apt |
CVE-2016-1252 |
高危 |
1.0.1ubuntu2.14 |
1.0.1ubuntu2.17 |
The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1252
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-12-05 16:29 修改: 2020-08-14 15:26
|
apt |
CVE-2019-3462 |
高危 |
1.0.1ubuntu2.14 |
1.0.1ubuntu2.19 |
Incorrect sanitation of the 302 redirect field in HTTP transport metho ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3462
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-01-28 21:29 修改: 2023-11-07 03:09
|
apt-utils |
CVE-2016-1252 |
高危 |
1.0.1ubuntu2.14 |
1.0.1ubuntu2.17 |
The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1252
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-12-05 16:29 修改: 2020-08-14 15:26
|
apt-utils |
CVE-2019-3462 |
高危 |
1.0.1ubuntu2.14 |
1.0.1ubuntu2.19 |
Incorrect sanitation of the 302 redirect field in HTTP transport metho ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3462
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-01-28 21:29 修改: 2023-11-07 03:09
|
libapt-inst1.5 |
CVE-2016-1252 |
高危 |
1.0.1ubuntu2.14 |
1.0.1ubuntu2.17 |
The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1252
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-12-05 16:29 修改: 2020-08-14 15:26
|
libapt-inst1.5 |
CVE-2019-3462 |
高危 |
1.0.1ubuntu2.14 |
1.0.1ubuntu2.19 |
Incorrect sanitation of the 302 redirect field in HTTP transport metho ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3462
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-01-28 21:29 修改: 2023-11-07 03:09
|
libapt-pkg4.12 |
CVE-2016-1252 |
高危 |
1.0.1ubuntu2.14 |
1.0.1ubuntu2.17 |
The apt package in Debian jessie before 1.0.9.8.4, in Debian unstable ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1252
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-12-05 16:29 修改: 2020-08-14 15:26
|
libapt-pkg4.12 |
CVE-2019-3462 |
高危 |
1.0.1ubuntu2.14 |
1.0.1ubuntu2.19 |
Incorrect sanitation of the 302 redirect field in HTTP transport metho ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3462
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-01-28 21:29 修改: 2023-11-07 03:09
|
libc-bin |
CVE-2018-1000001 |
高危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: realpath() buffer underflow when getcwd() returns relative path allows privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000001
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-01-31 14:29 修改: 2019-10-03 00:03
|
libc6 |
CVE-2018-1000001 |
高危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: realpath() buffer underflow when getcwd() returns relative path allows privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000001
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-01-31 14:29 修改: 2019-10-03 00:03
|
libservlet3.0-java |
CVE-2016-8735 |
高危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8735
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-06 21:59 修改: 2024-06-27 19:23
|
libservlet3.0-java |
CVE-2017-12617 |
高危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Remote Code Execution bypass for CVE-2017-12615
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12617
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-04 01:29 修改: 2024-07-16 17:58
|
libtomcat7-java |
CVE-2016-8735 |
高危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8735
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-06 21:59 修改: 2024-06-27 19:23
|
libtomcat7-java |
CVE-2017-12617 |
高危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Remote Code Execution bypass for CVE-2017-12615
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12617
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-04 01:29 修改: 2024-07-16 17:58
|
multiarch-support |
CVE-2018-1000001 |
高危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: realpath() buffer underflow when getcwd() returns relative path allows privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000001
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-01-31 14:29 修改: 2019-10-03 00:03
|
sudo |
CVE-2017-1000367 |
高危 |
1.8.9p5-1ubuntu1.2 |
1.8.9p5-1ubuntu1.4 |
sudo: Privilege escalation in via improper get_process_ttyname() parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000367
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-06-05 14:29 修改: 2023-11-07 02:37
|
tomcat7 |
CVE-2016-8735 |
高危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8735
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-06 21:59 修改: 2024-06-27 19:23
|
tomcat7 |
CVE-2017-12617 |
高危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Remote Code Execution bypass for CVE-2017-12615
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12617
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-04 01:29 修改: 2024-07-16 17:58
|
tomcat7-common |
CVE-2016-8735 |
高危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: Remote code execution vulnerability in JmxRemoteLifecycleListener
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8735
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-06 21:59 修改: 2024-06-27 19:23
|
tomcat7-common |
CVE-2017-12617 |
高危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Remote Code Execution bypass for CVE-2017-12615
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12617
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-04 01:29 修改: 2024-07-16 17:58
|
busybox-initramfs |
CVE-2017-16544 |
中危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: Insufficient sanitization of filenames when autocompleting
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16544
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-11-20 15:29 修改: 2022-10-28 19:29
|
busybox-initramfs |
CVE-2018-1000517 |
中危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: wget: Heap-based buffer overflow in the retrieve_file_data() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000517
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-26 16:29 修改: 2021-02-18 14:41
|
busybox-initramfs |
CVE-2019-5747 |
中危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: Out of bounds read in udhcp components resulting in information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5747
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-01-09 16:29 修改: 2022-10-29 02:30
|
libc-bin |
CVE-2015-8982 |
中危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: multiple overflows in strxfrm()
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8982
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-15 19:59 修改: 2023-11-07 02:28
|
libc-bin |
CVE-2015-8983 |
中危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: _IO_wstr_overflow integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8983
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-20 16:59 修改: 2023-11-07 02:28
|
libc-bin |
CVE-2015-8984 |
中危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: potential denial of service in internal_fnmatch()
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8984
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-20 16:59 修改: 2023-11-07 02:28
|
libc-bin |
CVE-2017-1000366 |
中危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.13 |
glibc: heap/stack gap jumping via unbounded stack allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000366
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-06-19 16:29 修改: 2020-10-15 13:28
|
eject |
CVE-2017-6964 |
中危 |
2.1.5+deb1+cvs20081104-13.1 |
2.1.5+deb1+cvs20081104-13.1ubuntu0.14.04.1 |
dmcrypt-get-device, as shipped in the eject package of Debian and Ubun ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6964
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-28 01:59 修改: 2024-01-21 01:37
|
libc6 |
CVE-2015-8982 |
中危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: multiple overflows in strxfrm()
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8982
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-15 19:59 修改: 2023-11-07 02:28
|
libc6 |
CVE-2015-8983 |
中危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: _IO_wstr_overflow integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8983
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-20 16:59 修改: 2023-11-07 02:28
|
libc6 |
CVE-2015-8984 |
中危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: potential denial of service in internal_fnmatch()
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8984
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-20 16:59 修改: 2023-11-07 02:28
|
libc6 |
CVE-2017-1000366 |
中危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.13 |
glibc: heap/stack gap jumping via unbounded stack allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000366
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-06-19 16:29 修改: 2020-10-15 13:28
|
libcups2 |
CVE-2017-18190 |
中危 |
1.7.2-0ubuntu1.7 |
1.7.2-0ubuntu1.9 |
cups: DNS rebinding attacks via incorrect whitelist
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18190
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-02-16 17:29 修改: 2019-10-03 00:03
|
libcups2 |
CVE-2017-18248 |
中危 |
1.7.2-0ubuntu1.7 |
1.7.2-0ubuntu1.10 |
cups: Invalid usernames handled in scheduler/ipp.c:add_job() allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18248
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-03-26 17:29 修改: 2018-07-13 01:29
|
libcups2 |
CVE-2018-4180 |
中危 |
1.7.2-0ubuntu1.7 |
1.7.2-0ubuntu1.10 |
cups: Local privilege escalation to root due to insecure environment variable handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-4180
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-01-11 18:29 修改: 2019-10-03 00:03
|
libcups2 |
CVE-2018-4181 |
中危 |
1.7.2-0ubuntu1.7 |
1.7.2-0ubuntu1.10 |
cups: Manipulation of cupsd.conf by a local attacker resulting in limited reads of arbitrary files as root
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-4181
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-01-11 18:29 修改: 2019-10-03 00:03
|
libcups2 |
CVE-2018-4300 |
中危 |
1.7.2-0ubuntu1.7 |
1.7.2-0ubuntu1.11 |
cups: Session cookie generated by the CUPS web interface is easy to guess
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-4300
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-04-03 18:29 修改: 2019-09-28 12:15
|
libcups2 |
CVE-2018-6553 |
中危 |
1.7.2-0ubuntu1.7 |
1.7.2-0ubuntu1.10 |
cups: AppArmor cupsd Sandbox Bypass Due to Use of Hard Links
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6553
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-10 15:29 修改: 2019-10-03 00:03
|
libdb5.3 |
CVE-2017-10140 |
中危 |
5.3.28-3ubuntu3 |
5.3.28-3ubuntu3.1 |
libdb: Reads DB_CONFIG from the current working directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10140
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-04-16 17:29 修改: 2020-07-15 18:15
|
libdbus-1-3 |
CVE-2015-0245 |
中危 |
1.6.18-0ubuntu4.3 |
1.6.18-0ubuntu4.4 |
dbus: denial of service in dbus systemd activation
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-0245
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2015-02-13 15:59 修改: 2023-12-27 16:36
|
libexpat1 |
CVE-2017-9233 |
中危 |
2.1.0-4ubuntu1.3 |
2.1.0-4ubuntu1.4 |
