |  | coreutils: Non-privileged session can escape to the parent session in chroot 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2781 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2017-02-07 15:59 修改: 2023-11-07 02:32 | 
                            
                            
                                | libc-bin | CVE-2010-4756 | 低危 | 2.31-13+deb11u3 |  | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions 漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15 | 
                            
                            
                                | python3-numpy | CVE-2021-34141 | 低危 | 1:1.19.5-1 |  | numpy: incomplete string comparison in the numpy.core component 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34141 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-12-17 19:15 修改: 2023-02-24 15:35 | 
                            
                            
                                | python3-numpy | CVE-2021-41495 | 低危 | 1:1.19.5-1 |  | numpy: NULL pointer dereference in numpy.sort in in the PyArray_DescrNew() due to missing return-value validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41495 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-12-17 20:15 修改: 2024-08-04 04:15 | 
                            
                            
                                | python3-numpy | CVE-2021-41496 | 低危 | 1:1.19.5-1 |  | numpy: buffer overflow in the array_from_pyobj() in fortranobject.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41496 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-12-17 20:15 修改: 2024-08-04 04:15 | 
                            
                            
                                | libc-bin | CVE-2018-20796 | 低危 | 2.31-13+deb11u3 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libc-bin | CVE-2019-1010022 | 低危 | 2.31-13+deb11u3 |  | glibc: stack guard protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc-bin | CVE-2019-1010023 | 低危 | 2.31-13+deb11u3 |  | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc-bin | CVE-2019-1010024 | 低危 | 2.31-13+deb11u3 |  | glibc: ASLR bypass using cache of thread stack and heap 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc-bin | CVE-2019-1010025 | 低危 | 2.31-13+deb11u3 |  | glibc: information disclosure of heap addresses of pthread_created thread 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libgnutls30 | CVE-2011-3389 | 低危 | 3.7.1-5 |  | HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3389 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2011-09-06 19:55 修改: 2022-11-29 15:56 | 
                            
                            
                                | libgomp1 | CVE-2023-4039 | 低危 | 10.2.1-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2021-22898 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: TELNET stack contents disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | libcurl3-gnutls | CVE-2021-22922 | 低危 | 7.74.0-1.3+deb11u1 |  | curl: Content not matching hash in Metalink is not being discarded 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22922 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcurl3-gnutls | CVE-2021-22923 | 低危 | 7.74.0-1.3+deb11u1 |  | curl: Metalink download sends credentials 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22923 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libcurl3-gnutls | CVE-2021-22924 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Bad connection reuse due to flawed path name checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22924 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2018-5709 | 低危 | 1.18.3-6+deb11u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2024-26458 | 低危 | 1.18.3-6+deb11u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | libgssapi-krb5-2 | CVE-2024-26461 | 低危 | 1.18.3-6+deb11u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | python3-software-properties | CVE-2020-15709 | 低危 | 0.96.20.2-2.1 |  | Versions of add-apt-repository before 0.98.9.2, 0.96.24.32.14, 0.96.20 ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15709 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2020-09-05 04:15 修改: 2020-09-16 13:31 | 
                            
                            
                                | libcurl3-gnutls | CVE-2022-35252 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u3 | curl: Incorrect handling of control code characters in cookies 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-28320 | 低危 | 7.74.0-1.3+deb11u1 |  | curl: siglongjmp race condition may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28320 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-26 21:15 修改: 2025-01-15 16:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-28322 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u9 | curl: more POST-after-PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2023-38546 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u10 | curl: cookie injection with none file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15 | 
                            
                            
                                | libcurl3-gnutls | CVE-2024-2379 | 低危 | 7.74.0-1.3+deb11u1 |  | curl: QUIC certificate check bypass with wolfSSL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2379 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 08:15 修改: 2024-11-14 20:35 | 
                            
                            
                                | libc-bin | CVE-2019-9192 | 低危 | 2.31-13+deb11u3 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2022-37454 | 低危 | 3.9.2-1 |  | XKCP: buffer overflow in the SHA-3 reference implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2024-11168 | 低危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Improper validation of IPv6 and IPvFuture addresses 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-12 22:15 修改: 2025-01-06 18:15 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2024-4032 | 低危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | libpython3.9-stdlib | CVE-2024-5642 | 低危 | 3.9.2-1 |  | python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-27 21:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | libquadmath0 | CVE-2023-4039 | 低危 | 10.2.1-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | git-man | CVE-2018-1000021 | 低危 | 1:2.30.2-1 |  | git: client prints server-sent ANSI escape codes to the terminal, allowing for unverified messages to potentially execute arbitrary commands 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000021 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2018-02-09 23:29 修改: 2024-10-24 17:58 | 
                            
                            
                                | git-man | CVE-2022-24975 | 低危 | 1:2.30.2-1 |  | git: The --mirror option for git leaks secret for deleted content, aka the "GitBleed" 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24975 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-02-11 20:15 修改: 2024-08-03 05:15 | 
                            
                            
                                | libsane-common | CVE-2023-46047 | 低危 | 1.0.31-4.1 |  | An issue in Sane 1.2.1 allows a local attacker to execute arbitrary co ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46047 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 05:15 修改: 2024-08-22 18:35 | 
                            
                            
                                | libsane-common | CVE-2023-46052 | 低危 | 1.0.31-4.1 |  | Sane 1.2.1 heap bounds overwrite in init_options() from backend/test.c ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46052 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 06:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | libsane1 | CVE-2023-46047 | 低危 | 1.0.31-4.1 |  | An issue in Sane 1.2.1 allows a local attacker to execute arbitrary co ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46047 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 05:15 修改: 2024-08-22 18:35 | 
                            
                            
                                | libsane1 | CVE-2023-46052 | 低危 | 1.0.31-4.1 |  | Sane 1.2.1 heap bounds overwrite in init_options() from backend/test.c ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46052 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 06:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | git-man | CVE-2023-25815 | 低危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: malicious placement of crafted messages when git was compiled with runtime prefix 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25815 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-25 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | git-man | CVE-2024-32020 | 低危 | 1:2.30.2-1 |  | git: insecure hardlinks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32020 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-14 19:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | libsepol1 | CVE-2021-36084 | 低危 | 3.1-1 | 3.1-1+deb11u1 | libsepol: use-after-free in __cil_verify_classperms() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36084 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libsepol1 | CVE-2021-36085 | 低危 | 3.1-1 | 3.1-1+deb11u1 | libsepol: use-after-free in __cil_verify_classperms() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36085 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libsepol1 | CVE-2021-36086 | 低危 | 3.1-1 | 3.1-1+deb11u1 | libsepol: use-after-free in cil_reset_classpermission() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36086 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libsepol1 | CVE-2021-36087 | 低危 | 3.1-1 | 3.1-1+deb11u1 | libsepol: heap-based buffer overflow in ebitmap_match_any() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36087 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | git-man | CVE-2024-32021 | 低危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: symlink bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32021 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | libsmartcols1 | CVE-2022-0563 | 低危 | 2.36.1-8+deb11u1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | git-man | CVE-2024-50349 | 低危 | 1:2.30.2-1 |  | git: Git does not sanitize URLs when asking for credentials interactively 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50349 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2025-01-14 19:15 修改: 2025-01-14 19:15 | 
                            
                            
                                | python3.9 | CVE-2022-37454 | 低危 | 3.9.2-1 |  | XKCP: buffer overflow in the SHA-3 reference implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | python3.9 | CVE-2024-11168 | 低危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Improper validation of IPv6 and IPvFuture addresses 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-12 22:15 修改: 2025-01-06 18:15 | 
                            
                            
                                | python3.9 | CVE-2024-4032 | 低危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | python3.9 | CVE-2024-5642 | 低危 | 3.9.2-1 |  | python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-27 21:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | git-man | CVE-2024-52005 | 低危 | 1:2.30.2-1 |  | git: The sideband payload is passed unfiltered to the terminal in git 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52005 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2025-01-15 18:15 修改: 2025-01-15 18:15 | 
                            
                            
                                | dirmngr | CVE-2022-3219 | 低危 | 2.2.27-2+deb11u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | gnupg | CVE-2022-3219 | 低危 | 2.2.27-2+deb11u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | libip4tc2 | CVE-2012-2663 | 低危 | 1.8.7-1 |  | iptables: --syn flag bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2012-2663 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2014-02-15 14:57 修改: 2023-11-07 02:10 | 
                            
                            
                                | libjbig0 | CVE-2017-9937 | 低危 | 2.1-3.1+b2 |  | libtiff: memory malloc failure in tif_jbig.c could cause DOS. 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9937 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2017-06-26 12:29 修改: 2023-11-07 02:50 | 
                            
                            
                                | libc-l10n | CVE-2010-4756 | 低危 | 2.31-13+deb11u3 |  | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions 漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15 | 
                            
                            
                                | libc-l10n | CVE-2018-20796 | 低危 | 2.31-13+deb11u3 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libc-l10n | CVE-2019-1010022 | 低危 | 2.31-13+deb11u3 |  | glibc: stack guard protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc-l10n | CVE-2019-1010023 | 低危 | 2.31-13+deb11u3 |  | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc-l10n | CVE-2019-1010024 | 低危 | 2.31-13+deb11u3 |  | glibc: ASLR bypass using cache of thread stack and heap 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc-l10n | CVE-2019-1010025 | 低危 | 2.31-13+deb11u3 |  | glibc: information disclosure of heap addresses of pthread_created thread 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc-l10n | CVE-2019-9192 | 低危 | 2.31-13+deb11u3 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15 | 
                            
                            
                                | libk5crypto3 | CVE-2018-5709 | 低危 | 1.18.3-6+deb11u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | libk5crypto3 | CVE-2024-26458 | 低危 | 1.18.3-6+deb11u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | libk5crypto3 | CVE-2024-26461 | 低危 | 1.18.3-6+deb11u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | curl | CVE-2021-22898 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: TELNET stack contents disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | gnupg-l10n | CVE-2022-3219 | 低危 | 2.2.27-2+deb11u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | libapparmor1 | CVE-2016-1585 | 低危 | 2.13.6-10 |  | In all versions of AppArmor mount rules are accidentally widened when  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1585 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2019-04-22 16:29 修改: 2023-11-07 02:29 | 
                            
                            
                                | libapt-pkg6.0 | CVE-2011-3374 | 低危 | 2.2.4 |  | It was found that apt-key in apt, all versions, do not correctly valid ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3374 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-11-26 00:15 修改: 2021-02-09 16:08 | 
                            
                            
                                | libkrb5-3 | CVE-2018-5709 | 低危 | 1.18.3-6+deb11u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | libkrb5-3 | CVE-2024-26458 | 低危 | 1.18.3-6+deb11u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | libkrb5-3 | CVE-2024-26461 | 低危 | 1.18.3-6+deb11u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | python3.9-minimal | CVE-2022-37454 | 低危 | 3.9.2-1 |  | XKCP: buffer overflow in the SHA-3 reference implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15 | 
                            
                            
                                | python3.9-minimal | CVE-2024-11168 | 低危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: Improper validation of IPv6 and IPvFuture addresses 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-11-12 22:15 修改: 2025-01-06 18:15 | 
                            
                            
                                | python3.9-minimal | CVE-2024-4032 | 低危 | 3.9.2-1 | 3.9.2-1+deb11u2 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | python3.9-minimal | CVE-2024-5642 | 低危 | 3.9.2-1 |  | python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-06-27 21:15 修改: 2024-11-06 21:35 | 
                            
                            
                                | sane-utils | CVE-2023-46047 | 低危 | 1.0.31-4.1 |  | An issue in Sane 1.2.1 allows a local attacker to execute arbitrary co ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46047 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 05:15 修改: 2024-08-22 18:35 | 
                            
                            
                                | sane-utils | CVE-2023-46052 | 低危 | 1.0.31-4.1 |  | Sane 1.2.1 heap bounds overwrite in init_options() from backend/test.c ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46052 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 06:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | software-properties-common | CVE-2020-15709 | 低危 | 0.96.20.2-2.1 |  | Versions of add-apt-repository before 0.98.9.2, 0.96.24.32.14, 0.96.20 ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15709 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2020-09-05 04:15 修改: 2020-09-16 13:31 | 
                            
                            
                                | libatomic1 | CVE-2023-4039 | 低危 | 10.2.1-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | libsqlite3-0 | CVE-2021-45346 | 低危 | 3.34.1-3 |  | sqlite: crafted SQL query allows a malicious user to obtain sensitive information 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45346 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-02-14 19:15 修改: 2024-08-04 05:15 | 
                            
                            
                                | libsqlite3-0 | CVE-2022-35737 | 低危 | 3.34.1-3 |  | sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35737 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-03 06:15 修改: 2024-03-27 16:05 | 
                            
                            
                                | curl | CVE-2021-22922 | 低危 | 7.74.0-1.3+deb11u1 |  | curl: Content not matching hash in Metalink is not being discarded 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22922 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | sudo | CVE-2005-1119 | 低危 | 1.9.5p2-3 |  | Sudo VISudo 1.6.8 and earlier allows local users to corrupt arbitrary  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-1119 镜像层: sha256:ea2e5a084e30f7b660444743088d544904ec3d20671381d183c7c09f39c081a6 发布日期: 2005-05-02 04:00 修改: 2008-09-05 20:48 | 
                            
                            
                                | sudo | CVE-2022-43995 | 低危 | 1.9.5p2-3 |  | sudo: heap-based overflow with very small passwords 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43995 镜像层: sha256:ea2e5a084e30f7b660444743088d544904ec3d20671381d183c7c09f39c081a6 发布日期: 2022-11-02 14:15 修改: 2022-12-06 00:15 | 
                            
                            
                                | supervisor | CVE-2019-12105 | 低危 | 4.2.2-2 |  | In Supervisor through 4.0.2, an unauthenticated user can read log file ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12105 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2019-09-10 17:15 修改: 2024-08-04 23:15 | 
                            
                            
                                | gnupg-utils | CVE-2022-3219 | 低危 | 2.2.27-2+deb11u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | libavcodec58 | CVE-2020-22038 | 低危 | 7:4.3.4-0+deb11u1 |  | A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22038 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:36 | 
                            
                            
                                | libkrb5support0 | CVE-2018-5709 | 低危 | 1.18.3-6+deb11u1 |  | krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58 | 
                            
                            
                                | libkrb5support0 | CVE-2024-26458 | 低危 | 1.18.3-6+deb11u1 |  | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | libkrb5support0 | CVE-2024-26461 | 低危 | 1.18.3-6+deb11u1 |  | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | systemd | CVE-2013-4392 | 低危 | 247.3-7 |  | systemd: TOCTOU race condition when updating file permissions and SELinux security contexts 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49 | 
                            
                            
                                | systemd | CVE-2020-13529 | 低危 | 247.3-7 |  | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16 | 
                            
                            
                                | systemd | CVE-2023-31437 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify a seale ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2025-01-03 20:15 | 
                            
                            
                                | systemd | CVE-2023-31438 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can truncate a sea ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | systemd | CVE-2023-31439 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify the con ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | libavcodec58 | CVE-2024-36613 | 低危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | ffmpeg: Integer overflow in ffmpeg 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36613 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-03 18:15 修改: 2025-01-03 21:15 | 
                            
                            
                                | libc6 | CVE-2010-4756 | 低危 | 2.31-13+deb11u3 |  | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions 漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15 | 
                            
                            
                                | libc6 | CVE-2018-20796 | 低危 | 2.31-13+deb11u3 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | libc6 | CVE-2019-1010022 | 低危 | 2.31-13+deb11u3 |  | glibc: stack guard protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libldap-2.4-2 | CVE-2015-3276 | 低危 | 2.4.57+dfsg-3+deb11u1 |  | openldap: incorrect multi-keyword mode cipherstring parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-3276 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2015-12-07 20:59 修改: 2023-04-28 18:28 | 
                            
                            
                                | systemd-sysv | CVE-2013-4392 | 低危 | 247.3-7 |  | systemd: TOCTOU race condition when updating file permissions and SELinux security contexts 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49 | 
                            
                            
                                | systemd-sysv | CVE-2020-13529 | 低危 | 247.3-7 |  | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16 | 
                            
