| libcrypto3 |
CVE-2025-15467 |
严重 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15467
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-07 18:12
|
| libcrypto3 |
CVE-2026-31789 |
严重 |
3.5.0-r0 |
3.5.6-r0 |
openssl: OpenSSL: Heap buffer overflow on 32-bit systems from large X.509 certificate processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31789
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2025-15467 |
严重 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15467
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-07 18:12
|
| libssl3 |
CVE-2026-31789 |
严重 |
3.5.0-r0 |
3.5.6-r0 |
openssl: OpenSSL: Heap buffer overflow on 32-bit systems from large X.509 certificate processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31789
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| pcre2 |
CVE-2025-58050 |
严重 |
10.43-r1 |
10.46-r0 |
pcre2: PCRE2: heap-buffer-overflow read in match_ref due to missing boundary restoration in SCS
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58050
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-08-27 19:15 修改: 2025-09-09 15:27
|
| git-init-template |
CVE-2025-48385 |
高危 |
2.49.0-r0 |
2.49.1-r0 |
git: Git arbitrary file writes
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48385
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-07-08 19:15 修改: 2026-04-15 00:35
|
| git |
CVE-2025-46334 |
高危 |
2.49.0-r0 |
2.49.1-r0 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-46334
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-07-10 15:15 修改: 2026-04-15 00:35
|
| git |
CVE-2025-48384 |
高危 |
2.49.0-r0 |
2.49.1-r0 |
git: Git arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48384
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-07-08 19:15 修改: 2025-11-06 14:52
|
| libcrypto3 |
CVE-2025-69419 |
高危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69419
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2025-69421 |
高危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69421
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-28387 |
高危 |
3.5.0-r0 |
3.5.6-r0 |
openssl: OpenSSL: Arbitrary code execution due to use-after-free in DANE TLSA authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28387
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-28388 |
高危 |
3.5.0-r0 |
3.5.6-r0 |
openssl: OpenSSL: Denial of Service due to NULL pointer dereference in delta CRL processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28388
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-28389 |
高危 |
3.5.0-r0 |
3.5.6-r0 |
openssl: OpenSSL: Denial of Service vulnerability in CMS processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28389
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-28390 |
高危 |
3.5.0-r0 |
3.5.6-r0 |
openssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28390
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libexpat |
CVE-2026-25210 |
高危 |
2.7.1-r0 |
2.7.4-r0 |
libexpat: libexpat: Information disclosure and data integrity issues due to integer overflow in buffer reallocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-25210
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2026-01-30 07:16 修改: 2026-03-10 18:17
|
| git |
CVE-2025-48385 |
高危 |
2.49.0-r0 |
2.49.1-r0 |
git: Git arbitrary file writes
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48385
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-07-08 19:15 修改: 2026-04-15 00:35
|
| git-init-template |
CVE-2025-46334 |
高危 |
2.49.0-r0 |
2.49.1-r0 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-46334
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-07-10 15:15 修改: 2026-04-15 00:35
|
| libssl3 |
CVE-2025-69419 |
高危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69419
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2025-69421 |
高危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69421
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-28387 |
高危 |
3.5.0-r0 |
3.5.6-r0 |
openssl: OpenSSL: Arbitrary code execution due to use-after-free in DANE TLSA authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28387
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-28388 |
高危 |
3.5.0-r0 |
3.5.6-r0 |
openssl: OpenSSL: Denial of Service due to NULL pointer dereference in delta CRL processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28388
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-28389 |
高危 |
3.5.0-r0 |
3.5.6-r0 |
openssl: OpenSSL: Denial of Service vulnerability in CMS processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28389
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-28390 |
高危 |
3.5.0-r0 |
3.5.6-r0 |
openssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28390
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| musl |
CVE-2026-40200 |
高危 |
1.2.5-r10 |
1.2.5-r12 |
musl: musl libc: Arbitrary code execution and denial of service via stack-based memory corruption in qsort
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40200
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-10 17:17 修改: 2026-04-27 19:18
|
| musl-utils |
CVE-2026-40200 |
高危 |
1.2.5-r10 |
1.2.5-r12 |