expat: Inifinite loop due to invalid XML in external entity
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9233
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-07-25 20:29 修改: 2023-11-07 02:50
|
libffi6 |
CVE-2017-1000376 |
中危 |
3.1~rc1+r3.0.13-12ubuntu0.1 |
3.1~rc1+r3.0.13-12ubuntu0.2 |
libffi requests an executable stack allowing attackers to more easily ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000376
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-06-19 16:29 修改: 2023-09-22 18:25
|
libfreetype6 |
CVE-2016-10244 |
中危 |
2.5.2-1ubuntu2.5 |
2.5.2-1ubuntu2.6 |
freetype: parse_charstrings function in type1/t1load.c does not ensure that a font contains a glyph name
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10244
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-06 06:59 修改: 2021-01-26 12:33
|
libfreetype6 |
CVE-2016-10328 |
中危 |
2.5.2-1ubuntu2.5 |
2.5.2-1ubuntu2.7 |
freetype: heap-based buffer overflow related to the cff_parser_run function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10328
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-14 04:59 修改: 2021-03-26 20:32
|
libfreetype6 |
CVE-2017-8105 |
中危 |
2.5.2-1ubuntu2.5 |
2.5.2-1ubuntu2.8 |
freetype: heap-based buffer overflow related to the t1_decoder_parse_charstrings
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8105
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 18:59 修改: 2021-01-26 12:33
|
libfreetype6 |
CVE-2017-8287 |
中危 |
2.5.2-1ubuntu2.5 |
2.5.2-1ubuntu2.8 |
freetype: heap-based buffer overflow related to the t1_builder_close_contour function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8287
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-27 00:59 修改: 2021-01-26 12:33
|
libgcrypt11 |
CVE-2017-7526 |
中危 |
1.5.3-2ubuntu4.4 |
1.5.3-2ubuntu4.5 |
libgcrypt: Use of left-to-right sliding window method allows full RSA key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7526
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-07-26 13:29 修改: 2023-11-07 02:50
|
libgdk-pixbuf2.0-0 |
CVE-2017-1000422 |
中危 |
2.30.7-0ubuntu1.6 |
2.30.7-0ubuntu1.8 |
gdk-pixbuf: Integer overflow in io-gif.c:gif_get_lzw() can lead to memory corruption and potential code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000422
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-02 20:29 修改: 2019-05-02 16:35
|
libgdk-pixbuf2.0-0 |
CVE-2017-2862 |
中危 |
2.30.7-0ubuntu1.6 |
2.30.7-0ubuntu1.7 |
gdk-pixbuf2: Heap overflow in the gdk_pixbuf__jpeg_image_load_increment function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2862
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-05 18:29 修改: 2022-06-07 17:39
|
libgdk-pixbuf2.0-0 |
CVE-2017-2870 |
中危 |
2.30.7-0ubuntu1.6 |
2.30.7-0ubuntu1.7 |
gdk-pixbuf2: Integer overflow in tiff_image_parse function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2870
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-05 18:29 修改: 2022-06-07 17:39
|
libgdk-pixbuf2.0-common |
CVE-2017-1000422 |
中危 |
2.30.7-0ubuntu1.6 |
2.30.7-0ubuntu1.8 |
gdk-pixbuf: Integer overflow in io-gif.c:gif_get_lzw() can lead to memory corruption and potential code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000422
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-02 20:29 修改: 2019-05-02 16:35
|
libgdk-pixbuf2.0-common |
CVE-2017-2862 |
中危 |
2.30.7-0ubuntu1.6 |
2.30.7-0ubuntu1.7 |
gdk-pixbuf2: Heap overflow in the gdk_pixbuf__jpeg_image_load_increment function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2862
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-05 18:29 修改: 2022-06-07 17:39
|
libgdk-pixbuf2.0-common |
CVE-2017-2870 |
中危 |
2.30.7-0ubuntu1.6 |
2.30.7-0ubuntu1.7 |
gdk-pixbuf2: Integer overflow in tiff_image_parse function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2870
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-05 18:29 修改: 2022-06-07 17:39
|
libglib2.0-0 |
CVE-2018-16428 |
中危 |
2.40.2-0ubuntu1 |
2.40.2-0ubuntu1.1 |
glib2: NULL pointer dereference in g_markup_parse_context_end_parse() function in gmarkup.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16428
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-09-04 00:29 修改: 2019-07-31 21:15
|
libglib2.0-0 |
CVE-2018-16429 |
中危 |
2.40.2-0ubuntu1 |
2.40.2-0ubuntu1.1 |
glib2: Out-of-bounds read in g_markup_parse_context_parse() in gmarkup.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16429
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-09-04 00:29 修改: 2023-11-07 02:53
|
libgnutls-openssl27 |
CVE-2017-5335 |
中危 |
2.12.23-12ubuntu2.5 |
2.12.23-12ubuntu2.6 |
gnutls: Out of memory while parsing crafted OpenPGP certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5335
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-24 15:59 修改: 2018-10-30 16:27
|
libgnutls-openssl27 |
CVE-2017-5336 |
中危 |
2.12.23-12ubuntu2.5 |
2.12.23-12ubuntu2.6 |
gnutls: Stack overflow in cdk_pk_get_keyid
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5336
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-24 15:59 修改: 2018-10-30 16:27
|
libgnutls-openssl27 |
CVE-2017-5337 |
中危 |
2.12.23-12ubuntu2.5 |
2.12.23-12ubuntu2.6 |
gnutls: Heap read overflow in read-packet.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5337
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-24 15:59 修改: 2018-10-30 16:27
|
libgnutls26 |
CVE-2017-5335 |
中危 |
2.12.23-12ubuntu2.5 |
2.12.23-12ubuntu2.6 |
gnutls: Out of memory while parsing crafted OpenPGP certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5335
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-24 15:59 修改: 2018-10-30 16:27
|
libgnutls26 |
CVE-2017-5336 |
中危 |
2.12.23-12ubuntu2.5 |
2.12.23-12ubuntu2.6 |
gnutls: Stack overflow in cdk_pk_get_keyid
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5336
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-24 15:59 修改: 2018-10-30 16:27
|
libgnutls26 |
CVE-2017-5337 |
中危 |
2.12.23-12ubuntu2.5 |
2.12.23-12ubuntu2.6 |
gnutls: Heap read overflow in read-packet.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5337
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-24 15:59 修改: 2018-10-30 16:27
|
libgraphite2-3 |
CVE-2017-7771 |
中危 |
1.3.6-1ubuntu0.14.04.1 |
1.3.10-0ubuntu0.14.04.1 |
graphite2: out of bounds read in "graphite2::Pass::readPass"
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7771
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-04-15 12:31 修改: 2019-04-15 19:58
|
libgraphite2-3 |
CVE-2017-7772 |
中危 |
1.3.6-1ubuntu0.14.04.1 |
1.3.10-0ubuntu0.14.04.1 |
graphite2: heap-buffer-overflow write "lz4::decompress" (CVE-2017-7772)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7772
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-04-12 18:29 修改: 2019-04-15 19:57
|
libgraphite2-3 |
CVE-2017-7773 |
中危 |
1.3.6-1ubuntu0.14.04.1 |
1.3.10-0ubuntu0.14.04.1 |
graphite2: heap-buffer-overflow write "lz4::decompress" (src/Decompressor)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7773
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-04-15 12:31 修改: 2019-04-15 17:23
|
libgraphite2-3 |
CVE-2017-7774 |
中危 |
1.3.6-1ubuntu0.14.04.1 |
1.3.10-0ubuntu0.14.04.1 |
graphite2: out of bounds read "graphite2::Silf::readGraphite"
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7774
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-04-15 12:31 修改: 2019-04-15 17:49
|
libgraphite2-3 |
CVE-2017-7776 |
中危 |
1.3.6-1ubuntu0.14.04.1 |
1.3.10-0ubuntu0.14.04.1 |
graphite2: heap-buffer-overflow read "graphite2::Silf::getClassGlyph"
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7776
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-04-15 12:31 修改: 2019-04-15 18:10
|
libgraphite2-3 |
CVE-2017-7777 |
中危 |
1.3.6-1ubuntu0.14.04.1 |
1.3.10-0ubuntu0.14.04.1 |
graphite2: use of uninitialized memory "graphite2::GlyphCache::Loader::read_glyph"
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7777
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-04-15 12:31 修改: 2019-04-15 17:45
|
libgraphite2-3 |
CVE-2017-7778 |
中危 |
1.3.6-1ubuntu0.14.04.1 |
1.3.10-0ubuntu0.14.04.1 |
Mozilla: Vulnerabilities in the Graphite 2 library (MFSA 2017-16)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7778
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-11 21:29 修改: 2018-08-13 17:14
|
libgssapi-krb5-2 |
CVE-2015-8629 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: xdr_nullstring() doesn't check for terminating null character
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8629
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:24
|
libgssapi-krb5-2 |
CVE-2015-8630 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8630
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-02-13 02:59 修改: 2020-01-21 15:47
|
libgssapi-krb5-2 |
CVE-2015-8631 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: Memory leak caused by supplying a null principal name in request
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8631
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:15
|
libgssapi-krb5-2 |
CVE-2016-3119 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libgssapi-krb5-2 |
CVE-2016-3120 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
libgssapi-krb5-2 |
CVE-2017-11368 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
libjasper1 |
CVE-2016-10249 |
中危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.4 |
jasper: integer overflow in jas_matrix_create()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10249
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-15 14:59 修改: 2018-01-05 02:30
|
libjasper1 |
CVE-2016-10250 |
中危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: Null pointer dereference in jp2_colr_destroy (incomplete fix for CVE-2016-8887)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10250
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-15 14:59 修改: 2018-06-29 01:29
|
libjasper1 |
CVE-2016-10251 |
中危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.4 |
jasper: integer overflow in jpc_pi_nextcprl(), leading to out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10251
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-15 14:59 修改: 2018-01-05 02:30
|
libjasper1 |
CVE-2016-8654 |
中危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.4 |
jasper: heap-based buffer overflow in QMFB code in JPC codec
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8654
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-01 16:29 修改: 2023-11-07 02:36
|
libjasper1 |
CVE-2016-8882 |
中危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.4 |
jasper: uninitialized tile->pi pointer use in JPC decoder
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8882
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-13 16:59 修改: 2017-11-04 01:29
|
libjasper1 |
CVE-2016-8884 |
中危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.4 |
jasper: missing jas_matrix_create() parameter checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8884
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-28 14:59 修改: 2023-11-07 02:36
|
libjasper1 |