                            
                                | systemd-sysv | CVE-2023-31437 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify a seale ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2025-01-03 20:15 | 
                            
                            
                                | systemd-sysv | CVE-2023-31438 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can truncate a sea ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | systemd-sysv | CVE-2023-31439 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify the con ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | libldap-2.4-2 | CVE-2017-14159 | 低危 | 2.4.57+dfsg-3+deb11u1 |  | openldap: Privilege escalation via PID file manipulation 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14159 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2017-09-05 18:29 修改: 2022-06-13 19:18 | 
                            
                            
                                | libldap-2.4-2 | CVE-2017-17740 | 低危 | 2.4.57+dfsg-3+deb11u1 |  | openldap: contrib/slapd-modules/nops/nops.c attempts to free stack buffer allowing remote attackers to cause a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17740 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2017-12-18 06:29 修改: 2022-06-13 19:10 | 
                            
                            
                                | libldap-2.4-2 | CVE-2020-15719 | 低危 | 2.4.57+dfsg-3+deb11u1 |  | openldap: Certificate validation incorrectly matches name against CN-ID 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15719 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2020-07-14 14:15 修改: 2022-05-12 15:01 | 
                            
                            
                                | libc6 | CVE-2019-1010023 | 低危 | 2.31-13+deb11u3 |  | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libldap-common | CVE-2015-3276 | 低危 | 2.4.57+dfsg-3+deb11u1 |  | openldap: incorrect multi-keyword mode cipherstring parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-3276 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2015-12-07 20:59 修改: 2023-04-28 18:28 | 
                            
                            
                                | systemd-timesyncd | CVE-2013-4392 | 低危 | 247.3-7 |  | systemd: TOCTOU race condition when updating file permissions and SELinux security contexts 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49 | 
                            
                            
                                | systemd-timesyncd | CVE-2020-13529 | 低危 | 247.3-7 |  | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16 | 
                            
                            
                                | systemd-timesyncd | CVE-2023-31437 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify a seale ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2025-01-03 20:15 | 
                            
                            
                                | systemd-timesyncd | CVE-2023-31438 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can truncate a sea ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | systemd-timesyncd | CVE-2023-31439 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify the con ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | sysvinit-utils | TEMP-0517018-A83CE6 | 低危 | 2.96-7+deb11u1 |  | [sysvinit: no-root option in expert installer exposes locally exploitable security flaw] 漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | tar | CVE-2005-2541 | 低危 | 1.34+dfsg-1 |  | tar: does not properly warn the user when extracting setuid or setgid files 漏洞详情: https://avd.aquasec.com/nvd/cve-2005-2541 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2005-08-10 04:00 修改: 2023-11-07 01:57 | 
                            
                            
                                | tar | CVE-2022-48303 | 低危 | 1.34+dfsg-1 | 1.34+dfsg-1+deb11u1 | tar: heap buffer overflow at from_header() in list.c via specially crafted checksum 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48303 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-01-30 04:15 修改: 2023-05-30 17:16 | 
                            
                            
                                | tar | CVE-2023-39804 | 低危 | 1.34+dfsg-1 | 1.34+dfsg-1+deb11u1 | tar: Incorrectly handled extension attributes in PAX archives can lead to a crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39804 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-03-27 04:15 修改: 2024-11-12 19:35 | 
                            
                            
                                | tar | TEMP-0290435-0B57B5 | 低危 | 1.34+dfsg-1 |  | [tar's rmt command may have undesired side effects] 漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | tcl8.6 | CVE-2021-35331 | 低危 | 8.6.11+dfsg-1 |  | In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35331 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-07-05 15:15 修改: 2024-08-04 01:15 | 
                            
                            
                                | libldap-common | CVE-2017-14159 | 低危 | 2.4.57+dfsg-3+deb11u1 |  | openldap: Privilege escalation via PID file manipulation 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14159 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2017-09-05 18:29 修改: 2022-06-13 19:18 | 
                            
                            
                                | libldap-common | CVE-2017-17740 | 低危 | 2.4.57+dfsg-3+deb11u1 |  | openldap: contrib/slapd-modules/nops/nops.c attempts to free stack buffer allowing remote attackers to cause a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17740 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2017-12-18 06:29 修改: 2022-06-13 19:10 | 
                            
                            
                                | libssl1.1 | CVE-2024-2511 | 低危 | 1.1.1n-0+deb11u2 | 1.1.1w-0+deb11u2 | openssl: Unbounded memory growth with session handling in TLSv1.3 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15 | 
                            
                            
                                | libssl1.1 | CVE-2024-9143 | 低危 | 1.1.1n-0+deb11u2 | 1.1.1w-0+deb11u2 | openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35 | 
                            
                            
                                | libstdc++6 | CVE-2023-4039 | 低危 | 10.2.1-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | udev | CVE-2013-4392 | 低危 | 247.3-7 |  | systemd: TOCTOU race condition when updating file permissions and SELinux security contexts 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49 | 
                            
                            
                                | udev | CVE-2020-13529 | 低危 | 247.3-7 |  | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16 | 
                            
                            
                                | udev | CVE-2023-31437 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify a seale ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-06-13 17:15 修改: 2025-01-03 20:15 | 
                            
                            
                                | udev | CVE-2023-31438 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can truncate a sea ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | udev | CVE-2023-31439 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify the con ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | libldap-common | CVE-2020-15719 | 低危 | 2.4.57+dfsg-3+deb11u1 |  | openldap: Certificate validation incorrectly matches name against CN-ID 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15719 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2020-07-14 14:15 修改: 2022-05-12 15:01 | 
                            
                            
                                | util-linux | CVE-2022-0563 | 低危 | 2.36.1-8+deb11u1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libc6 | CVE-2019-1010024 | 低危 | 2.31-13+deb11u3 |  | glibc: ASLR bypass using cache of thread stack and heap 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | uuid-runtime | CVE-2022-0563 | 低危 | 2.36.1-8+deb11u1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libc6 | CVE-2019-1010025 | 低危 | 2.31-13+deb11u3 |  | glibc: information disclosure of heap addresses of pthread_created thread 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | libc6 | CVE-2019-9192 | 低危 | 2.31-13+deb11u3 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15 | 
                            
                            
                                | libcairo-gobject2 | CVE-2017-7475 | 低危 | 1.16.0-5 |  | cairo: NULL pointer dereference with a crafted font file 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7475 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-05-19 20:29 修改: 2023-02-12 23:30 | 
                            
                            
                                | libcurl4 | CVE-2021-22898 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: TELNET stack contents disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | libcurl4 | CVE-2021-22922 | 低危 | 7.74.0-1.3+deb11u1 |  | curl: Content not matching hash in Metalink is not being discarded 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22922 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcurl4 | CVE-2021-22923 | 低危 | 7.74.0-1.3+deb11u1 |  | curl: Metalink download sends credentials 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22923 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libcurl4 | CVE-2021-22924 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Bad connection reuse due to flawed path name checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22924 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libcurl4 | CVE-2022-35252 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u3 | curl: Incorrect handling of control code characters in cookies 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl4 | CVE-2023-28320 | 低危 | 7.74.0-1.3+deb11u1 |  | curl: siglongjmp race condition may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28320 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-26 21:15 修改: 2025-01-15 16:15 | 
                            
                            
                                | libswresample3 | CVE-2020-22038 | 低危 | 7:4.3.4-0+deb11u1 |  | A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22038 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:36 | 
                            
                            
                                | libswresample3 | CVE-2024-36613 | 低危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | ffmpeg: Integer overflow in ffmpeg 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36613 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-03 18:15 修改: 2025-01-03 21:15 | 
                            
                            
                                | libmfx1 | CVE-2023-22656 | 低危 | 21.1.0-1 |  | Out-of-bounds read in Intel(R) Media SDK and some Intel(R) oneVPL soft ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22656 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-05-16 21:15 修改: 2024-07-03 01:39 | 
                            
                            
                                | libmfx1 | CVE-2023-47282 | 低危 | 21.1.0-1 |  | Out-of-bounds write in Intel(R) Media SDK all versions and some Intel( ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47282 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-05-16 21:16 修改: 2024-07-03 01:42 | 
                            
                            
                                | libmfx1 | CVE-2023-48727 | 低危 | 21.1.0-1 |  | NULL pointer dereference in some Intel(R) oneVPL software before versi ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48727 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-05-16 21:16 修改: 2024-07-03 01:42 | 
                            
                            
                                | libcurl4 | CVE-2023-28322 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u9 | curl: more POST-after-PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15 | 
                            
                            
                                | libmount1 | CVE-2022-0563 | 低危 | 2.36.1-8+deb11u1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libsystemd0 | CVE-2013-4392 | 低危 | 247.3-7 |  | systemd: TOCTOU race condition when updating file permissions and SELinux security contexts 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49 | 
                            
                            
                                | libsystemd0 | CVE-2020-13529 | 低危 | 247.3-7 |  | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16 | 
                            
                            
                                | libsystemd0 | CVE-2023-31437 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify a seale ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-06-13 17:15 修改: 2025-01-03 20:15 | 
                            
                            
                                | libsystemd0 | CVE-2023-31438 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can truncate a sea ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | libsystemd0 | CVE-2023-31439 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify the con ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | libcurl4 | CVE-2023-38546 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u10 | curl: cookie injection with none file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15 | 
                            
                            
                                | libtcl8.6 | CVE-2021-35331 | 低危 | 8.6.11+dfsg-1 |  | In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35331 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-07-05 15:15 修改: 2024-08-04 01:15 | 
                            
                            
                                | libtheora0 | CVE-2024-56431 | 低危 | 1.1.1+dfsg.1-15 |  | libtheora: incorrect bitwise shift in huffdec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56431 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-25 17:15 修改: 2024-12-31 19:15 | 
                            
                            
                                | libcurl4 | CVE-2024-2379 | 低危 | 7.74.0-1.3+deb11u1 |  | curl: QUIC certificate check bypass with wolfSSL 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2379 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 08:15 修改: 2024-11-14 20:35 | 
                            
                            
                                | libcairo-gobject2 | CVE-2018-18064 | 低危 | 1.16.0-5 |  | cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18064 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2018-10-08 18:29 修改: 2023-11-07 02:54 | 
                            
                            
                                | libcairo-gobject2 | CVE-2019-6461 | 低危 | 1.16.0-5 |  | cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6461 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | libcairo-gobject2 | CVE-2019-6462 | 低危 | 1.16.0-5 |  | cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6462 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | libcairo2 | CVE-2017-7475 | 低危 | 1.16.0-5 |  | cairo: NULL pointer dereference with a crafted font file 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7475 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-05-19 20:29 修改: 2023-02-12 23:30 | 
                            
                            
                                | libcairo2 | CVE-2018-18064 | 低危 | 1.16.0-5 |  | cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18064 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2018-10-08 18:29 修改: 2023-11-07 02:54 | 
                            
                            
                                | libcairo2 | CVE-2019-6461 | 低危 | 1.16.0-5 |  | cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6461 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | libdw1 | CVE-2021-33294 | 低危 | 0.183-1 |  | elfutils: an infinite loop was found in the function handle_symtab in readelf.c which causes denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33294 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-07-18 14:15 修改: 2023-07-27 15:19 | 
                            
                            
                                | vim | CVE-2008-4677 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: netrw plugin: FTP username and password disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4677 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2008-10-22 18:00 修改: 2017-08-08 01:32 | 
                            
                            
                                | vim | CVE-2017-1000382 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Ignores umask when creating a swap file 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000382 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2017-10-31 20:29 修改: 2017-11-27 16:24 | 
                            
                            
                                | vim | CVE-2021-3903 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3903 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-10-27 21:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim | CVE-2021-3927 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in gchar_cursor() in misc1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3927 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-05 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim | CVE-2021-3928 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: stack-based buffer overflow in spell_iswordp() in spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3928 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-05 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim | CVE-2021-3968 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap use-after-free in ml_append_int function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3968 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-19 12:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim | CVE-2021-3973 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap based buffer overflow in findfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3973 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-19 12:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim | CVE-2021-3974 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use after free in regexp_nfa.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3974 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-19 11:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim | CVE-2021-3984 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: illegal memory access in find_start_brace() in cindent.c when C-indenting 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3984 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-01 11:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim | CVE-2021-4069 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in ex_open() in src/ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4069 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-06 12:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim | CVE-2021-4136 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in eval_lambda() in src/eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4136 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-19 17:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim | CVE-2021-4166 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in do_arg_all() in src/arglist.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4166 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-25 19:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim | CVE-2021-4192 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in win_linetabsize() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4192 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-31 15:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim | CVE-2021-4193 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bound read in getvcol() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4193 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-31 16:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim | CVE-2022-0156 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free while treating allocated lines in user functions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0156 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-10 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0158 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based read buffer overflow in compile_get_env() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0158 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-10 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0213 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: vim is vulnerable to out of bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0213 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-14 13:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | vim | CVE-2022-0318 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in utf_head_off() in mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0318 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-21 12:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | vim | CVE-2022-0319 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based out-of-bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0319 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-21 14:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | vim | CVE-2022-0368 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-bounds Read in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0368 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-26 18:15 修改: 2022-11-09 03:52 | 
                            
                            
                                | vim | CVE-2022-0393 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in delete_buff_tail() in getchar.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0393 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-28 22:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0407 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow on read in yank_copy_line 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0407 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-30 14:15 修改: 2022-08-26 17:35 | 
                            
                            
                                | vim | CVE-2022-0408 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Stack-based Buffer Overflow in spellsuggest.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0408 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0413 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use after free in src/ex_cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0413 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0443 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-use-after-free in enter_buffer() of src/buffer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0443 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-02 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0554 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0554 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-10 22:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0629 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Stack-based Buffer Overflow in vim prior to 8.2. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0629 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-17 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0685 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0685 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-20 11:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0696 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL Pointer Dereference in vim prior to 8.2 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0696 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-21 20:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0714 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0714 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-22 20:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0729 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use of Out-of-range Pointer Offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0729 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-23 14:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-0943 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow occurs in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0943 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-03-14 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-1154 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in utf_ptr2char 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1154 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-03-30 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-1420 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-range Pointer Offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1420 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-04-21 11:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim | CVE-2022-1619 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in cmdline_erase_chars of ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1619 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-08 10:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1620 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL Pointer Dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1620 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-08 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1621 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap buffer overflow in vim_strncpy 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1621 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1629 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in function find_next_quote 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1629 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1674 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1674 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-12 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1720 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in grab_file_name() in findfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1720 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-20 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1725 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in vim_regexec_string() at regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1725 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-29 03:15 修改: 2024-01-25 21:05 | 
                            
                            
                                | vim | CVE-2022-1733 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in cindent.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1733 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-17 17:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1735 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: changing text in visual mode may cause invalid memory access that lead to a heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1735 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-17 19:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim | CVE-2022-1769 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in scriptfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1769 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-17 17:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1771 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: recursive command line loop may cause a Stack-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1771 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-18 20:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim | CVE-2022-1796 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1796 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-19 16:15 修改: 2024-02-15 21:28 | 
                            
                            
                                | vim | CVE-2022-1851 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in gchar_cursor() in misc1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1851 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-25 13:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1886 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in function utf_head_off 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1886 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-26 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1898 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in find_pattern_in_path() in search.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1898 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-27 09:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1927 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in utf_ptr2char() in mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1927 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-29 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim | CVE-2022-1968 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function utf_ptr2char at mbyte.c:1794 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1968 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-02 14:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim | CVE-2022-2042 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in skipwhite may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2042 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-10 19:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim | CVE-2022-2124 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in current_quote() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2124 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 10:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2125 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in get_lisp_indent() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2125 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2126 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in suggest_trie_walk() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2126 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2175 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in put_on_cmdline() at ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2175 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-23 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2182 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow through parse_cmd_address() in function utf_ptr2char 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2182 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-23 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2183 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read through get_lisp_indent() in function get_lisp_indent 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2183 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-23 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2206 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bound read in function msg_outtrans_attr 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2206 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-26 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2207 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in function ins_bs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2207 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-27 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2208 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in function diff_check 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2208 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-27 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2210 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bound write in function ml_append_int 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2210 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-27 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2231 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer derefernce in function skipwhite may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2231 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-28 20:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2257 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: an out-of-bound read in function msg_outtrans_special 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2257 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-30 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2264 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in inc() at misc2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2264 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-01 11:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2284 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in utfc_ptr2len() at mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2284 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2285 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: integer overflow in del_typebuf() at getchar.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2285 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2286 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in ins_bytes() at change.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2286 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2287 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in suggest_trie_walk() at spellsuggest.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2287 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2289 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in ex_diffgetput() at  diff.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2289 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-03 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2343 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in ins_compl_add() in insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2343 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-08 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2344 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in ins_compl_add() in insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2344 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-08 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2345 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in skipwhite() in charset.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2345 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-08 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2522 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in ins_compl_infercase_gettext() at src/insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2522 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-25 14:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim | CVE-2022-2571 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2571 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:31 | 
                            