musl: musl libc: Arbitrary code execution and denial of service via stack-based memory corruption in qsort
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40200
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-10 17:17 修改: 2026-04-27 19:18
|
| nghttp2-libs |
CVE-2026-27135 |
高危 |
1.65.0-r0 |
1.68.1 |
nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27135
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2026-03-18 18:16 修改: 2026-03-23 17:51
|
| git-init-template |
CVE-2025-48384 |
高危 |
2.49.0-r0 |
2.49.1-r0 |
git: Git arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48384
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-07-08 19:15 修改: 2025-11-06 14:52
|
| zlib |
CVE-2026-22184 |
高危 |
1.3.1-r2 |
1.3.2-r0 |
zlib: zlib: Arbitrary code execution via buffer overflow in untgz utility
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22184
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-07 21:16 修改: 2026-03-18 16:26
|
| libcrypto3 |
CVE-2025-4575 |
中危 |
3.5.0-r0 |
3.5.1-r0 |
Issue summary: Use of -addreject option with the openssl x509 applicat ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4575
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2025-05-22 14:16 修改: 2025-10-23 14:51
|
| libcrypto3 |
CVE-2025-66199 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66199
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-02-02 18:37
|
| libcrypto3 |
CVE-2025-68160 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68160
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2025-69418 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69418
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2025-69420 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via malformed TimeStamp Response
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69420
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2025-9230 |
中危 |
3.5.0-r0 |
3.5.4-r0 |
openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9230
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2025-09-30 14:15 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2025-9231 |
中危 |
3.5.0-r0 |
3.5.4-r0 |
openssl: Timing side-channel in SM2 algorithm on 64 bit ARM
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9231
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2025-09-30 14:15 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-22795 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22795
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-22796 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22796
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-2673 |
中危 |
3.5.0-r0 |
3.5.6-r0 |
openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-2673
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-03-13 19:54 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-31790 |
中危 |
3.5.0-r0 |
3.5.6-r0 |
openssl: openssl: Information Disclosure from Uninitialized Memory via Invalid RSA Public Key
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31790
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libcurl |
CVE-2025-10148 |
中危 |
8.14.1-r0 |
8.14.1-r2 |
curl: predictable WebSocket mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10148
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:55
|
| libcurl |
CVE-2025-9086 |
中危 |
8.14.1-r0 |
8.14.1-r2 |
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| git-init-template |
CVE-2025-27613 |
中危 |
2.49.0-r0 |
2.49.1-r0 |
gitk: Git file creation flaw
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-27613
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-07-10 15:15 修改: 2026-04-15 00:35
|
| libexpat |
CVE-2025-59375 |
中危 |
2.7.1-r0 |
2.7.2-r0 |
firefox: thunderbird: expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-59375
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-09-15 03:15 修改: 2026-05-12 13:17
|
| libexpat |
CVE-2026-32776 |
中危 |
2.7.1-r0 |
2.7.5-r0 |
libexpat: libexpat: Denial of Service due to NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32776
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2026-03-16 14:19 修改: 2026-03-17 15:52
|
| libexpat |
CVE-2026-32777 |
中危 |
2.7.1-r0 |
2.7.5-r0 |
libexpat: libexpat: Denial of Service via infinite loop in DTD content parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32777
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2026-03-16 14:19 修改: 2026-03-17 15:52
|
| libexpat |
CVE-2026-32778 |
中危 |
2.7.1-r0 |
2.7.5-r0 |
libexpat: libexpat: Denial of Service via NULL pointer dereference after out-of-memory condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32778
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2026-03-16 14:19 修改: 2026-03-17 15:52
|
| git-init-template |
CVE-2025-27614 |
中危 |
2.49.0-r0 |
2.49.1-r0 |
gitk: git script execution flaw
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-27614
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-07-10 15:15 修改: 2026-04-15 00:35
|
| git-init-template |
CVE-2025-48386 |
中危 |
2.49.0-r0 |
2.49.1-r0 |
git: Git buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48386
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-07-08 19:15 修改: 2026-04-15 00:35