CVE-2016-8885 |
中危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.4 |
jasper: missing jas_matrix_create() parameter checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8885
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 18:59 修改: 2023-11-07 02:36
|
libjasper1 |
CVE-2016-8887 |
中危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: uninitialized pointer use in jp2_box_get()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8887
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 18:59 修改: 2023-11-07 02:36
|
libjasper1 |
CVE-2016-9560 |
中危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.4 |
jasper: stack-based buffer overflow in jpc_dec_tileinit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9560
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-15 19:59 修改: 2021-03-15 22:08
|
libjasper1 |
CVE-2016-9591 |
中危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.4 |
jasper: use-after-free / double-free in JPC encoder
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9591
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-03-09 20:29 修改: 2019-10-09 23:20
|
libk5crypto3 |
CVE-2015-8629 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: xdr_nullstring() doesn't check for terminating null character
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8629
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:24
|
libk5crypto3 |
CVE-2015-8630 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8630
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-02-13 02:59 修改: 2020-01-21 15:47
|
libk5crypto3 |
CVE-2015-8631 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: Memory leak caused by supplying a null principal name in request
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8631
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:15
|
libk5crypto3 |
CVE-2016-3119 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libk5crypto3 |
CVE-2016-3120 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
libk5crypto3 |
CVE-2017-11368 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
libkrb5-3 |
CVE-2015-8629 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: xdr_nullstring() doesn't check for terminating null character
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8629
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:24
|
libkrb5-3 |
CVE-2015-8630 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8630
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-02-13 02:59 修改: 2020-01-21 15:47
|
libkrb5-3 |
CVE-2015-8631 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: Memory leak caused by supplying a null principal name in request
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8631
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:15
|
libkrb5-3 |
CVE-2016-3119 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libkrb5-3 |
CVE-2016-3120 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
libkrb5-3 |
CVE-2017-11368 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
libkrb5support0 |
CVE-2015-8629 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: xdr_nullstring() doesn't check for terminating null character
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8629
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:24
|
libkrb5support0 |
CVE-2015-8630 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8630
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-02-13 02:59 修改: 2020-01-21 15:47
|
libkrb5support0 |
CVE-2015-8631 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: Memory leak caused by supplying a null principal name in request
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8631
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:15
|
libkrb5support0 |
CVE-2016-3119 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libkrb5support0 |
CVE-2016-3120 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
libkrb5support0 |
CVE-2017-11368 |
中危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
libnss3 |
CVE-2016-5285 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.26.2-0ubuntu0.14.04.3 |
nss: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5285
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-11-15 16:15 修改: 2020-01-09 20:15
|
libnss3 |
CVE-2016-8635 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.26.2-0ubuntu0.14.04.3 |
nss: small-subgroups attack flaw
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8635
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-01 13:29 修改: 2023-02-12 23:26
|
libnss3 |
CVE-2016-9074 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.26.2-0ubuntu0.14.04.3 |
nss: Insufficient timing side-channel resistance in divSpoiler
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9074
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-11 21:29 修改: 2018-08-09 15:12
|
libnss3 |
CVE-2017-5461 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.1 |
nss: Write beyond bounds caused by bugs in Base64 de/encoding in nssb64d.c and nssb64e.c (MFSA 2017-10)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5461
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-05-11 01:29 修改: 2021-07-20 23:15
|
libnss3 |
CVE-2017-5462 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.1 |
nss: DRBG flaw in NSS
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5462
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-11 21:29 修改: 2024-10-21 13:55
|
libnss3 |
CVE-2017-7502 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.2 |
nss: Null pointer dereference when handling empty SSLv2 messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7502
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-05-30 18:29 修改: 2023-02-12 23:30
|
libnss3 |
CVE-2017-7805 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.3 |
nss: Potential use-after-free in TLS 1.2 server when verifying client authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7805
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-11 21:29 修改: 2024-10-21 13:11
|
libnss3 |
CVE-2018-12404 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.4 |
nss: Cache side-channel variant of the Bleichenbacher attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12404
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-05-02 17:29 修改: 2021-02-12 07:15
|
libnss3 |
CVE-2018-18508 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.5 |
nss: NULL pointer dereference in several CMS functions resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18508
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2020-10-22 21:15 修改: 2021-02-18 15:20
|
libnss3-nssdb |
CVE-2016-5285 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.26.2-0ubuntu0.14.04.3 |
nss: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5285
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-11-15 16:15 修改: 2020-01-09 20:15
|
libnss3-nssdb |
CVE-2016-8635 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.26.2-0ubuntu0.14.04.3 |
nss: small-subgroups attack flaw
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8635
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-01 13:29 修改: 2023-02-12 23:26
|
libnss3-nssdb |
CVE-2016-9074 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.26.2-0ubuntu0.14.04.3 |
nss: Insufficient timing side-channel resistance in divSpoiler
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9074
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-11 21:29 修改: 2018-08-09 15:12
|
libnss3-nssdb |
CVE-2017-5461 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.1 |
nss: Write beyond bounds caused by bugs in Base64 de/encoding in nssb64d.c and nssb64e.c (MFSA 2017-10)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5461
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-05-11 01:29 修改: 2021-07-20 23:15
|
libnss3-nssdb |
CVE-2017-5462 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.1 |
nss: DRBG flaw in NSS
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5462
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-11 21:29 修改: 2024-10-21 13:55
|
libnss3-nssdb |
CVE-2017-7502 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.2 |
nss: Null pointer dereference when handling empty SSLv2 messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7502
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-05-30 18:29 修改: 2023-02-12 23:30
|
libnss3-nssdb |
CVE-2017-7805 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.3 |
nss: Potential use-after-free in TLS 1.2 server when verifying client authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7805
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-11 21:29 修改: 2024-10-21 13:11
|
libnss3-nssdb |
CVE-2018-12404 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.4 |
nss: Cache side-channel variant of the Bleichenbacher attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12404
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-05-02 17:29 修改: 2021-02-12 07:15
|
libnss3-nssdb |
CVE-2018-18508 |
中危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.5 |
nss: NULL pointer dereference in several CMS functions resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18508
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2020-10-22 21:15 修改: 2021-02-18 15:20
|
libpcsclite1 |
CVE-2016-10109 |
中危 |
1.8.10-1ubuntu1 |
1.8.10-1ubuntu1.1 |
pcsc-lite: Use-after-free of cardsList due to SCardReleaseContext invocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10109
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-23 20:59 修改: 2023-11-07 02:29
|
libpixman-1-0 |
CVE-2015-5297 |
中危 |
0.30.2-2ubuntu1.1 |
0.30.2-2ubuntu1.2 |
pixman: general_composite_rect() integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5297
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-07-31 23:15 修改: 2019-10-09 23:14
|
libprocps3 |
CVE-2018-1122 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: Local privilege escalation in top
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1122
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-05-23 14:29 修改: 2019-10-03 00:03
|
libprocps3 |
CVE-2018-1123 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: denial of service in ps via mmap buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1123
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-05-23 14:29 修改: 2023-11-07 02:55
|
libprocps3 |
CVE-2018-1124 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: Integer overflows leading to heap overflow in file2strvec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1124
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-05-23 13:29 修改: 2020-09-09 14:58
|
libprocps3 |
CVE-2018-1125 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: stack buffer overflow in pgrep
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1125
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-05-23 14:29 修改: 2020-09-09 14:59
|
libprocps3 |
CVE-2018-1126 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1126
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-05-23 13:29 修改: 2019-07-30 13:15
|
libpython3.4-minimal |