                            
                                | vim | CVE-2022-2581 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-bounds Read in vim src/regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2581 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:30 | 
                            
                            
                                | vim | CVE-2022-2598 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Undefined Behavior for Input to API in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2598 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-01 15:15 修改: 2023-07-11 08:15 | 
                            
                            
                                | vim | CVE-2022-2816 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in check_vim9_unlet() at src/vim9cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2816 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-15 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2817 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap use-after-free in string_quote() at src/strings.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2817 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-15 23:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2819 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap buffer overflow in compile_lock_unlock() at src/vim9cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2819 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-15 11:21 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2845 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Buffer Under-read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2845 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-17 15:15 修改: 2023-07-10 16:15 | 
                            
                            
                                | vim | CVE-2022-2849 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in latin_ptr2len() at src/mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2849 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-17 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2862 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap use-after-free in generate_PCALL() at src/vim9instr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2862 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-17 20:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim | CVE-2022-2874 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference in generate_loadvar() in vim9compile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2874 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-18 16:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim | CVE-2022-2889 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in find_var_also_in_script() in evalvars.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2889 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-19 13:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim | CVE-2022-2923 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in function sug_filltree 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2923 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-22 21:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim | CVE-2022-2946 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in function vim_vsnprintf_typval 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2946 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-23 17:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim | CVE-2022-2980 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in do_mouse() at src/mouse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2980 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-25 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim | CVE-2022-2982 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in qf_fill_buffer() at src/quickfix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2982 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-25 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim | CVE-2022-3016 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in get_next_valid_entry() at src/quickfix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3016 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-28 12:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim | CVE-2022-3037 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in function qf_buf_add_line( ) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3037 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-30 21:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim | CVE-2022-3153 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in vim_regcomp() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3153 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-08 15:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim | CVE-2022-3234 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3234 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-17 22:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim | CVE-2022-3235 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3235 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-18 20:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim | CVE-2022-3256 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in movemark() at mark.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3256 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-22 13:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim | CVE-2022-3278 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in eval_next_non_blank() in eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3278 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-23 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim | CVE-2022-3296 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: stack buffer overflow in ex_finally() in ex_eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3296 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-25 17:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim | CVE-2022-3297 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in process_next_cpt_value() at insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3297 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-25 19:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim | CVE-2022-3352 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3352 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-29 12:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim | CVE-2022-3491 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow prior to 9.0.0742 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3491 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-03 13:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim | CVE-2022-3520 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3520 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-02 19:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim | CVE-2022-3591 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3591 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-02 17:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim | CVE-2022-3705 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: a use after free in the function qf_update_buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3705 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-10-26 20:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim | CVE-2022-4292 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in did_set_spelllang() in src/spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4292 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-05 19:15 修改: 2023-11-07 03:57 | 
                            
                            
                                | vim | CVE-2022-4293 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: floating point exception in num_divide() in src/eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4293 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-05 19:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim | CVE-2022-47024 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: no check if the return value of XChangeGC() is NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47024 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-20 19:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | vim | CVE-2023-0049 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in function build_stl_str_hl 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0049 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-04 16:15 修改: 2025-01-17 20:15 | 
                            
                            
                                | vim | CVE-2023-0051 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in msg_puts_printf() in message.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0051 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-04 18:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim | CVE-2023-0288 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: a heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0288 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-13 16:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim | CVE-2023-0433 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: reading past the end of a line when formatting text 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0433 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-21 15:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim | CVE-2023-0512 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: divide by zero in adjust_skipcol() at move.ca 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0512 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-30 16:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim | CVE-2023-1170 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1170 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-03 23:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | vim | CVE-2023-1264 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference issue in utfc_ptr2len 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1264 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-07 22:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | vim | CVE-2023-1355 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in class_object_index at vim9class.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1355 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-11 22:15 修改: 2023-11-07 04:03 | 
                            
                            
                                | vim | CVE-2023-2609 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL Pointer Dereference in get_register() at register.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2609 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-05-09 18:15 修改: 2023-12-23 07:15 | 
                            
                            
                                | vim | CVE-2023-3896 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Divide by zero in scroll_cursor_bot 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3896 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-08-07 13:15 修改: 2023-08-31 19:15 | 
                            
                            
                                | vim | CVE-2023-46246 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Integer Overflow in :history command 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46246 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-27 19:15 修改: 2023-12-17 03:15 | 
                            
                            
                                | vim | CVE-2023-4733 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function buflist_altfpos 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4733 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-04 14:15 修改: 2024-02-01 17:56 | 
                            
                            
                                | vim | CVE-2023-4734 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: segmentation fault in function f_fullcommand in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4734 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-02 18:15 修改: 2023-12-21 02:52 | 
                            
                            
                                | vim | CVE-2023-4735 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: OOB Write ops.c in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4735 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-02 18:15 修改: 2023-12-22 17:54 | 
                            
                            
                                | vim | CVE-2023-4750 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function bt_quickfix 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4750 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-04 14:15 修改: 2024-02-01 18:01 | 
                            
                            
                                | vim | CVE-2023-4751 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in function utfc_ptr2len in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4751 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-03 19:15 修改: 2023-12-22 18:09 | 
                            
                            
                                | vim | CVE-2023-48231 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in win_close() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48231 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2023-12-28 17:39 | 
                            
                            
                                | vim | CVE-2023-48232 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: floating point exception in adjust_plines_for_skipcol() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48232 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:37 | 
                            
                            
                                | vim | CVE-2023-48233 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow with count for :s command 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48233 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:38 | 
                            
                            
                                | vim | CVE-2023-48234 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow in nv_z_get_count 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48234 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:33 | 
                            
                            
                                | vim | CVE-2023-48235 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow in ex address parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48235 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:33 | 
                            
                            
                                | vim | CVE-2023-48236 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow in get_number 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48236 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:38 | 
                            
                            
                                | vim | CVE-2023-48237 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer overflow in shift_line 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48237 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:33 | 
                            
                            
                                | vim | CVE-2023-48706 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in ex_substitute in Vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48706 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-22 22:15 修改: 2024-01-05 18:15 | 
                            
                            
                                | vim | CVE-2023-5441 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference in screen_line() in src/screen.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5441 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-05 21:15 修改: 2023-11-15 02:33 | 
                            
                            
                                | vim | CVE-2023-5535 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5535 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-11 20:15 修改: 2023-11-15 02:31 | 
                            
                            
                                | vim | CVE-2024-41957 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Double-free/use-after-free vulnerability with Vim editor 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41957 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-01 22:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | vim | CVE-2024-41965 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Double-Free Vulnerability in Vim Could Cause Application Crashes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41965 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-01 22:15 修改: 2024-08-09 14:09 | 
                            
                            
                                | vim | CVE-2024-43374 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in alist_add() in src/arglist.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43374 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-16 02:15 修改: 2024-08-19 13:00 | 
                            
                            
                                | vim | CVE-2024-43790 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out of bounds read when performing a search command 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43790 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-22 22:15 修改: 2024-08-23 16:18 | 
                            
                            
                                | vim | CVE-2024-47814 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free when closing buffers in Vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47814 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-10-07 22:15 修改: 2024-10-10 12:57 | 
                            
                            
                                | vim | CVE-2025-22134 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow with visual mode in Vim < 9.1.1003 漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22134 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2025-01-13 21:15 修改: 2025-01-13 21:15 | 
                            
                            
                                | libdw1 | CVE-2024-25260 | 低危 | 0.183-1 |  | elfutils: global-buffer-overflow exists in the function ebl_machine_flag_name in eblmachineflagname.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25260 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-20 18:15 修改: 2024-08-01 13:47 | 
                            
                            
                                | libelf1 | CVE-2021-33294 | 低危 | 0.183-1 |  | elfutils: an infinite loop was found in the function handle_symtab in readelf.c which causes denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33294 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-07-18 14:15 修改: 2023-07-27 15:19 | 
                            
                            
                                | libelf1 | CVE-2024-25260 | 低危 | 0.183-1 |  | elfutils: global-buffer-overflow exists in the function ebl_machine_flag_name in eblmachineflagname.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25260 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-20 18:15 修改: 2024-08-01 13:47 | 
                            
                            
                                | libcairo2 | CVE-2019-6462 | 低危 | 1.16.0-5 |  | cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6462 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | libnss-systemd | CVE-2013-4392 | 低危 | 247.3-7 |  | systemd: TOCTOU race condition when updating file permissions and SELinux security contexts 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49 | 
                            
                            
                                | libnss-systemd | CVE-2020-13529 | 低危 | 247.3-7 |  | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16 | 
                            
                            
                                | libnss-systemd | CVE-2023-31437 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify a seale ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2025-01-03 20:15 | 
                            
                            
                                | libnss-systemd | CVE-2023-31438 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can truncate a sea ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | libnss-systemd | CVE-2023-31439 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify the con ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | git | CVE-2018-1000021 | 低危 | 1:2.30.2-1 |  | git: client prints server-sent ANSI escape codes to the terminal, allowing for unverified messages to potentially execute arbitrary commands 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000021 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2018-02-09 23:29 修改: 2024-10-24 17:58 | 
                            
                            
                                | libcap2 | CVE-2023-2602 | 低危 | 1:2.44-1 |  | libcap: Memory Leak on pthread_create() Error 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2602 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-06 20:15 修改: 2023-11-30 05:15 | 
                            
                            
                                | gnupg2 | CVE-2022-3219 | 低危 | 2.2.27-2+deb11u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | libcap2-bin | CVE-2023-2602 | 低危 | 1:2.44-1 |  | libcap: Memory Leak on pthread_create() Error 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2602 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-06 20:15 修改: 2023-11-30 05:15 | 
                            
                            
                                | git | CVE-2022-24975 | 低危 | 1:2.30.2-1 |  | git: The --mirror option for git leaks secret for deleted content, aka the "GitBleed" 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24975 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-02-11 20:15 修改: 2024-08-03 05:15 | 
                            
                            
                                | gpg | CVE-2022-3219 | 低危 | 2.2.27-2+deb11u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | libnss3 | CVE-2017-11695 | 低危 | 2:3.61-1+deb11u2 |  | nss: Heap-buffer-overflow in alloc_segs 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11695 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-12-27 19:29 修改: 2020-03-16 23:15 | 
                            
                            
                                | libnss3 | CVE-2017-11696 | 低危 | 2:3.61-1+deb11u2 |  | nss: Heap-buffer-overflow in __hash_open 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11696 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-12-27 19:29 修改: 2020-03-16 23:15 | 
                            
                            
                                | libnss3 | CVE-2017-11697 | 低危 | 2:3.61-1+deb11u2 |  | nss: Floating Point Exception in __hash_open 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11697 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-12-27 19:29 修改: 2020-03-16 23:15 | 
                            
                            
                                | libnss3 | CVE-2017-11698 | 低危 | 2:3.61-1+deb11u2 |  | nss: Heap-buffer-overflow in __get_page 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11698 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-12-27 19:29 修改: 2020-03-16 23:15 | 
                            
                            
                                | libodbc1 | CVE-2024-1013 | 低危 | 2.3.6-0.1+b1 |  | unixODBC: out of bounds stack write due to pointer-to-integer types conversion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1013 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-18 11:15 修改: 2024-03-18 12:38 | 
                            
                            
                                | libexpat1 | CVE-2013-0340 | 低危 | 2.2.10-2+deb11u3 |  | expat: internal entity expansion 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-0340 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2014-01-21 18:55 修改: 2023-11-07 02:13 | 
                            
                            
                                | libexpat1 | CVE-2023-52426 | 低危 | 2.2.10-2+deb11u3 |  | expat: recursive XML entity expansion vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52426 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-02-04 20:15 修改: 2024-03-07 17:15 | 
                            
                            
                                | libexpat1 | CVE-2024-28757 | 低危 | 2.2.10-2+deb11u3 |  | expat: XML Entity Expansion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28757 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-10 05:15 修改: 2024-05-01 19:15 | 
                            
                            
                                | git | CVE-2023-25815 | 低危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: malicious placement of crafted messages when git was compiled with runtime prefix 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25815 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-25 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | gpg-agent | CVE-2022-3219 | 低危 | 2.2.27-2+deb11u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | git | CVE-2024-32020 | 低危 | 1:2.30.2-1 |  | git: insecure hardlinks 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32020 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-14 19:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | gpg-wks-client | CVE-2022-3219 | 低危 | 2.2.27-2+deb11u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | git | CVE-2024-32021 | 低危 | 1:2.30.2-1 | 1:2.30.2-1+deb11u3 | git: symlink bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32021 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-10505 | 低危 | 2.4.0-3 |  | openjpeg: NULL pointer dereference in imagetopnm function in convert.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10505 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-08-30 09:29 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-9113 | 低危 | 2.4.0-3 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9113 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-9114 | 低危 | 2.4.0-3 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9114 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-9115 | 低危 | 2.4.0-3 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9115 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | vim-common | CVE-2008-4677 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: netrw plugin: FTP username and password disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4677 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2008-10-22 18:00 修改: 2017-08-08 01:32 | 
                            
                            
                                | vim-common | CVE-2017-1000382 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Ignores umask when creating a swap file 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000382 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2017-10-31 20:29 修改: 2017-11-27 16:24 | 
                            
                            
                                | vim-common | CVE-2021-3903 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3903 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-10-27 21:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-common | CVE-2021-3927 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in gchar_cursor() in misc1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3927 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-05 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-common | CVE-2021-3928 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: stack-based buffer overflow in spell_iswordp() in spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3928 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-05 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-common | CVE-2021-3968 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap use-after-free in ml_append_int function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3968 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-19 12:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-common | CVE-2021-3973 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap based buffer overflow in findfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3973 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-19 12:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-common | CVE-2021-3974 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use after free in regexp_nfa.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3974 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-19 11:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-common | CVE-2021-3984 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: illegal memory access in find_start_brace() in cindent.c when C-indenting 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3984 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-01 11:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-common | CVE-2021-4069 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in ex_open() in src/ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4069 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-06 12:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-common | CVE-2021-4136 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in eval_lambda() in src/eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4136 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-19 17:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-common | CVE-2021-4166 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in do_arg_all() in src/arglist.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4166 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-25 19:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-common | CVE-2021-4192 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in win_linetabsize() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4192 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-31 15:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-common | CVE-2021-4193 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bound read in getvcol() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4193 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-31 16:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-common | CVE-2022-0156 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free while treating allocated lines in user functions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0156 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-10 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0158 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based read buffer overflow in compile_get_env() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0158 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-10 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0213 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: vim is vulnerable to out of bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0213 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-14 13:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | vim-common | CVE-2022-0318 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in utf_head_off() in mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0318 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-21 12:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | vim-common | CVE-2022-0319 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based out-of-bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0319 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-21 14:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | vim-common | CVE-2022-0368 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-bounds Read in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0368 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-26 18:15 修改: 2022-11-09 03:52 | 
                            
                            
                                | vim-common | CVE-2022-0393 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in delete_buff_tail() in getchar.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0393 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-28 22:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0407 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow on read in yank_copy_line 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0407 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-30 14:15 修改: 2022-08-26 17:35 | 
                            