|
| busybox-binsh |
CVE-2024-58251 |
中危 |
1.37.0-r18 |
1.37.0-r20 |
In netstat in BusyBox through 1.37.0, local users can launch of networ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58251
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2025-04-23 18:16 修改: 2026-04-15 00:35
|
| c-ares |
CVE-2025-62408 |
中危 |
1.34.5-r0 |
1.34.6-r0 |
c-ares: c-ares: Denial of Service due to query termination after maximum attempts
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-62408
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-12-08 22:15 修改: 2026-02-02 14:40
|
| git |
CVE-2025-27613 |
中危 |
2.49.0-r0 |
2.49.1-r0 |
gitk: Git file creation flaw
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-27613
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-07-10 15:15 修改: 2026-04-15 00:35
|
| git |
CVE-2025-27614 |
中危 |
2.49.0-r0 |
2.49.1-r0 |
gitk: git script execution flaw
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-27614
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-07-10 15:15 修改: 2026-04-15 00:35
|
| git |
CVE-2025-48386 |
中危 |
2.49.0-r0 |
2.49.1-r0 |
git: Git buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48386
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-07-08 19:15 修改: 2026-04-15 00:35
|
| curl |
CVE-2025-10148 |
中危 |
8.14.1-r0 |
8.14.1-r2 |
curl: predictable WebSocket mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10148
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:55
|
| libssl3 |
CVE-2025-11187 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11187
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-03-20 14:16
|
| libssl3 |
CVE-2025-15468 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15468
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-02-02 18:38
|
| libssl3 |
CVE-2025-15469 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15469
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-02-02 18:37
|
| libssl3 |
CVE-2025-4575 |
中危 |
3.5.0-r0 |
3.5.1-r0 |
Issue summary: Use of -addreject option with the openssl x509 applicat ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4575
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2025-05-22 14:16 修改: 2025-10-23 14:51
|
| libssl3 |
CVE-2025-66199 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service due to excessive memory allocation in TLS 1.3 certificate compression
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66199
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-02-02 18:37
|
| libssl3 |
CVE-2025-68160 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68160
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2025-69418 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69418
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2025-69420 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via malformed TimeStamp Response
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69420
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2025-9230 |
中危 |
3.5.0-r0 |
3.5.4-r0 |
openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9230
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2025-09-30 14:15 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2025-9231 |
中危 |
3.5.0-r0 |
3.5.4-r0 |
openssl: Timing side-channel in SM2 algorithm on 64 bit ARM
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9231
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2025-09-30 14:15 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-22795 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22795
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-22796 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22796
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-2673 |
中危 |
3.5.0-r0 |
3.5.6-r0 |
openssl: OpenSSL TLS 1.3 server may choose unexpected key agreement group
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-2673
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-03-13 19:54 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-31790 |
中危 |
3.5.0-r0 |
3.5.6-r0 |
openssl: openssl: Information Disclosure from Uninitialized Memory via Invalid RSA Public Key
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31790
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| curl |
CVE-2025-9086 |
中危 |
8.14.1-r0 |
8.14.1-r2 |
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| musl |
CVE-2026-6042 |
中危 |
1.2.5-r10 |
1.2.5-r11 |
musl libc: GB18030 4-byte Decoder: musl libc: Denial of Service via inefficient algorithmic complexity in iconv
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6042
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-10 09:16 修改: 2026-04-24 18:01
|
| busybox |
CVE-2024-58251 |
中危 |
1.37.0-r18 |
1.37.0-r20 |
In netstat in BusyBox through 1.37.0, local users can launch of networ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58251
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2025-04-23 18:16 修改: 2026-04-15 00:35
|
| musl-utils |
CVE-2026-6042 |
中危 |
1.2.5-r10 |
1.2.5-r11 |
musl libc: GB18030 4-byte Decoder: musl libc: Denial of Service via inefficient algorithmic complexity in iconv
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6042