CVE-2016-0772 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
python: smtplib StartTLS stripping attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-0772
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-09-02 14:59 修改: 2019-02-09 11:29
|
libpython3.4-minimal |
CVE-2016-1000110 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
CGIHandler: sets environmental variable based on user supplied Proxy request header
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000110
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-11-27 17:15 修改: 2023-11-07 02:29
|
libpython3.4-minimal |
CVE-2016-5636 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
python: Heap overflow in zipimporter module
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5636
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-09-02 14:59 修改: 2019-02-09 11:29
|
libpython3.4-minimal |
CVE-2016-5699 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
python: http protocol steam injection attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5699
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-09-02 14:59 修改: 2023-02-12 23:24
|
libpython3.4-minimal |
CVE-2017-1000158 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.6 |
python: Integer overflow in PyString_DecodeEscape results in heap-base buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000158
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-11-17 05:29 修改: 2023-02-16 14:15
|
libpython3.4-minimal |
CVE-2018-1000802 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: Command injection in the shutil module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000802
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-09-18 17:29 修改: 2023-11-07 02:51
|
libpython3.4-minimal |
CVE-2018-14647 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: Missing salt initialization in _elementtree.c module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14647
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-09-25 00:29 修改: 2023-11-07 02:53
|
libpython3.4-stdlib |
CVE-2016-0772 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
python: smtplib StartTLS stripping attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-0772
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-09-02 14:59 修改: 2019-02-09 11:29
|
libpython3.4-stdlib |
CVE-2016-1000110 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
CGIHandler: sets environmental variable based on user supplied Proxy request header
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000110
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-11-27 17:15 修改: 2023-11-07 02:29
|
libpython3.4-stdlib |
CVE-2016-5636 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
python: Heap overflow in zipimporter module
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5636
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-09-02 14:59 修改: 2019-02-09 11:29
|
libpython3.4-stdlib |
CVE-2016-5699 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
python: http protocol steam injection attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5699
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-09-02 14:59 修改: 2023-02-12 23:24
|
libpython3.4-stdlib |
CVE-2017-1000158 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.6 |
python: Integer overflow in PyString_DecodeEscape results in heap-base buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000158
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-11-17 05:29 修改: 2023-02-16 14:15
|
libpython3.4-stdlib |
CVE-2018-1000802 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: Command injection in the shutil module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000802
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-09-18 17:29 修改: 2023-11-07 02:51
|
libpython3.4-stdlib |
CVE-2018-14647 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: Missing salt initialization in _elementtree.c module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14647
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-09-25 00:29 修改: 2023-11-07 02:53
|
gnupg |
CVE-2017-7526 |
中危 |
1.4.16-1ubuntu2.4 |
1.4.16-1ubuntu2.6 |
libgcrypt: Use of left-to-right sliding window method allows full RSA key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7526
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-07-26 13:29 修改: 2023-11-07 02:50
|
gnupg |
CVE-2018-12020 |
中危 |
1.4.16-1ubuntu2.4 |
1.4.16-1ubuntu2.5 |
gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12020
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-08 21:29 修改: 2022-04-18 17:30
|
libservlet3.0-java |
CVE-2016-5018 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: security manager bypass via IntrospectHelper utility function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5018
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 16:29 修改: 2023-12-08 16:41
|
libservlet3.0-java |
CVE-2016-6816 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6816
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-20 18:59 修改: 2023-12-08 16:41
|
libservlet3.0-java |
CVE-2016-8745 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: information disclosure due to incorrect Processor sharing
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8745
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 22:29 修改: 2023-12-08 16:41
|
libservlet3.0-java |
CVE-2016-9774 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
The postinst script in the tomcat6 package before 6.0.45+dfsg-1~deb7u4 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9774
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 16:59 修改: 2018-08-02 01:29
|
libservlet3.0-java |
CVE-2016-9775 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
The postrm script in the tomcat6 package before 6.0.45+dfsg-1~deb7u3 o ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9775
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 16:59 修改: 2021-06-14 18:15
|
libservlet3.0-java |
CVE-2017-12616 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Information Disclosure when using VirtualDirContext
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12616
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-19 13:29 修改: 2023-11-07 02:38
|
libservlet3.0-java |
CVE-2017-5647 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Incorrect handling of pipelined requests when send file was used
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5647
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-17 16:59 修改: 2023-12-08 16:41
|
libservlet3.0-java |
CVE-2017-5648 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Calls to application listeners did not use the appropriate facade object
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5648
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-17 16:59 修改: 2023-12-08 16:41
|
libservlet3.0-java |
CVE-2017-5664 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Security constrained bypass in error page mechanism
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5664
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-06-06 14:29 修改: 2023-12-08 16:41
|
libservlet3.0-java |
CVE-2017-6056 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.10 |
tomcat: Infinite loop in the processing of https requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6056
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-17 07:59 修改: 2023-11-07 02:49
|
libservlet3.0-java |
CVE-2017-7674 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Vary header not added by CORS filter leading to cache poisoning
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7674
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-11 02:29 修改: 2023-12-08 16:41
|
libservlet3.0-java |
CVE-2018-11784 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.16 |
tomcat: Open redirect in default servlet
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11784
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-04 13:29 修改: 2023-12-08 16:41
|
libservlet3.0-java |
CVE-2018-1304 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1304
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-02-28 20:29 修改: 2023-12-08 16:41
|
libservlet3.0-java |
CVE-2018-1305 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Late application of security constraints can lead to resource exposure for unauthorised users
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1305
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-02-23 23:29 修改: 2023-12-08 16:41
|
libservlet3.0-java |
CVE-2018-1336 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.15 |
tomcat: A bug in the UTF-8 decoder can lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1336
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-02 14:29 修改: 2023-12-08 16:41
|
libsndfile1 |
CVE-2017-7741 |
中危 |
1.0.25-7ubuntu2.1 |
1.0.25-7ubuntu2.2 |
libsndfile: Invalid memory write in flac_buffer_copy function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7741
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-12 18:59 修改: 2017-07-11 01:33
|
libssl1.0.0 |
CVE-2016-7056 |
中危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.22 |
openssl: ECDSA P-256 timing attack key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7056
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-09-10 16:29 修改: 2023-02-12 23:25
|
libssl1.0.0 |
CVE-2017-3731 |
中危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.22 |
openssl: Truncated packet could crash via OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3731
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-05-04 19:29 修改: 2022-08-16 13:16
|
libssl1.0.0 |
CVE-2018-0739 |
中危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.24 |
openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0739
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-03-27 21:29 修改: 2023-11-07 02:51
|
libtasn1-6 |
CVE-2017-6891 |
中危 |
3.4-3ubuntu0.4 |
3.4-3ubuntu0.5 |
libtasn1: Stack-based buffer overflow in asn1_find_node()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6891
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-05-22 19:29 修改: 2023-11-07 02:49
|
libtiff5 |
CVE-2015-7554 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Invalid-write in _TIFFVGetField() when parsing some extension tags
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7554
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-01-08 19:59 修改: 2018-10-30 16:27
|
libtiff5 |
CVE-2016-10092 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Heap-based buffer overflow in _TIFFFax3fillruns
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10092
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-01 15:59 修改: 2021-03-05 17:15
|
libtiff5 |
CVE-2016-10093 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Integer overflow in DECLAREreadFunc
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10093
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-01 15:59 修改: 2021-03-05 19:15
|
libtiff5 |