                            
                                | vim-common | CVE-2022-0408 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Stack-based Buffer Overflow in spellsuggest.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0408 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0413 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use after free in src/ex_cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0413 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0443 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-use-after-free in enter_buffer() of src/buffer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0443 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-02 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0554 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0554 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-10 22:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0629 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Stack-based Buffer Overflow in vim prior to 8.2. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0629 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-17 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0685 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0685 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-20 11:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0696 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL Pointer Dereference in vim prior to 8.2 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0696 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-21 20:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0714 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0714 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-22 20:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0729 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use of Out-of-range Pointer Offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0729 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-23 14:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-0943 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow occurs in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0943 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-03-14 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-1154 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in utf_ptr2char 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1154 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-03-30 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-1420 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-range Pointer Offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1420 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-04-21 11:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-common | CVE-2022-1619 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in cmdline_erase_chars of ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1619 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-08 10:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1620 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL Pointer Dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1620 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-08 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1621 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap buffer overflow in vim_strncpy 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1621 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1629 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in function find_next_quote 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1629 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1674 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1674 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-12 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1720 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in grab_file_name() in findfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1720 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-20 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1725 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in vim_regexec_string() at regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1725 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-29 03:15 修改: 2024-01-25 21:05 | 
                            
                            
                                | vim-common | CVE-2022-1733 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in cindent.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1733 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-17 17:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1735 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: changing text in visual mode may cause invalid memory access that lead to a heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1735 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-17 19:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-common | CVE-2022-1769 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in scriptfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1769 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-17 17:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1771 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: recursive command line loop may cause a Stack-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1771 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-18 20:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-common | CVE-2022-1796 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1796 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-19 16:15 修改: 2024-02-15 21:28 | 
                            
                            
                                | vim-common | CVE-2022-1851 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in gchar_cursor() in misc1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1851 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-25 13:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1886 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in function utf_head_off 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1886 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-26 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1898 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in find_pattern_in_path() in search.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1898 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-27 09:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1927 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in utf_ptr2char() in mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1927 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-29 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-common | CVE-2022-1968 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function utf_ptr2char at mbyte.c:1794 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1968 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-02 14:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-common | CVE-2022-2042 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in skipwhite may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2042 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-10 19:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-common | CVE-2022-2124 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in current_quote() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2124 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 10:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2125 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in get_lisp_indent() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2125 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2126 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in suggest_trie_walk() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2126 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2175 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in put_on_cmdline() at ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2175 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-23 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2182 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow through parse_cmd_address() in function utf_ptr2char 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2182 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-23 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2183 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read through get_lisp_indent() in function get_lisp_indent 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2183 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-23 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2206 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bound read in function msg_outtrans_attr 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2206 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-26 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2207 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in function ins_bs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2207 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-27 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2208 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in function diff_check 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2208 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-27 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2210 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bound write in function ml_append_int 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2210 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-27 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2231 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer derefernce in function skipwhite may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2231 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-28 20:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2257 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: an out-of-bound read in function msg_outtrans_special 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2257 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-30 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2264 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in inc() at misc2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2264 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-01 11:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2284 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in utfc_ptr2len() at mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2284 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2285 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: integer overflow in del_typebuf() at getchar.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2285 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2286 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in ins_bytes() at change.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2286 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2287 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in suggest_trie_walk() at spellsuggest.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2287 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2289 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in ex_diffgetput() at  diff.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2289 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-03 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2343 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in ins_compl_add() in insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2343 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-08 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2344 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in ins_compl_add() in insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2344 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-08 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2345 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in skipwhite() in charset.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2345 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-08 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2522 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in ins_compl_infercase_gettext() at src/insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2522 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-25 14:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-common | CVE-2022-2571 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2571 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:31 | 
                            
                            
                                | vim-common | CVE-2022-2581 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-bounds Read in vim src/regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2581 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:30 | 
                            
                            
                                | vim-common | CVE-2022-2598 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Undefined Behavior for Input to API in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2598 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-01 15:15 修改: 2023-07-11 08:15 | 
                            
                            
                                | vim-common | CVE-2022-2816 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in check_vim9_unlet() at src/vim9cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2816 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-15 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2817 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap use-after-free in string_quote() at src/strings.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2817 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-15 23:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2819 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap buffer overflow in compile_lock_unlock() at src/vim9cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2819 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-15 11:21 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2845 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Buffer Under-read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2845 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-17 15:15 修改: 2023-07-10 16:15 | 
                            
                            
                                | vim-common | CVE-2022-2849 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in latin_ptr2len() at src/mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2849 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-17 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2862 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap use-after-free in generate_PCALL() at src/vim9instr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2862 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-17 20:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-common | CVE-2022-2874 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference in generate_loadvar() in vim9compile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2874 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-18 16:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-common | CVE-2022-2889 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in find_var_also_in_script() in evalvars.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2889 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-19 13:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim-common | CVE-2022-2923 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in function sug_filltree 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2923 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-22 21:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim-common | CVE-2022-2946 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in function vim_vsnprintf_typval 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2946 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-23 17:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim-common | CVE-2022-2980 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in do_mouse() at src/mouse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2980 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-25 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim-common | CVE-2022-2982 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in qf_fill_buffer() at src/quickfix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2982 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-25 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim-common | CVE-2022-3016 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in get_next_valid_entry() at src/quickfix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3016 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-28 12:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim-common | CVE-2022-3037 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in function qf_buf_add_line( ) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3037 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-30 21:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim-common | CVE-2022-3153 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in vim_regcomp() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3153 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-08 15:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-common | CVE-2022-3234 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3234 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-17 22:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim-common | CVE-2022-3235 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3235 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-18 20:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim-common | CVE-2022-3256 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in movemark() at mark.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3256 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-22 13:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim-common | CVE-2022-3278 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in eval_next_non_blank() in eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3278 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-23 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim-common | CVE-2022-3296 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: stack buffer overflow in ex_finally() in ex_eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3296 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-25 17:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim-common | CVE-2022-3297 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in process_next_cpt_value() at insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3297 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-25 19:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim-common | CVE-2022-3352 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3352 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-29 12:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim-common | CVE-2022-3491 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow prior to 9.0.0742 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3491 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-03 13:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-common | CVE-2022-3520 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3520 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-02 19:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-common | CVE-2022-3591 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3591 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-02 17:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-common | CVE-2022-3705 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: a use after free in the function qf_update_buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3705 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-10-26 20:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim-common | CVE-2022-4292 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in did_set_spelllang() in src/spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4292 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-05 19:15 修改: 2023-11-07 03:57 | 
                            
                            
                                | vim-common | CVE-2022-4293 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: floating point exception in num_divide() in src/eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4293 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-05 19:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-common | CVE-2022-47024 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: no check if the return value of XChangeGC() is NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47024 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-20 19:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | vim-common | CVE-2023-0049 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in function build_stl_str_hl 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0049 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-04 16:15 修改: 2025-01-17 20:15 | 
                            
                            
                                | vim-common | CVE-2023-0051 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in msg_puts_printf() in message.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0051 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-04 18:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-common | CVE-2023-0288 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: a heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0288 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-13 16:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim-common | CVE-2023-0433 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: reading past the end of a line when formatting text 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0433 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-21 15:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim-common | CVE-2023-0512 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: divide by zero in adjust_skipcol() at move.ca 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0512 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-30 16:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim-common | CVE-2023-1170 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1170 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-03 23:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | vim-common | CVE-2023-1264 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference issue in utfc_ptr2len 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1264 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-07 22:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | vim-common | CVE-2023-1355 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in class_object_index at vim9class.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1355 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-11 22:15 修改: 2023-11-07 04:03 | 
                            
                            
                                | vim-common | CVE-2023-2609 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL Pointer Dereference in get_register() at register.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2609 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-05-09 18:15 修改: 2023-12-23 07:15 | 
                            
                            
                                | vim-common | CVE-2023-3896 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Divide by zero in scroll_cursor_bot 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3896 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-08-07 13:15 修改: 2023-08-31 19:15 | 
                            
                            
                                | vim-common | CVE-2023-46246 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Integer Overflow in :history command 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46246 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-27 19:15 修改: 2023-12-17 03:15 | 
                            
                            
                                | vim-common | CVE-2023-4733 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function buflist_altfpos 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4733 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-04 14:15 修改: 2024-02-01 17:56 | 
                            
                            
                                | vim-common | CVE-2023-4734 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: segmentation fault in function f_fullcommand in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4734 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-02 18:15 修改: 2023-12-21 02:52 | 
                            
                            
                                | vim-common | CVE-2023-4735 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: OOB Write ops.c in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4735 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-02 18:15 修改: 2023-12-22 17:54 | 
                            
                            
                                | vim-common | CVE-2023-4750 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function bt_quickfix 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4750 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-04 14:15 修改: 2024-02-01 18:01 | 
                            
                            
                                | vim-common | CVE-2023-4751 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in function utfc_ptr2len in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4751 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-03 19:15 修改: 2023-12-22 18:09 | 
                            
                            
                                | vim-common | CVE-2023-48231 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in win_close() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48231 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2023-12-28 17:39 | 
                            
                            
                                | vim-common | CVE-2023-48232 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: floating point exception in adjust_plines_for_skipcol() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48232 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:37 | 
                            
                            
                                | vim-common | CVE-2023-48233 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow with count for :s command 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48233 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:38 | 
                            
                            
                                | vim-common | CVE-2023-48234 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow in nv_z_get_count 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48234 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:33 | 
                            
                            
                                | vim-common | CVE-2023-48235 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow in ex address parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48235 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:33 | 
                            
                            
                                | vim-common | CVE-2023-48236 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow in get_number 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48236 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:38 | 
                            
                            
                                | vim-common | CVE-2023-48237 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer overflow in shift_line 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48237 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:33 | 
                            
                            
                                | vim-common | CVE-2023-48706 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in ex_substitute in Vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48706 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-22 22:15 修改: 2024-01-05 18:15 | 
                            
                            
                                | vim-common | CVE-2023-5441 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference in screen_line() in src/screen.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5441 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-05 21:15 修改: 2023-11-15 02:33 | 
                            
                            
                                | vim-common | CVE-2023-5535 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5535 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-11 20:15 修改: 2023-11-15 02:31 | 
                            
                            
                                | vim-common | CVE-2024-41957 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Double-free/use-after-free vulnerability with Vim editor 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41957 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-01 22:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | vim-common | CVE-2024-41965 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Double-Free Vulnerability in Vim Could Cause Application Crashes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41965 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-01 22:15 修改: 2024-08-09 14:09 | 
                            
                            
                                | vim-common | CVE-2024-43374 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in alist_add() in src/arglist.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43374 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-16 02:15 修改: 2024-08-19 13:00 | 
                            
                            
                                | vim-common | CVE-2024-43790 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out of bounds read when performing a search command 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43790 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-22 22:15 修改: 2024-08-23 16:18 | 
                            
                            
                                | vim-common | CVE-2024-47814 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free when closing buffers in Vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47814 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-10-07 22:15 修改: 2024-10-10 12:57 | 
                            
                            
                                | vim-common | CVE-2025-22134 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow with visual mode in Vim < 9.1.1003 漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22134 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2025-01-13 21:15 修改: 2025-01-13 21:15 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-9116 | 低危 | 2.4.0-3 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9116 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-9117 | 低危 | 2.4.0-3 |  | openjpeg2: Multiple security issues 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9117 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-9580 | 低危 | 2.4.0-3 |  | openjpeg2: Integer overflow in tiftoimage causes heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9580 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2018-08-01 16:29 修改: 2023-02-12 23:27 | 
                            
                            
                                | libopenjp2-7 | CVE-2016-9581 | 低危 | 2.4.0-3 |  | openjpeg2: Infinite loop in tiftoimage resulting into heap buffer overflow in convert_32s_C1P1 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9581 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2018-08-01 14:29 修改: 2023-02-12 23:27 | 
                            
                            
                                | libopenjp2-7 | CVE-2017-17479 | 低危 | 2.4.0-3 |  | openjpeg: Stack-buffer overflow in the pgxtoimage function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17479 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-12-08 19:29 修改: 2018-11-29 14:51 | 
                            
                            
                                | libopenjp2-7 | CVE-2018-16375 | 低危 | 2.4.0-3 |  | openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16375 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2018-09-03 00:29 修改: 2021-01-26 12:50 | 
                            
                            
                                | libopenjp2-7 | CVE-2018-16376 | 低危 | 2.4.0-3 |  | openjpeg: Heap-based buffer overflow in function t2_encode_packet in src/lib/openmj2/t2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16376 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2018-09-03 00:29 修改: 2018-10-31 14:26 | 
                            
                            
                                | libopenjp2-7 | CVE-2018-20846 | 低危 | 2.4.0-3 |  | openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20846 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2019-06-26 18:15 修改: 2023-02-27 16:48 | 
                            
                            
                                | libopenjp2-7 | CVE-2019-6988 | 低危 | 2.4.0-3 |  | openjpeg: DoS via memory exhaustion in opj_decompress 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6988 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2019-01-28 16:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libfreetype6 | CVE-2022-31782 | 低危 | 2.10.4+dfsg-1 |  | ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31782 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-02 14:15 修改: 2022-06-10 18:08 | 
                            
                            
                                | libosmesa6 | CVE-2023-45913 | 低危 | 20.3.5-1 |  | Mesa v23.0.4 was discovered to contain a NULL pointer dereference via  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45913 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 04:15 修改: 2024-11-07 12:35 | 
                            
                            
                                | libosmesa6 | CVE-2023-45919 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a buffer over-read in glXQuerySe ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45919 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | libtiff5 | CVE-2017-16232 | 低危 | 4.2.0-1+deb11u1 |  | libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16232 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15 | 
                            
                            
                                | libtiff5 | CVE-2017-17973 | 低危 | 4.2.0-1+deb11u1 |  | libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17973 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2017-12-29 21:29 修改: 2024-08-05 21:15 | 
                            
                            
                                | libtiff5 | CVE-2017-5563 | 低危 | 4.2.0-1+deb11u1 |  | libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5563 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2017-01-23 07:59 修改: 2019-10-03 00:03 | 
                            
                            
                                | libtiff5 | CVE-2017-9117 | 低危 | 4.2.0-1+deb11u1 |  | libtiff: Heap-based buffer over-read in bmp2tiff 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9117 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2017-05-21 19:29 修改: 2025-01-08 00:15 | 
                            
                            
                                | libtiff5 | CVE-2018-10126 | 低危 | 4.2.0-1+deb11u1 |  | libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10126 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2018-04-21 21:29 修改: 2024-08-20 05:15 | 
                            
                            
                                | libtiff5 | CVE-2022-1056 | 低危 | 4.2.0-1+deb11u1 |  | libtiff: heap-based buffer overflow in _TIFFmemcpy() in tif_unix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1056 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-03-28 19:15 修改: 2023-02-22 17:35 | 
                            
                            
                                | libtiff5 | CVE-2022-1210 | 低危 | 4.2.0-1+deb11u1 |  | tiff: Malicious file leads to a denial of service in TIFF File Handler 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1210 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-04-03 09:15 修改: 2023-07-24 13:46 | 
                            
                            
                                | libtiff5 | CVE-2023-1916 | 低危 | 4.2.0-1+deb11u1 |  | libtiff: out-of-bounds read in extractImageSection() in tools/tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1916 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-10 22:15 修改: 2023-12-23 07:15 | 
                            
                            
                                | libtiff5 | CVE-2023-30775 | 低危 | 4.2.0-1+deb11u1 |  | libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30775 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-19 15:15 修改: 2023-07-03 16:15 | 
                            
                            
                                | libtiff5 | CVE-2023-3164 | 低危 | 4.2.0-1+deb11u1 |  | libtiff: heap-buffer-overflow in extractImageSection() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3164 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-02 12:15 修改: 2024-03-08 19:38 | 
                            
                            
                                | libtiff5 | CVE-2023-6228 | 低危 | 4.2.0-1+deb11u1 |  | libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6228 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-12-18 14:15 修改: 2024-10-11 16:15 | 
                            
                            
                                | libosmesa6 | CVE-2023-45922 | 低危 | 20.3.5-1 |  | glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45922 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 05:15 修改: 2024-11-19 19:35 | 
                            
