libexpat |
CVE-2024-45491 |
严重 |
2.6.2-r0 |
2.6.3-r0 |
libexpat: Integer Overflow or Wraparound
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28
|
libexpat |
CVE-2024-45492 |
严重 |
2.6.2-r0 |
2.6.3-r0 |
libexpat: integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28
|
ghostscript |
CVE-2024-46952 |
高危 |
10.02.0-r0 |
10.04.0-r0 |
ghostscript: Buffer Overflow in Ghostscript PDF XRef Stream Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46952
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-11-10 22:15 修改: 2024-11-14 02:01
|
ghostscript |
CVE-2024-46953 |
高危 |
10.02.0-r0 |
10.04.0-r0 |
ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46953
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-11-10 22:15 修改: 2024-11-14 02:01
|
ghostscript |
CVE-2024-46954 |
高危 |
10.02.0-r0 |
10.04.0-r0 |
ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46954
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-11-10 22:15 修改: 2024-11-14 01:58
|
ghostscript |
CVE-2024-46956 |
高危 |
10.02.0-r0 |
10.04.0-r0 |
ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46956
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-11-10 22:15 修改: 2024-11-14 20:39
|
ghostscript |
CVE-2024-33871 |
高危 |
10.02.0-r0 |
10.04.0-r0 |
ghostscript: OPVP device arbitrary code execution via custom Driver library
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33871
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-07-03 19:15 修改: 2024-07-08 14:18
|
ghostscript |
CVE-2024-46951 |
高危 |
10.02.0-r0 |
10.04.0-r0 |
ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46951
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-11-10 21:15 修改: 2024-11-14 02:13
|
libexpat |
CVE-2024-45490 |
高危 |
2.6.2-r0 |
2.6.3-r0 |
libexpat: Negative Length Parsing Vulnerability in libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24
|
ghostscript |
CVE-2024-33870 |
中危 |
10.02.0-r0 |
10.04.0-r0 |
ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33870
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-07-03 19:15 修改: 2024-11-07 22:35
|
ghostscript |
CVE-2024-46955 |
中危 |
10.02.0-r0 |
10.04.0-r0 |
ghostscript: Out-of-Bounds Read in Ghostscript Indexed Color Space
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46955
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-11-10 22:15 修改: 2024-11-14 01:53
|
libcrypto3 |
CVE-2024-6119 |
中危 |
3.1.6-r0 |
3.1.7-r0 |
openssl: Possible denial of service in X.509 name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119
镜像层: sha256:ce7f800efff9a5cfddf4805e3887943b4a7bd97cf83140587336261130ece03b
发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35
|
ghostscript |
CVE-2023-52722 |
中危 |
10.02.0-r0 |
10.04.0-r0 |
ghostscript: eexec seeds other than the Type 1 standard are allowed while using SAFER mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52722
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-04-28 00:15 修改: 2024-12-04 21:15
|
ghostscript |
CVE-2024-29510 |
中危 |
10.02.0-r0 |
10.04.0-r0 |
ghostscript: format string injection leads to shell command execution (SAFER bypass)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29510
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-07-03 19:15 修改: 2024-07-08 14:18
|
ghostscript |
CVE-2024-33869 |
中危 |
10.02.0-r0 |
10.04.0-r0 |
ghostscript: path traversal and command execution due to path reduction
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33869
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-07-03 19:15 修改: 2024-10-31 18:35
|
libexpat |
CVE-2024-50602 |
中危 |
2.6.2-r0 |
2.6.4-r0 |
libexpat: expat: DoS via XML_ResumeParser
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-10-27 05:15 修改: 2024-10-30 18:35
|
libssl3 |
CVE-2024-6119 |
中危 |
3.1.6-r0 |
3.1.7-r0 |
openssl: Possible denial of service in X.509 name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119
镜像层: sha256:ce7f800efff9a5cfddf4805e3887943b4a7bd97cf83140587336261130ece03b
发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35
|
orc |
CVE-2024-40897 |
中危 |
0.4.34-r0 |
0.4.39-r0 |
orc: Stack-based buffer overflow vulnerability in ORC
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40897
镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f
发布日期: 2024-07-26 06:15 修改: 2024-08-27 13:52
|
libssl3 |
CVE-2024-9143 |
低危 |
3.1.6-r0 |
3.1.7-r1 |
openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143
镜像层: sha256:ce7f800efff9a5cfddf4805e3887943b4a7bd97cf83140587336261130ece03b
发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35
|
libcrypto3 |
CVE-2024-9143 |
低危 |
3.1.6-r0 |
3.1.7-r1 |
openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143
镜像层: sha256:ce7f800efff9a5cfddf4805e3887943b4a7bd97cf83140587336261130ece03b
发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35
|