CVE-2016-10094 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Off-by-one error in t2p_readwrite_pdf_image_tile() causing heap buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10094
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-01 15:59 修改: 2017-11-04 01:29
|
libtiff5 |
CVE-2016-10271 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Heap-based buffer overflow in tif_fax3.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10271
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-24 19:59 修改: 2017-03-31 01:59
|
libtiff5 |
CVE-2016-3186 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.9 |
libtiff: buffer overflow in gif2tiff
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3186
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-04-19 14:59 修改: 2018-10-30 16:27
|
libtiff5 |
CVE-2016-3624 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: out of bounds write in the rgb2ycybr tool
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3624
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-03 16:09 修改: 2017-11-04 01:29
|
libtiff5 |
CVE-2016-3632 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: out-of-bounds write in _TIFFVGetField function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3632
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-09-21 18:59 修改: 2018-10-30 16:27
|
libtiff5 |
CVE-2016-3945 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: out-of-bounds write in the tiff2rgba tool
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3945
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-09-21 18:59 修改: 2018-10-30 16:27
|
libtiff5 |
CVE-2016-3990 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: out-of-bounds write in horizontalDifference8()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3990
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-09-21 18:59 修改: 2018-10-30 16:27
|
libtiff5 |
CVE-2016-5314 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Out-of-bounds write in PixarLogDecode() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5314
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-03-12 02:29 修改: 2018-04-05 16:56
|
libtiff5 |
CVE-2016-5315 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Out-of-bounds read in setByteArray() function in tif_dir.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5315
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-07 15:59 修改: 2017-03-08 16:52
|
libtiff5 |
CVE-2016-5316 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Out-of-bounds read in PixarLogCleanup() function in tif_pixarlog.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5316
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-20 15:59 修改: 2018-10-30 16:27
|
libtiff5 |
CVE-2016-5317 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Out-of-bounds write in PixarLogDecode() function in libtiff.so
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5317
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-20 15:59 修改: 2018-10-30 16:27
|
libtiff5 |
CVE-2016-5321 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: tiffcrop readSeparateTilesIntoBuffer() memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5321
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-20 15:59 修改: 2018-10-30 16:27
|
libtiff5 |
CVE-2016-5322 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Out-of-bounds read in extractContigSamplesBytes() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5322
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-11 18:59 修改: 2017-04-17 13:08
|
libtiff5 |
CVE-2016-8331 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: FAX IFD Entry Parsing Type Confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8331
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-28 20:59 修改: 2022-04-19 20:15
|
libtiff5 |
CVE-2016-9453 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Out-of-bounds access in t2p_readwrite_pdf_image_tile()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9453
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 17:59 修改: 2019-12-31 18:57
|
libtiff5 |
CVE-2016-9533 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: PixarLog horizontalDifference heap-buffer-overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9533
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-11-22 19:59 修改: 2018-01-05 02:31
|
libtiff5 |
CVE-2016-9534 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: TIFFFlushData1 heap-buffer-overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9534
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-11-22 19:59 修改: 2018-01-05 02:31
|
libtiff5 |
CVE-2016-9535 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Predictor heap-buffer-overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9535
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-11-22 19:59 修改: 2018-01-05 02:31
|
libtiff5 |
CVE-2017-5225 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5225
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-12 11:59 修改: 2017-11-04 01:29
|
libtiff5 |
CVE-2017-7592 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Left shift of unsigned char without a cast
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7592
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7593 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: tif_rawdata not properly initialized in tif_read.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7593
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7594 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Memory leak in OJPEGReadHeaderInfoSecTablesDcTable function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7594
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-09 14:59 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-7595 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Divide-by-zero in JPEGSetupEncode (tiff_jpeg.c)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7595
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7596 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Float out of range issue in tif_dir.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7596
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7597 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Float out of range issue in tif_dirread.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7597
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7598 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Divide-by-zero in tif_dirread.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7598
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7599 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Unsigned short out of range in tif_dirwrite.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7599
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7600 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Unsigned char out of range in tif_dirwrite.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7600
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7601 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Signed integer overflow in tif_jpeg.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7601
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7602 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Signed integer overflow in tif_read.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7602
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-9935 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.9 |
libtiff: Heap-based buffer overflow in t2p_write_pdf function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9935
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-06-26 12:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-9936 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: memory leak in tif_jbig.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9936
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-06-26 12:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2018-16335 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.9 |
libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16335
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-09-02 03:29 修改: 2020-08-24 17:37
|
libtiff5 |
CVE-2018-17100 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.10 |
libtiff: Integer overflow in multiply_ms in tools/ppm2tiff.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17100
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-09-16 21:29 修改: 2019-03-21 16:00
|
libtiff5 |
CVE-2018-17101 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.10 |
libtiff: Two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17101
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-09-16 21:29 修改: 2019-03-21 16:00
|
libtiff5 |
CVE-2018-17795 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.9 |
libtiff: Heap-based buffer overflow in tiff2pdf.c:t2p_write_pdf()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17795
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-09-30 20:29 修改: 2020-10-16 20:15
|
libtiff5 |
CVE-2018-18557 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.10 |
libtiff: Out-of-bounds write in tif_jbig.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18557
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-22 16:29 修改: 2021-03-05 18:15
|
libtiff5 |
CVE-2019-7663 |
中危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.11 |
libtiff: integer overflow in libtiff/tif_dirwrite.c resulting in an invalid pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7663
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-02-09 16:29 修改: 2020-08-24 17:37
|
gpgv |
CVE-2017-7526 |
中危 |
1.4.16-1ubuntu2.4 |
1.4.16-1ubuntu2.6 |
libgcrypt: Use of left-to-right sliding window method allows full RSA key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7526
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-07-26 13:29 修改: 2023-11-07 02:50
|
gpgv |
CVE-2018-12020 |
中危 |
1.4.16-1ubuntu2.4 |
1.4.16-1ubuntu2.5 |
gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12020
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-08 21:29 修改: 2022-04-18 17:30
|
libtomcat7-java |
CVE-2016-5018 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: security manager bypass via IntrospectHelper utility function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5018
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 16:29 修改: 2023-12-08 16:41
|
libtomcat7-java |
CVE-2016-6816 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6816
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-20 18:59 修改: 2023-12-08 16:41
|
libtomcat7-java |
CVE-2016-8745 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: information disclosure due to incorrect Processor sharing
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8745
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 22:29 修改: 2023-12-08 16:41
|
libtomcat7-java |
CVE-2016-9774 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
The postinst script in the tomcat6 package before 6.0.45+dfsg-1~deb7u4 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9774