                            
                                | libosmesa6 | CVE-2023-45931 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a NULL pointer dereference in ch ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45931 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 04:15 修改: 2024-09-04 15:35 | 
                            
                            
                                | libpackagekit-glib2-18 | CVE-2022-0987 | 低危 | 1.2.2-2 |  | PackageKit: Information Disclosure in Transaction Interface via timing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0987 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-28 17:15 修改: 2022-07-09 02:16 | 
                            
                            
                                | gpg-wks-server | CVE-2022-3219 | 低危 | 2.2.27-2+deb11u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | libpam-cap | CVE-2023-2602 | 低危 | 1:2.44-1 |  | libcap: Memory Leak on pthread_create() Error 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2602 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-06 20:15 修改: 2023-11-30 05:15 | 
                            
                            
                                | libcups2 | CVE-2014-8166 | 低危 | 2.3.3op2-3+deb11u1 |  | cups: code execution via unescape ANSI escape sequences 漏洞详情: https://avd.aquasec.com/nvd/cve-2014-8166 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2018-01-12 17:29 修改: 2020-10-23 13:22 | 
                            
                            
                                | git | CVE-2024-50349 | 低危 | 1:2.30.2-1 |  | git: Git does not sanitize URLs when asking for credentials interactively 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50349 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2025-01-14 19:15 修改: 2025-01-14 19:15 | 
                            
                            
                                | libgbm1 | CVE-2023-45913 | 低危 | 20.3.5-1 |  | Mesa v23.0.4 was discovered to contain a NULL pointer dereference via  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45913 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 04:15 修改: 2024-11-07 12:35 | 
                            
                            
                                | libgbm1 | CVE-2023-45919 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a buffer over-read in glXQuerySe ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45919 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | vim-runtime | CVE-2008-4677 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: netrw plugin: FTP username and password disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4677 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2008-10-22 18:00 修改: 2017-08-08 01:32 | 
                            
                            
                                | vim-runtime | CVE-2017-1000382 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Ignores umask when creating a swap file 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000382 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2017-10-31 20:29 修改: 2017-11-27 16:24 | 
                            
                            
                                | vim-runtime | CVE-2021-3903 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3903 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-10-27 21:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-runtime | CVE-2021-3927 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in gchar_cursor() in misc1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3927 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-05 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-runtime | CVE-2021-3928 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: stack-based buffer overflow in spell_iswordp() in spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3928 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-05 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-runtime | CVE-2021-3968 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap use-after-free in ml_append_int function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3968 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-19 12:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-runtime | CVE-2021-3973 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap based buffer overflow in findfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3973 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-19 12:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-runtime | CVE-2021-3974 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use after free in regexp_nfa.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3974 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-19 11:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-runtime | CVE-2021-3984 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: illegal memory access in find_start_brace() in cindent.c when C-indenting 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3984 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-01 11:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | vim-runtime | CVE-2021-4069 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in ex_open() in src/ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4069 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-06 12:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-runtime | CVE-2021-4136 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in eval_lambda() in src/eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4136 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-19 17:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-runtime | CVE-2021-4166 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in do_arg_all() in src/arglist.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4166 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-25 19:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-runtime | CVE-2021-4192 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in win_linetabsize() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4192 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-31 15:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-runtime | CVE-2021-4193 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bound read in getvcol() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4193 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-31 16:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | vim-runtime | CVE-2022-0156 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free while treating allocated lines in user functions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0156 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-10 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0158 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based read buffer overflow in compile_get_env() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0158 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-10 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0213 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: vim is vulnerable to out of bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0213 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-14 13:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | vim-runtime | CVE-2022-0318 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in utf_head_off() in mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0318 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-21 12:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | vim-runtime | CVE-2022-0319 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based out-of-bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0319 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-21 14:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | vim-runtime | CVE-2022-0368 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-bounds Read in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0368 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-26 18:15 修改: 2022-11-09 03:52 | 
                            
                            
                                | vim-runtime | CVE-2022-0393 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in delete_buff_tail() in getchar.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0393 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-28 22:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0407 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow on read in yank_copy_line 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0407 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-30 14:15 修改: 2022-08-26 17:35 | 
                            
                            
                                | vim-runtime | CVE-2022-0408 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Stack-based Buffer Overflow in spellsuggest.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0408 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0413 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use after free in src/ex_cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0413 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0443 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-use-after-free in enter_buffer() of src/buffer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0443 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-02 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0554 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0554 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-10 22:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0629 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Stack-based Buffer Overflow in vim prior to 8.2. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0629 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-17 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0685 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0685 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-20 11:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0696 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL Pointer Dereference in vim prior to 8.2 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0696 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-21 20:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0714 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0714 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-22 20:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0729 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use of Out-of-range Pointer Offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0729 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-23 14:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-0943 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow occurs in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0943 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-03-14 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-1154 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in utf_ptr2char 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1154 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-03-30 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-1420 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-range Pointer Offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1420 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-04-21 11:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | vim-runtime | CVE-2022-1619 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in cmdline_erase_chars of ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1619 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-08 10:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1620 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL Pointer Dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1620 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-08 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1621 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap buffer overflow in vim_strncpy 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1621 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1629 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in function find_next_quote 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1629 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1674 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1674 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-12 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1720 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in grab_file_name() in findfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1720 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-20 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1725 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in vim_regexec_string() at regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1725 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-29 03:15 修改: 2024-01-25 21:05 | 
                            
                            
                                | vim-runtime | CVE-2022-1733 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in cindent.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1733 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-17 17:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1735 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: changing text in visual mode may cause invalid memory access that lead to a heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1735 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-17 19:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-runtime | CVE-2022-1769 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in scriptfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1769 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-17 17:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1771 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: recursive command line loop may cause a Stack-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1771 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-18 20:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-runtime | CVE-2022-1796 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1796 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-19 16:15 修改: 2024-02-15 21:28 | 
                            
                            
                                | vim-runtime | CVE-2022-1851 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in gchar_cursor() in misc1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1851 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-25 13:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1886 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in function utf_head_off 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1886 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-26 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1898 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in find_pattern_in_path() in search.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1898 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-27 09:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1927 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in utf_ptr2char() in mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1927 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-29 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | vim-runtime | CVE-2022-1968 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function utf_ptr2char at mbyte.c:1794 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1968 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-02 14:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-runtime | CVE-2022-2042 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in skipwhite may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2042 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-10 19:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | vim-runtime | CVE-2022-2124 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in current_quote() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2124 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 10:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2125 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in get_lisp_indent() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2125 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2126 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in suggest_trie_walk() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2126 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2175 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in put_on_cmdline() at ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2175 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-23 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2182 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow through parse_cmd_address() in function utf_ptr2char 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2182 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-23 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2183 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read through get_lisp_indent() in function get_lisp_indent 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2183 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-23 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2206 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bound read in function msg_outtrans_attr 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2206 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-26 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2207 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in function ins_bs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2207 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-27 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2208 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in function diff_check 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2208 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-27 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2210 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bound write in function ml_append_int 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2210 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-27 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2231 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer derefernce in function skipwhite may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2231 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-28 20:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2257 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: an out-of-bound read in function msg_outtrans_special 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2257 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-30 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2264 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in inc() at misc2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2264 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-01 11:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2284 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in utfc_ptr2len() at mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2284 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2285 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: integer overflow in del_typebuf() at getchar.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2285 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2286 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in ins_bytes() at change.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2286 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2287 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in suggest_trie_walk() at spellsuggest.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2287 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2289 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in ex_diffgetput() at  diff.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2289 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-03 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2343 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in ins_compl_add() in insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2343 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-08 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2344 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in ins_compl_add() in insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2344 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-08 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2345 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in skipwhite() in charset.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2345 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-08 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2522 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in ins_compl_infercase_gettext() at src/insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2522 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-25 14:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-runtime | CVE-2022-2571 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2571 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:31 | 
                            
                            
                                | vim-runtime | CVE-2022-2581 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-bounds Read in vim src/regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2581 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:30 | 
                            
                            
                                | vim-runtime | CVE-2022-2598 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Undefined Behavior for Input to API in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2598 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-01 15:15 修改: 2023-07-11 08:15 | 
                            
                            
                                | vim-runtime | CVE-2022-2816 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in check_vim9_unlet() at src/vim9cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2816 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-15 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2817 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap use-after-free in string_quote() at src/strings.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2817 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-15 23:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2819 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap buffer overflow in compile_lock_unlock() at src/vim9cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2819 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-15 11:21 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2845 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Buffer Under-read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2845 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-17 15:15 修改: 2023-07-10 16:15 | 
                            
                            
                                | vim-runtime | CVE-2022-2849 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in latin_ptr2len() at src/mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2849 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-17 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2862 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap use-after-free in generate_PCALL() at src/vim9instr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2862 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-17 20:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | vim-runtime | CVE-2022-2874 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference in generate_loadvar() in vim9compile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2874 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-18 16:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-runtime | CVE-2022-2889 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in find_var_also_in_script() in evalvars.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2889 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-19 13:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim-runtime | CVE-2022-2923 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in function sug_filltree 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2923 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-22 21:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim-runtime | CVE-2022-2946 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in function vim_vsnprintf_typval 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2946 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-23 17:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim-runtime | CVE-2022-2980 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in do_mouse() at src/mouse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2980 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-25 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim-runtime | CVE-2022-2982 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in qf_fill_buffer() at src/quickfix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2982 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-25 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | vim-runtime | CVE-2022-3016 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in get_next_valid_entry() at src/quickfix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3016 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-28 12:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim-runtime | CVE-2022-3037 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in function qf_buf_add_line( ) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3037 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-30 21:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim-runtime | CVE-2022-3153 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in vim_regcomp() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3153 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-08 15:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-runtime | CVE-2022-3234 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3234 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-17 22:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim-runtime | CVE-2022-3235 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3235 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-18 20:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | vim-runtime | CVE-2022-3256 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in movemark() at mark.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3256 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-22 13:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim-runtime | CVE-2022-3278 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in eval_next_non_blank() in eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3278 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-23 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim-runtime | CVE-2022-3296 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: stack buffer overflow in ex_finally() in ex_eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3296 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-25 17:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim-runtime | CVE-2022-3297 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in process_next_cpt_value() at insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3297 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-25 19:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim-runtime | CVE-2022-3352 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3352 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-29 12:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim-runtime | CVE-2022-3491 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow prior to 9.0.0742 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3491 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-03 13:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-runtime | CVE-2022-3520 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3520 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-02 19:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-runtime | CVE-2022-3591 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3591 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-02 17:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-runtime | CVE-2022-3705 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: a use after free in the function qf_update_buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3705 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-10-26 20:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | vim-runtime | CVE-2022-4292 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in did_set_spelllang() in src/spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4292 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-05 19:15 修改: 2023-11-07 03:57 | 
                            
                            
                                | vim-runtime | CVE-2022-4293 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: floating point exception in num_divide() in src/eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4293 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-05 19:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-runtime | CVE-2022-47024 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: no check if the return value of XChangeGC() is NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47024 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-20 19:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | vim-runtime | CVE-2023-0049 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in function build_stl_str_hl 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0049 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-04 16:15 修改: 2025-01-17 20:15 | 
                            
                            
                                | vim-runtime | CVE-2023-0051 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in msg_puts_printf() in message.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0051 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-04 18:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | vim-runtime | CVE-2023-0288 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: a heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0288 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-13 16:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim-runtime | CVE-2023-0433 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: reading past the end of a line when formatting text 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0433 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-21 15:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim-runtime | CVE-2023-0512 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: divide by zero in adjust_skipcol() at move.ca 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0512 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-30 16:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | vim-runtime | CVE-2023-1170 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1170 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-03 23:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | vim-runtime | CVE-2023-1264 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference issue in utfc_ptr2len 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1264 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-07 22:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | vim-runtime | CVE-2023-1355 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in class_object_index at vim9class.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1355 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-11 22:15 修改: 2023-11-07 04:03 | 
                            
                            
                                | vim-runtime | CVE-2023-2609 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL Pointer Dereference in get_register() at register.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2609 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-05-09 18:15 修改: 2023-12-23 07:15 | 
                            
                            
                                | vim-runtime | CVE-2023-3896 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Divide by zero in scroll_cursor_bot 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3896 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-08-07 13:15 修改: 2023-08-31 19:15 | 
                            
                            
                                | vim-runtime | CVE-2023-46246 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Integer Overflow in :history command 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46246 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-27 19:15 修改: 2023-12-17 03:15 | 
                            
                            
                                | vim-runtime | CVE-2023-4733 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function buflist_altfpos 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4733 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-04 14:15 修改: 2024-02-01 17:56 | 
                            
                            
                                | vim-runtime | CVE-2023-4734 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: segmentation fault in function f_fullcommand in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4734 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-02 18:15 修改: 2023-12-21 02:52 | 
                            
                            
                                | vim-runtime | CVE-2023-4735 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: OOB Write ops.c in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4735 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-02 18:15 修改: 2023-12-22 17:54 | 
                            
                            
                                | vim-runtime | CVE-2023-4750 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function bt_quickfix 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4750 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-04 14:15 修改: 2024-02-01 18:01 | 
                            
                            
                                | vim-runtime | CVE-2023-4751 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in function utfc_ptr2len in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4751 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-03 19:15 修改: 2023-12-22 18:09 | 
                            
                            
                                | vim-runtime | CVE-2023-48231 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in win_close() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48231 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2023-12-28 17:39 | 
                            
                            
                                | vim-runtime | CVE-2023-48232 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: floating point exception in adjust_plines_for_skipcol() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48232 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:37 | 
                            
                            
                                | vim-runtime | CVE-2023-48233 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow with count for :s command 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48233 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:38 | 
                            
                            
                                | vim-runtime | CVE-2023-48234 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow in nv_z_get_count 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48234 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:33 | 
                            
                            
                                | vim-runtime | CVE-2023-48235 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow in ex address parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48235 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:33 | 
                            
                            
                                | vim-runtime | CVE-2023-48236 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow in get_number 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48236 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:38 | 
                            
                            
                                | vim-runtime | CVE-2023-48237 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer overflow in shift_line 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48237 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:33 | 
                            
                            
                                | vim-runtime | CVE-2023-48706 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in ex_substitute in Vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48706 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-22 22:15 修改: 2024-01-05 18:15 | 
                            
                            
                                | vim-runtime | CVE-2023-5441 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference in screen_line() in src/screen.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5441 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-05 21:15 修改: 2023-11-15 02:33 | 
                            
                            
                                | vim-runtime | CVE-2023-5535 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5535 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-11 20:15 修改: 2023-11-15 02:31 | 
                            
                            
                                | vim-runtime | CVE-2024-41957 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Double-free/use-after-free vulnerability with Vim editor 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41957 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-01 22:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | vim-runtime | CVE-2024-41965 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Double-Free Vulnerability in Vim Could Cause Application Crashes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41965 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-01 22:15 修改: 2024-08-09 14:09 | 
                            
                            
                                | vim-runtime | CVE-2024-43374 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in alist_add() in src/arglist.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43374 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-16 02:15 修改: 2024-08-19 13:00 | 
                            
                            
                                | vim-runtime | CVE-2024-43790 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out of bounds read when performing a search command 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43790 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-22 22:15 修改: 2024-08-23 16:18 | 
                            
                            
                                | vim-runtime | CVE-2024-47814 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free when closing buffers in Vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47814 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-10-07 22:15 修改: 2024-10-10 12:57 | 
                            
                            
                                | vim-runtime | CVE-2025-22134 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow with visual mode in Vim < 9.1.1003 漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22134 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2025-01-13 21:15 修改: 2025-01-13 21:15 | 
                            
                            
                                | libgbm1 | CVE-2023-45922 | 低危 | 20.3.5-1 |  | glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45922 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 05:15 修改: 2024-11-19 19:35 | 
                            
                            
                                | libgbm1 | CVE-2023-45931 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a NULL pointer dereference in ch ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45931 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 04:15 修改: 2024-09-04 15:35 | 
                            
                            
                                | libudev1 | CVE-2013-4392 | 低危 | 247.3-7 |  | systemd: TOCTOU race condition when updating file permissions and SELinux security contexts 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49 | 
                            