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-04-10 09:16 修改: 2026-04-24 18:01
|
| libcrypto3 |
CVE-2025-11187 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Arbitrary code execution or denial of service through crafted PKCS#12 file
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11187
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-03-20 14:16
|
| openssh-client-common |
CVE-2025-61984 |
中危 |
10.0_p1-r7 |
10.0_p1-r10 |
openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61984
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-10-06 19:15 修改: 2026-04-15 00:35
|
| openssh-client-common |
CVE-2025-61985 |
中危 |
10.0_p1-r7 |
10.0_p1-r10 |
openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61985
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-10-06 19:15 修改: 2026-04-15 00:35
|
| openssh-client-default |
CVE-2025-61984 |
中危 |
10.0_p1-r7 |
10.0_p1-r10 |
openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61984
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-10-06 19:15 修改: 2026-04-15 00:35
|
| openssh-client-default |
CVE-2025-61985 |
中危 |
10.0_p1-r7 |
10.0_p1-r10 |
openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61985
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-10-06 19:15 修改: 2026-04-15 00:35
|
| openssh-keygen |
CVE-2025-61984 |
中危 |
10.0_p1-r7 |
10.0_p1-r10 |
openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61984
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-10-06 19:15 修改: 2026-04-15 00:35
|
| openssh-keygen |
CVE-2025-61985 |
中危 |
10.0_p1-r7 |
10.0_p1-r10 |
openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61985
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-10-06 19:15 修改: 2026-04-15 00:35
|
| libcrypto3 |
CVE-2025-15468 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Denial of Service via NULL pointer dereference in QUIC protocol handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15468
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-02-02 18:38
|
| ssl_client |
CVE-2024-58251 |
中危 |
1.37.0-r18 |
1.37.0-r20 |
In netstat in BusyBox through 1.37.0, local users can launch of networ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58251
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2025-04-23 18:16 修改: 2026-04-15 00:35
|
| libcrypto3 |
CVE-2025-15469 |
中危 |
3.5.0-r0 |
3.5.5-r0 |
openssl: OpenSSL: Data integrity bypass in `openssl dgst` command due to silent truncation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15469
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-01-27 16:16 修改: 2026-02-02 18:37
|
| zlib |
CVE-2026-27171 |
中危 |
1.3.1-r2 |
1.3.2-r0 |
zlib: zlib: Denial of Service via infinite loop in CRC32 combine functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27171
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2026-02-18 04:16 修改: 2026-03-25 21:27
|
| libexpat |
CVE-2026-24515 |
低危 |
2.7.1-r0 |
2.7.4-r0 |
libexpat: libexpat null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-24515
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2026-01-23 08:16 修改: 2026-02-05 17:27
|
| busybox-binsh |
CVE-2025-46394 |
低危 |
1.37.0-r18 |
1.37.0-r20 |
In tar in BusyBox through 1.37.0, a TAR archive can have filenames hid ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-46394
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2025-04-23 16:15 修改: 2025-09-24 14:38
|
| busybox |
CVE-2025-46394 |
低危 |
1.37.0-r18 |
1.37.0-r20 |
In tar in BusyBox through 1.37.0, a TAR archive can have filenames hid ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-46394
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2025-04-23 16:15 修改: 2025-09-24 14:38
|
| libcrypto3 |
CVE-2025-9232 |
低危 |
3.5.0-r0 |
3.5.4-r0 |
openssl: Out-of-bounds read in HTTP client no_proxy handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9232
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2025-09-30 14:15 修改: 2026-05-12 13:17
|
| git |
CVE-2025-46835 |
低危 |
2.49.0-r0 |
2.49.1-r0 |
git: Git GUI can create and overwrite files for which the user has write permission
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-46835
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-07-10 15:15 修改: 2026-04-15 00:35
|
| ssl_client |
CVE-2025-46394 |
低危 |
1.37.0-r18 |
1.37.0-r20 |
In tar in BusyBox through 1.37.0, a TAR archive can have filenames hid ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-46394
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2025-04-23 16:15 修改: 2025-09-24 14:38
|
| libssl3 |
CVE-2025-9232 |
低危 |
3.5.0-r0 |
3.5.4-r0 |
openssl: Out-of-bounds read in HTTP client no_proxy handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9232
镜像层: sha256:fd2758d7a50e2b78d275ee7d1c218489f2439084449d895fa17eede6c61ab2c4
发布日期: 2025-09-30 14:15 修改: 2026-05-12 13:17
|
| git-init-template |
CVE-2025-46835 |
低危 |
2.49.0-r0 |
2.49.1-r0 |
git: Git GUI can create and overwrite files for which the user has write permission
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-46835
镜像层: sha256:ce9ed5f5bf32659e87b7581bf6b366f23dafe79d7bceceb3d7f83f12f6410166
发布日期: 2025-07-10 15:15 修改: 2026-04-15 00:35
|