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 16:59 修改: 2018-08-02 01:29
|
libtomcat7-java |
CVE-2016-9775 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
The postrm script in the tomcat6 package before 6.0.45+dfsg-1~deb7u3 o ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9775
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 16:59 修改: 2021-06-14 18:15
|
libtomcat7-java |
CVE-2017-12616 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Information Disclosure when using VirtualDirContext
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12616
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-19 13:29 修改: 2023-11-07 02:38
|
libtomcat7-java |
CVE-2017-5647 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Incorrect handling of pipelined requests when send file was used
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5647
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-17 16:59 修改: 2023-12-08 16:41
|
libtomcat7-java |
CVE-2017-5648 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Calls to application listeners did not use the appropriate facade object
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5648
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-17 16:59 修改: 2023-12-08 16:41
|
libtomcat7-java |
CVE-2017-5664 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Security constrained bypass in error page mechanism
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5664
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-06-06 14:29 修改: 2023-12-08 16:41
|
libtomcat7-java |
CVE-2017-6056 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.10 |
tomcat: Infinite loop in the processing of https requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6056
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-17 07:59 修改: 2023-11-07 02:49
|
libtomcat7-java |
CVE-2017-7674 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Vary header not added by CORS filter leading to cache poisoning
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7674
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-11 02:29 修改: 2023-12-08 16:41
|
libtomcat7-java |
CVE-2018-11784 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.16 |
tomcat: Open redirect in default servlet
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11784
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-04 13:29 修改: 2023-12-08 16:41
|
libtomcat7-java |
CVE-2018-1304 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1304
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-02-28 20:29 修改: 2023-12-08 16:41
|
libtomcat7-java |
CVE-2018-1305 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Late application of security constraints can lead to resource exposure for unauthorised users
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1305
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-02-23 23:29 修改: 2023-12-08 16:41
|
libtomcat7-java |
CVE-2018-1336 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.15 |
tomcat: A bug in the UTF-8 decoder can lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1336
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-02 14:29 修改: 2023-12-08 16:41
|
libudev1 |
CVE-2018-1049 |
中危 |
204-5ubuntu20.19 |
204-5ubuntu20.26 |
systemd: automount: access to automounted volumes can lock up
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1049
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-02-16 21:29 修改: 2022-01-31 18:26
|
libudev1 |
CVE-2019-3842 |
中危 |
204-5ubuntu20.19 |
204-5ubuntu20.31 |
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3842
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-04-09 21:29 修改: 2023-11-07 03:10
|
libvorbis0a |
CVE-2017-14632 |
中危 |
1.3.2-1.3ubuntu1 |
1.3.2-1.3ubuntu1.1 |
libvorbis: Invalid freeing of uninitialized memory in the function vorbis_analysis_headerout()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14632
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-21 07:29 修改: 2020-12-07 20:26
|
libvorbis0a |
CVE-2017-14633 |
中危 |
1.3.2-1.3ubuntu1 |
1.3.2-1.3ubuntu1.1 |
libvorbis: Out-of-bounds array read in the function mapping0_forward()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14633
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-21 07:29 修改: 2020-12-07 20:31
|
libvorbis0a |
CVE-2018-5146 |
中危 |
1.3.2-1.3ubuntu1 |
1.3.2-1.3ubuntu1.2 |
Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5146
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-11 21:29 修改: 2019-03-11 19:33
|
libvorbisenc2 |
CVE-2017-14632 |
中危 |
1.3.2-1.3ubuntu1 |
1.3.2-1.3ubuntu1.1 |
libvorbis: Invalid freeing of uninitialized memory in the function vorbis_analysis_headerout()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14632
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-21 07:29 修改: 2020-12-07 20:26
|
libvorbisenc2 |
CVE-2017-14633 |
中危 |
1.3.2-1.3ubuntu1 |
1.3.2-1.3ubuntu1.1 |
libvorbis: Out-of-bounds array read in the function mapping0_forward()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14633
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-21 07:29 修改: 2020-12-07 20:31
|
libvorbisenc2 |
CVE-2018-5146 |
中危 |
1.3.2-1.3ubuntu1 |
1.3.2-1.3ubuntu1.2 |
Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5146
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-11 21:29 修改: 2019-03-11 19:33
|
libx11-6 |
CVE-2018-14598 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Crash on invalid reply in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14598
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-6 |
CVE-2018-14599 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Off-by-one error in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14599
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-6 |
CVE-2018-14600 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Out of Bounds write in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14600
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-24 19:29 修改: 2019-08-06 17:15
|
libx11-data |
CVE-2018-14598 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Crash on invalid reply in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14598
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-data |
CVE-2018-14599 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Off-by-one error in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14599
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-data |
CVE-2018-14600 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Out of Bounds write in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14600
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-24 19:29 修改: 2019-08-06 17:15
|
libx11-xcb1 |
CVE-2018-14598 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Crash on invalid reply in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14598
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-xcb1 |
CVE-2018-14599 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Off-by-one error in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14599
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-xcb1 |
CVE-2018-14600 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Out of Bounds write in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14600
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-24 19:29 修改: 2019-08-06 17:15
|
libxcursor1 |
CVE-2015-9262 |
中危 |
1:1.1.14-1 |
1:1.1.14-1ubuntu0.14.04.2 |
libxcursor: 1-byte heap-based overflow in _XcursorThemeInherits function in library.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-9262
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-01 23:29 修改: 2019-04-16 19:08
|
libxcursor1 |
CVE-2017-16612 |
中危 |
1:1.1.14-1 |
1:1.1.14-1ubuntu0.14.04.1 |
libXcursor: file.c: heap-based buffer overflow when reading/creating images
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16612
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-12-01 17:29 修改: 2018-04-11 01:29
|
libxml2 |
CVE-2016-4658 |
中危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.9 |
libxml2: Use after free via namespace node in XPointer ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4658
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-09-25 10:59 修改: 2019-03-13 14:05
|
libxml2 |
CVE-2016-5131 |
中危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.9 |
libxml2: Use after free triggered by XPointer paths beginning with range-to
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5131
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-07-23 19:59 修改: 2023-11-07 02:32
|
libxml2 |
CVE-2017-0663 |
中危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.10 |
libxml2: Heap buffer overflow in xmlAddID
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-0663
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-06-14 13:29 修改: 2023-11-07 02:37
|
libxml2 |
CVE-2017-15412 |
中危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.12 |
libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15412
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-28 19:29 修改: 2023-11-07 02:39
|
libxml2 |
CVE-2017-7375 |
中危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.10 |
libxml2: Missing validation for external entities in xmlParsePEReference
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7375
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-02-19 19:29 修改: 2018-03-18 14:17
|
libxml2 |
CVE-2017-7376 |
中危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.10 |
libxml2: Incorrect limit used for port values
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7376
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-02-19 19:29 修改: 2019-05-17 15:15
|
libxml2 |
CVE-2017-9047 |
中危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.10 |
libxml2: Buffer overflow in function xmlSnprintfElementContent
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9047
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-05-18 06:29 修改: 2023-11-07 02:50
|
libxml2 |
CVE-2017-9048 |
中危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.10 |
libxml2: Stack-based buffer overflow in function xmlSnprintfElementContent
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9048
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-05-18 06:29 修改: 2023-11-07 02:50
|
libxml2 |
CVE-2017-9049 |
中危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.10 |
libxml2: Heap-based buffer over-read in function xmlDictComputeFastKey
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9049
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-05-18 06:29 修改: 2023-11-07 02:50
|
libxml2 |
CVE-2017-9050 |
中危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.10 |
libxml2: Heap-based buffer over-read in function xmlDictAddString
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9050
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-05-18 06:29 修改: 2023-11-07 02:50
|
libxml2 |
CVE-2018-14404 |
中危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.13 |
libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14404