                            
                                | xdg-user-dirs | CVE-2017-15131 | 低危 | 0.17-2 |  | gnome-session: Xsession creation of XDG user directories does not honor system umask policy 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15131 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2018-01-09 21:29 修改: 2023-02-12 23:28 | 
                            
                            
                                | libudev1 | CVE-2020-13529 | 低危 | 247.3-7 |  | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16 | 
                            
                            
                                | libudev1 | CVE-2023-31437 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify a seale ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-06-13 17:15 修改: 2025-01-03 20:15 | 
                            
                            
                                | libudev1 | CVE-2023-31438 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can truncate a sea ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | libudev1 | CVE-2023-31439 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify the con ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | libgcc-s1 | CVE-2023-4039 | 低危 | 10.2.1-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | libuuid1 | CVE-2022-0563 | 低危 | 2.36.1-8+deb11u1 |  | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libavresample4 | CVE-2020-22038 | 低危 | 7:4.3.4-0+deb11u1 |  | A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22038 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:36 | 
                            
                            
                                | libavresample4 | CVE-2024-36613 | 低危 | 7:4.3.4-0+deb11u1 | 7:4.3.7-0+deb11u1 | ffmpeg: Integer overflow in ffmpeg 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36613 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-03 18:15 修改: 2025-01-03 21:15 | 
                            
                            
                                | libvncclient1 | CVE-2019-15680 | 低危 | 0.9.13+dfsg-2 |  | TightVNC code version 1.3.10 contains null pointer dereference in Hand ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15680 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2019-10-29 19:15 修改: 2020-12-09 17:15 | 
                            
                            
                                | libgcrypt20 | CVE-2018-6829 | 低危 | 1.8.7-6 |  | libgcrypt: ElGamal implementation doesn't have semantic security due to incorrectly encoded plaintexts possibly allowing to obtain sensitive information 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6829 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2018-02-07 23:29 修改: 2020-01-15 20:15 | 
                            
                            
                                | libvncserver1 | CVE-2019-15680 | 低危 | 0.9.13+dfsg-2 |  | TightVNC code version 1.3.10 contains null pointer dereference in Hand ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15680 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2019-10-29 19:15 修改: 2020-12-09 17:15 | 
                            
                            
                                | gpgconf | CVE-2022-3219 | 低危 | 2.2.27-2+deb11u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | libpam-systemd | CVE-2013-4392 | 低危 | 247.3-7 |  | systemd: TOCTOU race condition when updating file permissions and SELinux security contexts 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49 | 
                            
                            
                                | libpam-systemd | CVE-2020-13529 | 低危 | 247.3-7 |  | systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16 | 
                            
                            
                                | libpam-systemd | CVE-2023-31437 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify a seale ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2025-01-03 20:15 | 
                            
                            
                                | libvpx6 | CVE-2017-0641 | 低危 | 1.9.0-1 |  | libvpx: Weak limit for frames 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-0641 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-06-14 13:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libpam-systemd | CVE-2023-31438 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can truncate a sea ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | libwavpack1 | CVE-2021-44269 | 低危 | 5.4.0-1 |  | wavpack: Heap out-of-bounds read in WavpackPackSamples() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44269 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-03-10 17:44 修改: 2023-11-07 03:39 | 
                            
                            
                                | libpam-systemd | CVE-2023-31439 | 低危 | 247.3-7 |  | An issue was discovered in systemd 253. An attacker can modify the con ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16 | 
                            
                            
                                | git | CVE-2024-52005 | 低危 | 1:2.30.2-1 |  | git: The sideband payload is passed unfiltered to the terminal in git 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52005 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2025-01-15 18:15 修改: 2025-01-15 18:15 | 
                            
                            
                                | libgd3 | CVE-2021-40145 | 低危 | 2.3.0-2 |  | gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka LibGD) throu ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40145 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2021-08-26 01:15 修改: 2024-08-04 03:15 | 
                            
                            
                                | libpcap0.8 | CVE-2023-7256 | 低危 | 1.10.0-2 |  | libpcap: Double Free in libcap 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7256 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-08-31 00:15 修改: 2024-09-19 17:53 | 
                            
                            
                                | libpcap0.8 | CVE-2024-8006 | 低危 | 1.10.0-2 |  | libpcap: NULL pointer derefence in pcap_findalldevs_ex() in pcap-new.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8006 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-08-31 00:15 修改: 2024-09-19 17:46 | 
                            
                            
                                | gpgsm | CVE-2022-3219 | 低危 | 2.2.27-2+deb11u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | gcc-10-base | CVE-2023-4039 | 低危 | 10.2.1-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | libpcre2-8-0 | CVE-2022-41409 | 低危 | 10.36-2 |  | pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-07-18 14:15 修改: 2023-07-27 03:46 | 
                            
                            
                                | libpcre3 | CVE-2017-11164 | 低危 | 2:8.39-13 |  | pcre: OP_KETRMAX feature in the match function in pcre_exec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38 | 
                            
                            
                                | xserver-common | CVE-2022-3553 | 低危 | 2:1.20.11-1+deb11u1 |  | xorg-x11-server: DoS in xquartz when editing the Application menu due to mutaing immutable arrays 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3553 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-17 13:15 修改: 2023-05-30 06:15 | 
                            
                            
                                | xserver-common | CVE-2024-31082 | 低危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u13 | xorg-x11-server: Heap buffer overread/data leakage in ProcAppleDRICreatePixmap 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31082 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-04-04 14:15 修改: 2024-11-13 13:15 | 
                            
                            
                                | libpcre3 | CVE-2017-16231 | 低危 | 2:8.39-13 |  | pcre: self-recursive call in match() in pcre_exec.c leads to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16231 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15 | 
                            
                            
                                | xterm | CVE-2006-4447 | 低危 | 366-1+deb11u1 |  | X.Org and XFree86, including libX11, xdm, xf86dga, xinit, xload, xtran ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2006-4447 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2006-08-30 01:04 修改: 2011-03-08 02:40 | 
                            
                            
                                | xterm | CVE-2023-40359 | 低危 | 366-1+deb11u1 |  | xterm: ReGIS reporting for character-set names containing characters other than alphanumerics or underscore. 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40359 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-08-14 17:15 修改: 2023-09-07 06:15 | 
                            
                            
                                | libpcre3 | CVE-2017-7245 | 低危 | 2:8.39-13 |  | pcre: stack-based buffer overflow write in pcre32_copy_substring 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7245 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29 | 
                            
                            
                                | libpcre3 | CVE-2017-7246 | 低危 | 2:8.39-13 |  | pcre: stack-based buffer overflow write in pcre32_copy_substring 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7246 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29 | 
                            
                            
                                | libpcre3 | CVE-2019-20838 | 低危 | 2:8.39-13 |  | pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20838 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:05 | 
                            
                            
                                | gpgv | CVE-2022-3219 | 低危 | 2.2.27-2+deb11u1 |  | gnupg: denial of service issue (resource consumption) using compressed packets 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31 | 
                            
                            
                                | gcc-9-base | CVE-2023-4039 | 低危 | 9.3.0-22 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | gir1.2-packagekitglib-1.0 | CVE-2022-0987 | 低危 | 1.2.2-2 |  | PackageKit: Information Disclosure in Transaction Interface via timing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0987 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-28 17:15 修改: 2022-07-09 02:16 | 
                            
                            
                                | libperl5.32 | CVE-2011-4116 | 低危 | 5.32.1-4+deb11u2 |  | perl: File:: Temp insecure temporary file handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2020-01-31 18:15 修改: 2020-02-05 22:10 | 
                            
                            
                                | libperl5.32 | CVE-2023-31486 | 低危 | 5.32.1-4+deb11u2 |  | http-tiny: insecure TLS cert default 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31486 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-04-29 00:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | curl | CVE-2021-22923 | 低危 | 7.74.0-1.3+deb11u1 |  | curl: Metalink download sends credentials 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22923 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libpixman-1-0 | CVE-2023-37769 | 低危 | 0.40.0-1 |  | stress-test master commit e4c878 was discovered to contain a FPE vulne ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37769 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-07-17 20:15 修改: 2023-07-28 13:22 | 
                            
                            
                                | libpng16-16 | CVE-2019-6129 | 低危 | 1.6.37-3 |  | libpng: memory leak of png_info struct in pngcp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6129 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2019-01-11 05:29 修改: 2024-08-04 21:15 | 
                            
                            
                                | libpng16-16 | CVE-2021-4214 | 低危 | 1.6.37-3 |  | libpng: hardcoded value leads to heap-overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4214 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-08-24 16:15 修改: 2022-11-08 02:32 | 
                            
                            
                                | curl | CVE-2021-22924 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u2 | curl: Bad connection reuse due to flawed path name checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22924 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libpolkit-agent-1-0 | CVE-2016-2568 | 低危 | 0.105-31+deb11u1 |  | polkit: Program run via pkexec as unprivileged user can escape to parent session via TIOCSTI ioctl 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2568 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2017-02-13 18:59 修改: 2022-04-18 17:59 | 
                            
                            
                                | curl | CVE-2022-35252 | 低危 | 7.74.0-1.3+deb11u1 | 7.74.0-1.3+deb11u3 | curl: Incorrect handling of control code characters in cookies 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libpolkit-gobject-1-0 | CVE-2016-2568 | 低危 | 0.105-31+deb11u1 |  | polkit: Program run via pkexec as unprivileged user can escape to parent session via TIOCSTI ioctl 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2568 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2017-02-13 18:59 修改: 2022-04-18 17:59 | 
                            
                            
                                | curl | CVE-2023-28320 | 低危 | 7.74.0-1.3+deb11u1 |  | curl: siglongjmp race condition may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28320 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-05-26 21:15 修改: 2025-01-15 16:15 | 
                            
                            
                                | libgfortran5 | CVE-2023-4039 | 低危 | 10.2.1-6 |  | gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15 | 
                            
                            
                                | libgif7 | CVE-2020-23922 | 低危 | 5.1.9-2 |  | giflib: out-of-bounds read in DumpScreen2RGB() in gif2rgb.c in gif2rgb tool 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-23922 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2021-04-21 18:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | libgif7 | CVE-2021-40633 | 低危 | 5.1.9-2 |  | A memory leak (out-of-memory) in gif2rgb in util/gif2rgb.c in giflib 5 ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40633 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-06-14 11:15 修改: 2022-06-23 14:20 | 
                            
                            
                                | libgif7 | CVE-2022-28506 | 低危 | 5.1.9-2 |  | giflib: buffer overflow in function DumpScreen2RGB() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28506 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-04-25 13:15 修改: 2023-11-07 03:45 | 
                            
                            
                                | libxml2 | CVE-2024-34459 | 低危 | 2.9.10+dfsg-6.7+deb11u2 |  | libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-05-14 15:39 修改: 2024-08-22 18:35 | 
                            
                            
                                | libgif7 | CVE-2023-39742 | 低危 | 5.1.9-2 |  | giflib: segfault via getarg.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39742 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-08-25 14:15 修改: 2023-11-07 04:17 | 
                            
                            
                                | libgif7 | CVE-2023-48161 | 低危 | 5.1.9-2 |  | giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48161 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2023-11-22 06:15 修改: 2023-11-29 18:48 | 
                            
                            
                                | libgif7 | CVE-2024-45993 | 低危 | 5.1.9-2 |  | giflib: heap buffer overflow via gif2rgb 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45993 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-09-30 17:15 修改: 2024-10-04 13:51 | 
                            
                            
                                | libgl1 | CVE-2023-45924 | 低危 | 1.3.2-1 |  | libglxproto.c in OpenGL libglvnd bb06db5a was discovered to contain a  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45924 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | libpoppler-glib8 | CVE-2013-4472 | 低危 | 20.09.0-3.1 |  | xpdf: insecure temporary file 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4472 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2014-04-22 14:23 修改: 2014-04-23 12:20 | 
                            
                            
                                | xvfb | CVE-2022-3553 | 低危 | 2:1.20.11-1+deb11u1 |  | xorg-x11-server: DoS in xquartz when editing the Application menu due to mutaing immutable arrays 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3553 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2022-10-17 13:15 修改: 2023-05-30 06:15 | 
                            
                            
                                | xvfb | CVE-2024-31082 | 低危 | 2:1.20.11-1+deb11u1 | 2:1.20.11-1+deb11u13 | xorg-x11-server: Heap buffer overread/data leakage in ProcAppleDRICreatePixmap 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31082 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-04-04 14:15 修改: 2024-11-13 13:15 | 
                            
                            
                                | libpoppler-glib8 | CVE-2017-2814 | 低危 | 20.09.0-3.1 |  | poppler: Heap-buffer overflow in DCTStream::readScan() 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2814 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-07-12 17:29 修改: 2022-04-19 19:15 | 
                            
                            
                                | libpoppler-glib8 | CVE-2017-2818 | 低危 | 20.09.0-3.1 |  | poppler: Heap-buffer overflow in the image rendering functionality 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2818 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-07-12 17:29 修改: 2022-04-19 19:15 | 
                            
                            
                                | libpoppler-glib8 | CVE-2017-2820 | 低危 | 20.09.0-3.1 |  | poppler: Integer overflow in the JPEG 2000 image parsing functionality 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2820 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-07-12 17:29 修改: 2023-01-27 20:57 | 
                            
                            
                                | libpoppler-glib8 | CVE-2017-9083 | 低危 | 20.09.0-3.1 |  | poppler: Null pointer dereference in the JPXStream::readUByte function 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9083 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2017-05-19 16:29 修改: 2019-03-14 19:00 | 
                            
                            
                                | libpoppler-glib8 | CVE-2019-9543 | 低危 | 20.09.0-3.1 |  | poppler: recursive function call in JBIG2Stream::readGenericBitmap() in JBIG2Stream.cc causing denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9543 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2019-03-01 19:29 修改: 2021-07-21 11:39 | 
                            
                            
                                | libpoppler-glib8 | CVE-2019-9545 | 低危 | 20.09.0-3.1 |  | poppler: recursive function call in JBIG2Stream::readTextRegion() in JBIG2Stream.cc causing denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9545 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2019-03-01 19:29 修改: 2021-07-21 11:39 | 
                            
                            
                                | libpoppler-glib8 | CVE-2022-24106 | 低危 | 20.09.0-3.1 |  | In Xpdf prior to 4.04, the DCT (JPEG) decoder was incorrectly allowing ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24106 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2022-08-30 04:15 修改: 2022-10-28 20:08 | 
                            
                            
                                | libpoppler-glib8 | CVE-2024-6239 | 低危 | 20.09.0-3.1 |  | poppler: pdfinfo: crash in broken documents when using -dests parameter 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6239 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-06-21 14:15 修改: 2024-11-12 17:15 | 
                            
                            
                                | libgl1-mesa-dri | CVE-2023-45913 | 低危 | 20.3.5-1 |  | Mesa v23.0.4 was discovered to contain a NULL pointer dereference via  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45913 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 04:15 修改: 2024-11-07 12:35 | 
                            
                            
                                | libgl1-mesa-dri | CVE-2023-45919 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a buffer over-read in glXQuerySe ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45919 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | locales | CVE-2010-4756 | 低危 | 2.31-13+deb11u3 |  | glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions 漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15 | 
                            
                            
                                | locales | CVE-2018-20796 | 低危 | 2.31-13+deb11u3 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56 | 
                            
                            
                                | locales | CVE-2019-1010022 | 低危 | 2.31-13+deb11u3 |  | glibc: stack guard protection bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | locales | CVE-2019-1010023 | 低危 | 2.31-13+deb11u3 |  | glibc: running ldd on malicious ELF leads to code execution because of wrong size computation 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | locales | CVE-2019-1010024 | 低危 | 2.31-13+deb11u3 |  | glibc: ASLR bypass using cache of thread stack and heap 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | locales | CVE-2019-1010025 | 低危 | 2.31-13+deb11u3 |  | glibc: information disclosure of heap addresses of pthread_created thread 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15 | 
                            
                            
                                | locales | CVE-2019-9192 | 低危 | 2.31-13+deb11u3 |  | glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15 | 
                            