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-07-19 13:29 修改: 2020-09-10 01:15
|
libxml2 |
CVE-2018-14567 |
中危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.13 |
libxml2: Infinite loop caused by incorrect error detection during LZMA decompression
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14567
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-16 20:29 修改: 2020-09-10 01:15
|
login |
CVE-2016-6252 |
中危 |
1:4.1.5.1-1ubuntu9.2 |
1:4.1.5.1-1ubuntu9.4 |
shadow-utils: Incorrect integer handling results in LPE
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6252
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-02-17 17:59 修改: 2017-11-04 01:29
|
login |
CVE-2017-2616 |
中危 |
1:4.1.5.1-1ubuntu9.2 |
1:4.1.5.1-1ubuntu9.4 |
util-linux: Sending SIGKILL to other processes with root privileges via su
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2616
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-07-27 19:29 修改: 2019-10-09 23:26
|
isc-dhcp-client |
CVE-2018-5732 |
中危 |
4.2.4-7ubuntu12.6 |
4.2.4-7ubuntu12.12 |
dhcp: Buffer overflow in dhclient possibly allowing code execution triggered by malicious server
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5732
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-10-09 16:15 修改: 2020-01-09 21:14
|
multiarch-support |
CVE-2015-8982 |
中危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: multiple overflows in strxfrm()
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8982
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-15 19:59 修改: 2023-11-07 02:28
|
multiarch-support |
CVE-2015-8983 |
中危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: _IO_wstr_overflow integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8983
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-20 16:59 修改: 2023-11-07 02:28
|
multiarch-support |
CVE-2015-8984 |
中危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: potential denial of service in internal_fnmatch()
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8984
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-20 16:59 修改: 2023-11-07 02:28
|
multiarch-support |
CVE-2017-1000366 |
中危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.13 |
glibc: heap/stack gap jumping via unbounded stack allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000366
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-06-19 16:29 修改: 2020-10-15 13:28
|
ntpdate |
CVE-2015-7977 |
中危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: restriction list NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7977
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-30 21:59 修改: 2022-02-01 18:13
|
ntpdate |
CVE-2015-7978 |
中危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: stack exhaustion in recursive traversal of restriction list
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7978
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-30 21:59 修改: 2018-05-18 01:29
|
ntpdate |
CVE-2015-8138 |
中危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: missing check for zero originate timestamp
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8138
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-30 21:59 修改: 2021-11-17 22:15
|
ntpdate |
CVE-2016-1547 |
中危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: crypto-NAK preemptable association denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1547
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-06 21:59 修改: 2021-11-17 22:15
|
ntpdate |
CVE-2016-1548 |
中危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: ntpd switching to interleaved mode with spoofed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1548
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-06 21:59 修改: 2021-11-17 22:15
|
ntpdate |
CVE-2016-1550 |
中危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: libntp message digest disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1550
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-06 21:59 修改: 2021-11-17 22:15
|
ntpdate |
CVE-2016-2516 |
中危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: assertion failure in ntpd on duplicate IPs on unconfig directives
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2516
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-30 21:59 修改: 2017-11-21 02:29
|
ntpdate |
CVE-2018-7183 |
中危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.13 |
ntp: decodearr() can write beyond its buffer limit
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7183
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-03-08 20:29 修改: 2021-07-20 23:15
|
openjdk-7-jdk |
CVE-2016-5542 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5542
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:30 修改: 2022-05-13 14:57
|
openjdk-7-jdk |
CVE-2016-5546 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5546
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jdk |
CVE-2016-5547 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: missing ObjectIdentifier length check (Libraries, 8168705)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5547
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jdk |
CVE-2016-5548 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: DSA implementation timing attack (Libraries, 8168728)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5548
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jdk |
CVE-2016-5552 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5552
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jdk |
CVE-2016-5554 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5554
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:30 修改: 2022-05-13 14:57
|
openjdk-7-jdk |
CVE-2016-5573 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5573
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:30 修改: 2022-05-13 14:57
|
openjdk-7-jdk |
CVE-2016-5582 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: incomplete type checks of System.arraycopy arguments (Hotspot, 8160591)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5582
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:30 修改: 2023-11-07 02:33
|
openjdk-7-jdk |
CVE-2016-5597 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5597
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:31 修改: 2022-05-13 14:57
|
openjdk-7-jdk |
CVE-2017-10067 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: JAR verifier incorrect handling of missing digest (Security, 8169392)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10067
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-06-27 17:36
|
openjdk-7-jdk |
CVE-2017-10074 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: integer overflows in range check loop predicates (Hotspot, 8173770)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10074
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-06-27 17:36
|
openjdk-7-jdk |
CVE-2017-10087 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in ThreadPoolExecutor (Libraries, 8172204)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10087
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:03
|
openjdk-7-jdk |
CVE-2017-10089 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in ServiceRegistry (ImageIO, 8172461)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10089
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-08-12 18:05
|
openjdk-7-jdk |
CVE-2017-10090 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in AsynchronousChannelGroupImpl (8172465, Libraries)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10090
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:03
|
openjdk-7-jdk |
CVE-2017-10096 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in XML transformations (JAXP, 8172469)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10096
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:03
|
openjdk-7-jdk |
CVE-2017-10101 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: unrestricted access to com.sun.org.apache.xml.internal.resolver (JAXP, 8173286)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10101
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
openjdk-7-jdk |
CVE-2017-10102 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect handling of references in DGC (RMI, 8163958)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10102
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
openjdk-7-jdk |
CVE-2017-10107 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in ActivationID (RMI, 8173697)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10107
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
openjdk-7-jdk |
CVE-2017-10110 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in ImageWatched (AWT, 8174098)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10110
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-08-12 18:05
|
openjdk-7-jdk |
CVE-2017-10115 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: DSA implementation timing attack (JCE, 8175106)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10115
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:01
|
openjdk-7-jdk |
CVE-2017-10116 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: LDAPCertStore following referrals to non-LDAP URLs (Security, 8176067)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10116
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:01
|
openjdk-7-jdk |
CVE-2017-10118 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: ECDSA implementation timing attack (JCE, 8175110)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10118
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jdk |
CVE-2017-10135 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: PKCS#8 implementation timing attack (JCE, 8176760)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10135
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jdk |
CVE-2017-10176 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect handling of certain EC points (Security, 8178135)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10176
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jdk |
CVE-2017-10193 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect key size constraint check (Security, 8179101)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10193
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jdk |
CVE-2017-10198 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect enforcement of certificate path restrictions (Security, 8179998)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10198
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jdk |
CVE-2017-10274 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: CardImpl incorrect state handling (Smart Card IO, 8169026)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10274
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-19 19:45
|
openjdk-7-jdk |
CVE-2017-10281 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: multiple unbounded memory allocations in deserialization (Serialization, 8174109)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10281