                            
                                | libgl1-mesa-dri | CVE-2023-45922 | 低危 | 20.3.5-1 |  | glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45922 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 05:15 修改: 2024-11-19 19:35 | 
                            
                            
                                | login | CVE-2007-5686 | 低危 | 1:4.8.1-1 |  | initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2007-5686 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2007-10-28 17:08 修改: 2018-10-15 21:45 | 
                            
                            
                                | login | CVE-2013-4235 | 低危 | 1:4.8.1-1 |  | shadow-utils: TOCTOU race conditions by copying and removing directory trees 漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4235 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2019-12-03 15:15 修改: 2023-02-13 00:28 | 
                            
                            
                                | login | CVE-2023-29383 | 低危 | 1:4.8.1-1 |  | shadow: Improper input validation in shadow-utils package utility chfn 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05 | 
                            
                            
                                | login | CVE-2024-56433 | 低危 | 1:4.8.1-1 |  | shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56433 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 2024-12-26 09:15 修改: 2024-12-26 09:15 | 
                            
                            
                                | login | TEMP-0628843-DBAD28 | 低危 | 1:4.8.1-1 |  | [more related to CVE-2005-4890] 漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28 镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libgl1-mesa-dri | CVE-2023-45931 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a NULL pointer dereference in ch ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45931 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 04:15 修改: 2024-09-04 15:35 | 
                            
                            
                                | mesa-va-drivers | CVE-2023-45913 | 低危 | 20.3.5-1 |  | Mesa v23.0.4 was discovered to contain a NULL pointer dereference via  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45913 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 04:15 修改: 2024-11-07 12:35 | 
                            
                            
                                | mesa-va-drivers | CVE-2023-45919 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a buffer over-read in glXQuerySe ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45919 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | mesa-va-drivers | CVE-2023-45922 | 低危 | 20.3.5-1 |  | glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45922 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 05:15 修改: 2024-11-19 19:35 | 
                            
                            
                                | mesa-va-drivers | CVE-2023-45931 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a NULL pointer dereference in ch ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45931 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 04:15 修改: 2024-09-04 15:35 | 
                            
                            
                                | mesa-vdpau-drivers | CVE-2023-45913 | 低危 | 20.3.5-1 |  | Mesa v23.0.4 was discovered to contain a NULL pointer dereference via  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45913 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 04:15 修改: 2024-11-07 12:35 | 
                            
                            
                                | mesa-vdpau-drivers | CVE-2023-45919 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a buffer over-read in glXQuerySe ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45919 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | mesa-vdpau-drivers | CVE-2023-45922 | 低危 | 20.3.5-1 |  | glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45922 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 05:15 修改: 2024-11-19 19:35 | 
                            
                            
                                | mesa-vdpau-drivers | CVE-2023-45931 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a NULL pointer dereference in ch ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45931 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-03-27 04:15 修改: 2024-09-04 15:35 | 
                            
                            
                                | xxd | CVE-2008-4677 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: netrw plugin: FTP username and password disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4677 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2008-10-22 18:00 修改: 2017-08-08 01:32 | 
                            
                            
                                | xxd | CVE-2017-1000382 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Ignores umask when creating a swap file 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000382 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2017-10-31 20:29 修改: 2017-11-27 16:24 | 
                            
                            
                                | xxd | CVE-2021-3903 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3903 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-10-27 21:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | xxd | CVE-2021-3927 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in gchar_cursor() in misc1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3927 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-05 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | xxd | CVE-2021-3928 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: stack-based buffer overflow in spell_iswordp() in spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3928 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-05 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | xxd | CVE-2021-3968 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap use-after-free in ml_append_int function 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3968 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-19 12:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | xxd | CVE-2021-3973 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap based buffer overflow in findfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3973 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-19 12:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | xxd | CVE-2021-3974 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use after free in regexp_nfa.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3974 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-11-19 11:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | xxd | CVE-2021-3984 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: illegal memory access in find_start_brace() in cindent.c when C-indenting 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3984 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-01 11:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | xxd | CVE-2021-4069 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in ex_open() in src/ex_docmd.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4069 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-06 12:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | xxd | CVE-2021-4136 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in eval_lambda() in src/eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4136 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-19 17:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | xxd | CVE-2021-4166 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in do_arg_all() in src/arglist.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4166 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-25 19:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | xxd | CVE-2021-4192 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in win_linetabsize() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4192 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-31 15:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | xxd | CVE-2021-4193 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bound read in getvcol() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4193 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2021-12-31 16:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | xxd | CVE-2022-0156 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free while treating allocated lines in user functions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0156 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-10 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0158 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based read buffer overflow in compile_get_env() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0158 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-10 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0213 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: vim is vulnerable to out of bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0213 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-14 13:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | xxd | CVE-2022-0318 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based buffer overflow in utf_head_off() in mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0318 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-21 12:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | xxd | CVE-2022-0319 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based out-of-bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0319 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-21 14:15 修改: 2022-11-09 03:32 | 
                            
                            
                                | xxd | CVE-2022-0368 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-bounds Read in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0368 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-26 18:15 修改: 2022-11-09 03:52 | 
                            
                            
                                | xxd | CVE-2022-0393 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in delete_buff_tail() in getchar.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0393 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-28 22:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0407 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow on read in yank_copy_line 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0407 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-30 14:15 修改: 2022-08-26 17:35 | 
                            
                            
                                | xxd | CVE-2022-0408 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Stack-based Buffer Overflow in spellsuggest.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0408 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0413 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use after free in src/ex_cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0413 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-01-30 15:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0443 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-use-after-free in enter_buffer() of src/buffer.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0443 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-02 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0554 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0554 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-10 22:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0629 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Stack-based Buffer Overflow in vim prior to 8.2. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0629 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-17 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0685 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use of Out-of-range Pointer Offset in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0685 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-20 11:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0696 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL Pointer Dereference in vim prior to 8.2 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0696 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-21 20:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0714 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0714 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-22 20:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0729 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use of Out-of-range Pointer Offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0729 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-02-23 14:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-0943 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow occurs in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0943 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-03-14 21:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-1154 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in utf_ptr2char 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1154 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-03-30 12:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-1420 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-range Pointer Offset 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1420 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-04-21 11:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | xxd | CVE-2022-1619 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in cmdline_erase_chars of ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1619 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-08 10:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1620 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL Pointer Dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1620 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-08 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1621 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap buffer overflow in vim_strncpy 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1621 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1629 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in function find_next_quote 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1629 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-10 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1674 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference in vim_regexec_string() of regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1674 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-12 11:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1720 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in grab_file_name() in findfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1720 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-20 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1725 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in vim_regexec_string() at regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1725 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-29 03:15 修改: 2024-01-25 21:05 | 
                            
                            
                                | xxd | CVE-2022-1733 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in cindent.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1733 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-17 17:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1735 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: changing text in visual mode may cause invalid memory access that lead to a heap buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1735 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-17 19:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | xxd | CVE-2022-1769 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in scriptfile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1769 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-17 17:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1771 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: recursive command line loop may cause a Stack-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1771 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-18 20:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | xxd | CVE-2022-1796 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1796 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-19 16:15 修改: 2024-02-15 21:28 | 
                            
                            
                                | xxd | CVE-2022-1851 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in gchar_cursor() in misc1.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1851 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-25 13:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1886 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in function utf_head_off 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1886 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-26 15:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1898 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in find_pattern_in_path() in search.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1898 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-27 09:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1927 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in utf_ptr2char() in mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1927 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-05-29 14:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | xxd | CVE-2022-1968 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function utf_ptr2char at mbyte.c:1794 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1968 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-02 14:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | xxd | CVE-2022-2042 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in skipwhite may lead to crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2042 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-10 19:15 修改: 2023-05-03 12:15 | 
                            
                            
                                | xxd | CVE-2022-2124 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in current_quote() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2124 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 10:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2125 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in get_lisp_indent() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2125 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2126 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in suggest_trie_walk() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2126 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-19 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2175 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer over-read in put_on_cmdline() at ex_getln.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2175 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-23 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2182 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow through parse_cmd_address() in function utf_ptr2char 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2182 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-23 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2183 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read through get_lisp_indent() in function get_lisp_indent 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2183 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-23 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2206 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bound read in function msg_outtrans_attr 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2206 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-26 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2207 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in function ins_bs 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2207 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-27 12:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2208 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in function diff_check 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2208 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-27 13:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2210 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bound write in function ml_append_int 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2210 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-27 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2231 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer derefernce in function skipwhite may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2231 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-28 20:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2257 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: an out-of-bound read in function msg_outtrans_special 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2257 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-06-30 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2264 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in inc() at misc2.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2264 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-01 11:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2284 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in utfc_ptr2len() at mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2284 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2285 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: integer overflow in del_typebuf() at getchar.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2285 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 16:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2286 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in ins_bytes() at change.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2286 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2287 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out of bounds read in suggest_trie_walk() at spellsuggest.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2287 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-02 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2289 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in ex_diffgetput() at  diff.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2289 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-03 15:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2343 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in ins_compl_add() in insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2343 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-08 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2344 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in ins_compl_add() in insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2344 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-08 19:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2345 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in skipwhite() in charset.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2345 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-08 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2522 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in ins_compl_infercase_gettext() at src/insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2522 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-07-25 14:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | xxd | CVE-2022-2571 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2571 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:31 | 
                            
                            
                                | xxd | CVE-2022-2581 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out-of-bounds Read in vim src/regexp.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2581 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-01 15:15 修改: 2022-08-04 23:30 | 
                            
                            
                                | xxd | CVE-2022-2598 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Undefined Behavior for Input to API in vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2598 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-01 15:15 修改: 2023-07-11 08:15 | 
                            
                            
                                | xxd | CVE-2022-2816 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in check_vim9_unlet() at src/vim9cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2816 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-15 22:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2817 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap use-after-free in string_quote() at src/strings.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2817 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-15 23:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2819 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap buffer overflow in compile_lock_unlock() at src/vim9cmds.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2819 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-15 11:21 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2845 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Buffer Under-read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2845 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-17 15:15 修改: 2023-07-10 16:15 | 
                            
                            
                                | xxd | CVE-2022-2849 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in latin_ptr2len() at src/mbyte.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2849 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-17 18:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2862 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap use-after-free in generate_PCALL() at src/vim9instr.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2862 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-17 20:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | xxd | CVE-2022-2874 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference in generate_loadvar() in vim9compile.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2874 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-18 16:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | xxd | CVE-2022-2889 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in find_var_also_in_script() in evalvars.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2889 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-19 13:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | xxd | CVE-2022-2923 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in function sug_filltree 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2923 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-22 21:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | xxd | CVE-2022-2946 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in function vim_vsnprintf_typval 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2946 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-23 17:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | xxd | CVE-2022-2980 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in do_mouse() at src/mouse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2980 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-25 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | xxd | CVE-2022-2982 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in qf_fill_buffer() at src/quickfix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2982 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-25 20:15 修改: 2023-11-07 03:47 | 
                            
                            
                                | xxd | CVE-2022-3016 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in get_next_valid_entry() at src/quickfix.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3016 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-28 12:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | xxd | CVE-2022-3037 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in function qf_buf_add_line( ) 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3037 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-08-30 21:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | xxd | CVE-2022-3153 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in vim_regcomp() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3153 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-08 15:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | xxd | CVE-2022-3234 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3234 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-17 22:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | xxd | CVE-2022-3235 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3235 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-18 20:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | xxd | CVE-2022-3256 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in movemark() at mark.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3256 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-22 13:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | xxd | CVE-2022-3278 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in eval_next_non_blank() in eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3278 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-23 22:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | xxd | CVE-2022-3296 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: stack buffer overflow in ex_finally() in ex_eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3296 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-25 17:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | xxd | CVE-2022-3297 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in process_next_cpt_value() at insexpand.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3297 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-25 19:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | xxd | CVE-2022-3352 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3352 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-09-29 12:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | xxd | CVE-2022-3491 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow prior to 9.0.0742 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3491 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-03 13:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | xxd | CVE-2022-3520 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3520 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-02 19:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | xxd | CVE-2022-3591 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Use After Free 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3591 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-02 17:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | xxd | CVE-2022-3705 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: a use after free in the function qf_update_buffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3705 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-10-26 20:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | xxd | CVE-2022-4292 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in did_set_spelllang() in src/spell.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4292 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-05 19:15 修改: 2023-11-07 03:57 | 
                            
                            
                                | xxd | CVE-2022-4293 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: floating point exception in num_divide() in src/eval.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4293 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2022-12-05 19:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | xxd | CVE-2022-47024 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: no check if the return value of XChangeGC() is NULL 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47024 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-20 19:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | xxd | CVE-2023-0049 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: out-of-bounds read in function build_stl_str_hl 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0049 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-04 16:15 修改: 2025-01-17 20:15 | 
                            
                            
                                | xxd | CVE-2023-0051 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-based buffer overflow in msg_puts_printf() in message.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0051 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-04 18:15 修改: 2023-05-03 12:16 | 
                            
                            
                                | xxd | CVE-2023-0288 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: a heap-based buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0288 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-13 16:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | xxd | CVE-2023-0433 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: reading past the end of a line when formatting text 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0433 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-21 15:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | xxd | CVE-2023-0512 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: divide by zero in adjust_skipcol() at move.ca 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0512 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-01-30 16:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | xxd | CVE-2023-1170 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Heap-based Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1170 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-03 23:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | xxd | CVE-2023-1264 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference issue in utfc_ptr2len 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1264 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-07 22:15 修改: 2023-11-07 04:02 | 
                            
                            
                                | xxd | CVE-2023-1355 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: null pointer dereference in class_object_index at vim9class.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1355 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-03-11 22:15 修改: 2023-11-07 04:03 | 
                            
                            
                                | xxd | CVE-2023-2609 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL Pointer Dereference in get_register() at register.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2609 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-05-09 18:15 修改: 2023-12-23 07:15 | 
                            
                            
                                | xxd | CVE-2023-3896 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Divide by zero in scroll_cursor_bot 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3896 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-08-07 13:15 修改: 2023-08-31 19:15 | 
                            
                            
                                | xxd | CVE-2023-46246 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Integer Overflow in :history command 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46246 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-27 19:15 修改: 2023-12-17 03:15 | 
                            
                            
                                | xxd | CVE-2023-4733 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function buflist_altfpos 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4733 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-04 14:15 修改: 2024-02-01 17:56 | 
                            
                            
                                | xxd | CVE-2023-4734 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: segmentation fault in function f_fullcommand in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4734 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-02 18:15 修改: 2023-12-21 02:52 | 
                            
                            
                                | xxd | CVE-2023-4735 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: OOB Write ops.c in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4735 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-02 18:15 修改: 2023-12-22 17:54 | 
                            
                            
                                | xxd | CVE-2023-4750 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in function bt_quickfix 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4750 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-04 14:15 修改: 2024-02-01 18:01 | 
                            
                            
                                | xxd | CVE-2023-4751 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow in function utfc_ptr2len in vim/vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4751 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-09-03 19:15 修改: 2023-12-22 18:09 | 
                            
                            
                                | xxd | CVE-2023-48231 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free in win_close() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48231 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2023-12-28 17:39 | 
                            
                            
                                | xxd | CVE-2023-48232 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: floating point exception in adjust_plines_for_skipcol() 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48232 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:37 | 
                            
                            
                                | xxd | CVE-2023-48233 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow with count for :s command 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48233 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:38 | 
                            
                            
                                | xxd | CVE-2023-48234 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow in nv_z_get_count 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48234 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:33 | 
                            
                            
                                | xxd | CVE-2023-48235 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow in ex address parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48235 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:33 | 
                            
                            
                                | xxd | CVE-2023-48236 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: overflow in get_number 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48236 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:38 | 
                            
                            
                                | xxd | CVE-2023-48237 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: buffer overflow in shift_line 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48237 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-16 23:15 修改: 2024-01-25 21:33 | 
                            
                            
                                | xxd | CVE-2023-48706 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in ex_substitute in Vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48706 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-11-22 22:15 修改: 2024-01-05 18:15 | 
                            
                            
                                | xxd | CVE-2023-5441 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: NULL pointer dereference in screen_line() in src/screen.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5441 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-05 21:15 修改: 2023-11-15 02:33 | 
                            
                            
                                | xxd | CVE-2023-5535 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use after free 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5535 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2023-10-11 20:15 修改: 2023-11-15 02:31 | 
                            
                            
                                | xxd | CVE-2024-41957 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Double-free/use-after-free vulnerability with Vim editor 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41957 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-01 22:15 修改: 2024-11-29 12:15 | 
                            
                            
                                | xxd | CVE-2024-41965 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Double-Free Vulnerability in Vim Could Cause Application Crashes 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41965 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-01 22:15 修改: 2024-08-09 14:09 | 
                            
                            
                                | xxd | CVE-2024-43374 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free in alist_add() in src/arglist.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43374 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-16 02:15 修改: 2024-08-19 13:00 | 
                            
                            
                                | xxd | CVE-2024-43790 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: Out of bounds read when performing a search command 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43790 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-08-22 22:15 修改: 2024-08-23 16:18 | 
                            
                            
                                | xxd | CVE-2024-47814 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: use-after-free when closing buffers in Vim 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47814 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2024-10-07 22:15 修改: 2024-10-10 12:57 | 
                            
                            
                                | xxd | CVE-2025-22134 | 低危 | 2:8.2.2434-3+deb11u1 |  | vim: heap-buffer-overflow with visual mode in Vim < 9.1.1003 漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22134 镜像层: sha256:8b26ab852d8abd068a5c03238169e919b8a7e5e1152224de5f750efb70744ac3 发布日期: 2025-01-13 21:15 修改: 2025-01-13 21:15 | 
                            
                            
                                | mesa-vulkan-drivers | CVE-2023-45913 | 低危 | 20.3.5-1 |  | Mesa v23.0.4 was discovered to contain a NULL pointer dereference via  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45913 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 04:15 修改: 2024-11-07 12:35 | 
                            
                            
                                | mesa-vulkan-drivers | CVE-2023-45919 | 低危 | 20.3.5-1 |  | Mesa 23.0.4 was discovered to contain a buffer over-read in glXQuerySe ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45919 镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15 | 
                            
                            
                                | libavutil56 | CVE-2024-35366 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the par ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35366 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 20:15 修改: 2024-12-03 14:15 | 
                            
                            
                                | libavutil56 | CVE-2024-35367 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 has an Out-of-bounds Read via libavcodec/ppc/vp8dsp_alti ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35367 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 20:15 修改: 2024-12-02 17:15 | 
                            
                            
                                | python3-oslo.utils | DLA-3870-1 | 未知 | 4.6.0-2 | 4.6.1-0+deb11u1 | python-oslo.utils - security update 漏洞详情:  镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libavutil56 | CVE-2024-35368 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n7.0 is affected by a Double Free via the rkmpp_retrieve_frame  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35368 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 20:15 修改: 2024-12-02 17:15 | 
                            
                            
                                | libavutil56 | CVE-2024-36615 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n7.0 has a race condition vulnerability in the VP9 decoder. Thi ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36615 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 19:15 修改: 2024-12-03 16:15 | 
                            
                            
                                | libavutil56 | CVE-2024-36616 | 未知 | 7:4.3.4-0+deb11u1 |  | An integer overflow in the component /libavformat/westwood_vqa.c of FF ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36616 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 19:15 修改: 2024-12-02 18:15 | 
                            
                            
                                | libavutil56 | CVE-2024-36617 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36617 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 18:15 修改: 2024-12-02 18:15 | 
                            
                            
                                | libavutil56 | CVE-2024-36618 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 has a vulnerability in the AVI demuxer of the libavforma ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36618 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 18:15 修改: 2024-12-02 18:15 | 
                            
                            
                                | libavutil56 | CVE-2025-0518 | 未知 | 7:4.3.4-0+deb11u1 |  | Unchecked Return Value, Out-of-bounds Read vulnerability in FFmpeg all ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0518 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-16 17:15 修改: 2025-01-16 17:15 | 
                            
                            
                                | libavutil56 | DSA-5268-1 | 未知 | 7:4.3.4-0+deb11u1 | 7:4.3.5-0+deb11u1 | ffmpeg - security update 漏洞详情:  镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libavcodec58 | CVE-2024-36617 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36617 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 18:15 修改: 2024-12-02 18:15 | 
                            
                            
                                | libavcodec58 | CVE-2024-36618 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 has a vulnerability in the AVI demuxer of the libavforma ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36618 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 18:15 修改: 2024-12-02 18:15 | 
                            
                            
                                | libavresample4 | CVE-2023-6601 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's HLS demuxer. This vulnerability allows by ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6601 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-06 17:15 修改: 2025-01-06 17:15 | 
                            
                            
                                | libavresample4 | CVE-2023-6602 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's TTY Demuxer. This vulnerability allows po ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6602 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-31 15:15 修改: 2024-12-31 15:15 | 
                            
                            
                                | libavresample4 | CVE-2023-6603 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's HLS playlist parsing. This vulnerability  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6603 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-31 15:15 修改: 2024-12-31 15:15 | 
                            
                            
                                | libavresample4 | CVE-2023-6604 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg. This vulnerability allows unexpected addit ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6604 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-06 17:15 修改: 2025-01-06 17:15 | 
                            
                            
                                | libavresample4 | CVE-2023-6605 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's DASH playlist support. This vulnerability ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6605 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-06 17:15 修改: 2025-01-06 17:15 | 
                            
                            
                                | libavresample4 | CVE-2024-35366 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the par ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35366 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 20:15 修改: 2024-12-03 14:15 | 
                            
                            
                                | libavresample4 | CVE-2024-35367 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 has an Out-of-bounds Read via libavcodec/ppc/vp8dsp_alti ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35367 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 20:15 修改: 2024-12-02 17:15 | 
                            
                            
                                | libavresample4 | CVE-2024-35368 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n7.0 is affected by a Double Free via the rkmpp_retrieve_frame  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35368 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 20:15 修改: 2024-12-02 17:15 | 
                            
                            
                                | libavresample4 | CVE-2024-36615 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n7.0 has a race condition vulnerability in the VP9 decoder. Thi ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36615 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 19:15 修改: 2024-12-03 16:15 | 
                            
                            
                                | libavresample4 | CVE-2024-36616 | 未知 | 7:4.3.4-0+deb11u1 |  | An integer overflow in the component /libavformat/westwood_vqa.c of FF ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36616 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 19:15 修改: 2024-12-02 18:15 | 
                            
                            
                                | libavresample4 | CVE-2024-36617 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36617 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 18:15 修改: 2024-12-02 18:15 | 
                            
                            
                                | libglib2.0-0 | DSA-5682-2 | 未知 | 2.66.8-1 | 2.66.8-1+deb11u3 | glib2.0 - regression update 漏洞详情:  镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libavresample4 | CVE-2024-36618 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 has a vulnerability in the AVI demuxer of the libavforma ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36618 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 18:15 修改: 2024-12-02 18:15 | 
                            
                            
                                | libavresample4 | CVE-2025-0518 | 未知 | 7:4.3.4-0+deb11u1 |  | Unchecked Return Value, Out-of-bounds Read vulnerability in FFmpeg all ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0518 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-16 17:15 修改: 2025-01-16 17:15 | 
                            
                            
                                | libavresample4 | DSA-5268-1 | 未知 | 7:4.3.4-0+deb11u1 | 7:4.3.5-0+deb11u1 | ffmpeg - security update 漏洞详情:  镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libavcodec58 | CVE-2025-0518 | 未知 | 7:4.3.4-0+deb11u1 |  | Unchecked Return Value, Out-of-bounds Read vulnerability in FFmpeg all ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0518 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-16 17:15 修改: 2025-01-16 17:15 | 
                            
                            
                                | libavcodec58 | DSA-5268-1 | 未知 | 7:4.3.4-0+deb11u1 | 7:4.3.5-0+deb11u1 | ffmpeg - security update 漏洞详情:  镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | distro-info-data | DLA-3935-1 | 未知 | 0.51+deb11u1 | 0.51+deb11u7 | distro-info-data - security update 漏洞详情:  镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libglib2.0-bin | DSA-5682-2 | 未知 | 2.66.8-1 | 2.66.8-1+deb11u3 | glib2.0 - regression update 漏洞详情:  镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libavcodec58 | CVE-2023-6601 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's HLS demuxer. This vulnerability allows by ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6601 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-06 17:15 修改: 2025-01-06 17:15 | 
                            
                            
                                | libavcodec58 | CVE-2023-6602 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's TTY Demuxer. This vulnerability allows po ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6602 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-31 15:15 修改: 2024-12-31 15:15 | 
                            
                            
                                | libavcodec58 | CVE-2023-6603 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's HLS playlist parsing. This vulnerability  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6603 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-31 15:15 修改: 2024-12-31 15:15 | 
                            
                            
                                | libmfx1 | CVE-2024-21783 | 未知 | 21.1.0-1 |  | Integer overflow for some Intel(R) VPL software before version 24.1.4  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21783 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-13 21:15 修改: 2024-11-15 14:00 | 
                            
                            
                                | libmfx1 | CVE-2024-21808 | 未知 | 21.1.0-1 |  | Improper buffer restrictions in some Intel(R) VPL software before vers ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21808 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-13 21:15 修改: 2024-11-15 14:00 | 
                            
                            
                                | libmfx1 | CVE-2024-28030 | 未知 | 21.1.0-1 |  | NULL pointer dereference in some Intel(R) VPL software before version  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28030 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-13 21:15 修改: 2024-11-15 14:00 | 
                            
                            
                                | libmfx1 | CVE-2024-28051 | 未知 | 21.1.0-1 |  | Out-of-bounds read in some Intel(R) VPL software before version 24.1.4 ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28051 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-13 21:15 修改: 2024-11-15 14:00 | 
                            
                            
                                | libavcodec58 | CVE-2023-6604 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg. This vulnerability allows unexpected addit ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6604 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-06 17:15 修改: 2025-01-06 17:15 | 
                            
                            
                                | libavcodec58 | CVE-2023-6605 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's DASH playlist support. This vulnerability ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6605 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-06 17:15 修改: 2025-01-06 17:15 | 
                            
                            
                                | libavcodec58 | CVE-2024-35366 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the par ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35366 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 20:15 修改: 2024-12-03 14:15 | 
                            
                            
                                | libglib2.0-data | DSA-5682-2 | 未知 | 2.66.8-1 | 2.66.8-1+deb11u3 | glib2.0 - regression update 漏洞详情:  镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libavcodec58 | CVE-2024-35367 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 has an Out-of-bounds Read via libavcodec/ppc/vp8dsp_alti ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35367 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 20:15 修改: 2024-12-02 17:15 | 
                            
                            
                                | libavcodec58 | CVE-2024-35368 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n7.0 is affected by a Double Free via the rkmpp_retrieve_frame  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35368 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 20:15 修改: 2024-12-02 17:15 | 
                            
                            
                                | libavcodec58 | CVE-2024-36615 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n7.0 has a race condition vulnerability in the VP9 decoder. Thi ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36615 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 19:15 修改: 2024-12-03 16:15 | 
                            
                            
                                | libavcodec58 | CVE-2024-36616 | 未知 | 7:4.3.4-0+deb11u1 |  | An integer overflow in the component /libavformat/westwood_vqa.c of FF ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36616 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 19:15 修改: 2024-12-02 18:15 | 
                            
                            
                                | libavutil56 | CVE-2023-6601 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's HLS demuxer. This vulnerability allows by ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6601 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-06 17:15 修改: 2025-01-06 17:15 | 
                            
                            
                                | libdav1d4 | CVE-2024-1580 | 未知 | 0.7.1-3 | 0.7.1-3+deb11u1 | An integer overflow in dav1d AV1 decoder that can occur when decoding  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1580 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-02-19 11:15 修改: 2024-03-27 18:15 | 
                            
                            
                                | libavutil56 | CVE-2023-6602 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's TTY Demuxer. This vulnerability allows po ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6602 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-31 15:15 修改: 2024-12-31 15:15 | 
                            
                            
                                | libavutil56 | CVE-2023-6603 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's HLS playlist parsing. This vulnerability  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6603 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-31 15:15 修改: 2024-12-31 15:15 | 
                            
                            
                                | libswresample3 | CVE-2023-6601 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's HLS demuxer. This vulnerability allows by ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6601 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-06 17:15 修改: 2025-01-06 17:15 | 
                            
                            
                                | libswresample3 | CVE-2023-6602 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's TTY Demuxer. This vulnerability allows po ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6602 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-31 15:15 修改: 2024-12-31 15:15 | 
                            
                            
                                | libswresample3 | CVE-2023-6603 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's HLS playlist parsing. This vulnerability  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6603 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-12-31 15:15 修改: 2024-12-31 15:15 | 
                            
                            
                                | tzdata | DLA-3972-1 | 未知 | 2021a-1+deb11u3 | 2024b-0+deb11u1 | tzdata - new timezone database 漏洞详情:  镜像层: sha256:78658088978a7596a65f6e864cd30ae00697c62b2b0b82ebf766239ae9c2ed6d 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | ucf | DLA-4016-1 | 未知 | 3.0043 | 3.0043+deb11u1 | ucf - security update 漏洞详情:  镜像层: sha256:accb6e2d681298d8e9c82d7c954f87d9b0147799d48935b1505f95d0433a4527 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libswresample3 | CVE-2023-6604 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg. This vulnerability allows unexpected addit ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6604 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-06 17:15 修改: 2025-01-06 17:15 | 
                            
                            
                                | libswresample3 | CVE-2023-6605 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's DASH playlist support. This vulnerability ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6605 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-06 17:15 修改: 2025-01-06 17:15 | 
                            
                            
                                | libswresample3 | CVE-2024-35366 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the par ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35366 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 20:15 修改: 2024-12-03 14:15 | 
                            
                            
                                | libswresample3 | CVE-2024-35367 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 has an Out-of-bounds Read via libavcodec/ppc/vp8dsp_alti ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35367 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 20:15 修改: 2024-12-02 17:15 | 
                            
                            
                                | libswresample3 | CVE-2024-35368 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n7.0 is affected by a Double Free via the rkmpp_retrieve_frame  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35368 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 20:15 修改: 2024-12-02 17:15 | 
                            
                            
                                | libswresample3 | CVE-2024-36615 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n7.0 has a race condition vulnerability in the VP9 decoder. Thi ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36615 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 19:15 修改: 2024-12-03 16:15 | 
                            
                            
                                | libswresample3 | CVE-2024-36616 | 未知 | 7:4.3.4-0+deb11u1 |  | An integer overflow in the component /libavformat/westwood_vqa.c of FF ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36616 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 19:15 修改: 2024-12-02 18:15 | 
                            
                            
                                | libswresample3 | CVE-2024-36617 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF  ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36617 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 18:15 修改: 2024-12-02 18:15 | 
                            
                            
                                | libswresample3 | CVE-2024-36618 | 未知 | 7:4.3.4-0+deb11u1 |  | FFmpeg n6.1.1 has a vulnerability in the AVI demuxer of the libavforma ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36618 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2024-11-29 18:15 修改: 2024-12-02 18:15 | 
                            
                            
                                | libswresample3 | CVE-2025-0518 | 未知 | 7:4.3.4-0+deb11u1 |  | Unchecked Return Value, Out-of-bounds Read vulnerability in FFmpeg all ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0518 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-16 17:15 修改: 2025-01-16 17:15 | 
                            
                            
                                | libswresample3 | DSA-5268-1 | 未知 | 7:4.3.4-0+deb11u1 | 7:4.3.5-0+deb11u1 | ffmpeg - security update 漏洞详情:  镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | libavutil56 | CVE-2023-6604 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg. This vulnerability allows unexpected addit ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6604 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-06 17:15 修改: 2025-01-06 17:15 | 
                            
                            
                                | libavutil56 | CVE-2023-6605 | 未知 | 7:4.3.4-0+deb11u1 |  | A flaw was found in FFmpeg's DASH playlist support. This vulnerability ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6605 镜像层: sha256:2f8767ec2785c0ddf859c9e8609b22f076b24846eae43d1b2f0b978635696c06 发布日期: 2025-01-06 17:15 修改: 2025-01-06 17:15 |