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jdk |
CVE-2017-10285 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: incorrect privilege use when handling unreferenced objects (RMI, 8174966)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10285
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jdk |
CVE-2017-10295 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: HTTP client insufficient check for newline in URLs (Networking, 8176751)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10295
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jdk |
CVE-2017-10345 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded resource use in JceKeyStore deserialization (Serialization, 8181370)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10345
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-07-30 03:36
|
openjdk-7-jdk |
CVE-2017-10346 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: insufficient loader constraints checks for invokespecial (Hotspot, 8180711)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10346
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-07-30 03:36
|
openjdk-7-jdk |
CVE-2017-10347 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded memory allocation in SimpleTimeZone deserialization (Serialization, 8181323)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10347
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-07-30 03:36
|
openjdk-7-jdk |
CVE-2017-10348 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: multiple unbounded memory allocations in deserialization (Libraries, 8181432)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10348
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jdk |
CVE-2017-10349 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded memory allocation in PredicatedNodeTest deserialization (JAXP, 8181327)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10349
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jdk |
CVE-2017-10350 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded memory allocation in JAXWSExceptionBase deserialization (JAX-WS, 8181100)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10350
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:58
|
openjdk-7-jdk |
CVE-2017-10355 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: no default network operations timeouts in FtpClient (Networking, 8181612)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10355
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:58
|
openjdk-7-jdk |
CVE-2017-10356 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: weak protection of key stores against brute forcing (Security, 8181692)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10356
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:58
|
openjdk-7-jdk |
CVE-2017-10357 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded memory allocation in ObjectInputStream deserialization (Serialization, 8181597)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10357
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:57
|
openjdk-7-jdk |
CVE-2017-10388 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: use of unprotected sname in Kerberos client (Libraries, 8178794)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10388
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:57
|
openjdk-7-jdk |
CVE-2017-3241 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3241
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-12-10 19:29
|
openjdk-7-jdk |
CVE-2017-3252 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3252
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jdk |
CVE-2017-3253 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3253
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jdk |
CVE-2017-3272 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3272
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jdk |
CVE-2017-3289 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: insecure class construction (Hotspot, 8167104)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3289
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jdk |
CVE-2017-3509 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: improper re-use of NTLM authenticated connections (Networking, 8163520)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3509
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2019-10-03 00:03
|
openjdk-7-jdk |
CVE-2017-3511 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: untrusted extension directories search path in Launcher (JCE, 8163528)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3511
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2019-10-03 00:03
|
openjdk-7-jdk |
CVE-2017-3526 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: incomplete XML parse tree size enforcement (JAXP, 8169011)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3526
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2019-10-03 00:03
|
openjdk-7-jdk |
CVE-2018-2579 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2579
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:13
|
openjdk-7-jdk |
CVE-2018-2588 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2588
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:13
|
openjdk-7-jdk |
CVE-2018-2599 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: DnsClient missing source port randomization (JNDI, 8182125)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2599
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:09
|
openjdk-7-jdk |
CVE-2018-2602 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: loading of classes from untrusted locations (I18n, 8182601)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2602
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:09
|
openjdk-7-jdk |
CVE-2018-2618 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: insufficient strength of key agreement (JCE, 8185292)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2618
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:10
|
openjdk-7-jdk |
CVE-2018-2629 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: GSS context use-after-free (JGSS, 8186212)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2629
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:10
|
openjdk-7-jdk |
CVE-2018-2633 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2633
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:13
|
openjdk-7-jdk |
CVE-2018-2634 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2634
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:13
|
openjdk-7-jdk |
CVE-2018-2637 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2637
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:06
|
openjdk-7-jdk |
CVE-2018-2641 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: GTK library loading use-after-free (AWT, 8185325)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2641
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:27
|
openjdk-7-jdk |
CVE-2018-2663 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2663
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:06
|
openjdk-7-jdk |
CVE-2018-2677 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2677
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:05
|
openjdk-7-jdk |
CVE-2018-2678 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2678
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:04
|
openjdk-7-jdk |
CVE-2018-2783 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2783
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2022-10-06 18:56
|
openjdk-7-jdk |
CVE-2018-2794 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2794
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:30
|
openjdk-7-jdk |
CVE-2018-2795 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2795
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:36
|
openjdk-7-jdk |
CVE-2018-2796 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2796
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:40
|
openjdk-7-jdk |
CVE-2018-2797 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2797
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:35
|
openjdk-7-jdk |
CVE-2018-2798 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2798
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:40
|
openjdk-7-jdk |
CVE-2018-2799 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2799
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:35
|
openjdk-7-jdk |
CVE-2018-2800 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2800
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2022-05-13 14:57
|
openjdk-7-jdk |
CVE-2018-2814 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2814
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:35
|
openjdk-7-jdk |
CVE-2018-2815 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2815
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:41
|
openjdk-7-jdk |
CVE-2018-2952 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.2 |
OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2952
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-07-18 13:29 修改: 2022-10-06 18:55
|
openjdk-7-jdk |
CVE-2018-3136 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3136
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:34
|
openjdk-7-jdk |
CVE-2018-3139 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3139
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:34
|
openjdk-7-jdk |
CVE-2018-3149 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3149
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:33
|
openjdk-7-jdk |
CVE-2018-3169 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Improper field access checks (Hotspot, 8199226)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3169
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:33
|
openjdk-7-jdk |
CVE-2018-3180 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3180
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:33
|
openjdk-7-jre |
CVE-2016-5542 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5542
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:30 修改: 2022-05-13 14:57
|
openjdk-7-jre |
CVE-2016-5546 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5546
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre |
CVE-2016-5547 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: missing ObjectIdentifier length check (Libraries, 8168705)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5547
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre |
CVE-2016-5548 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: DSA implementation timing attack (Libraries, 8168728)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5548
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre |
CVE-2016-5552 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5552
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre |
CVE-2016-5554 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5554
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:30 修改: 2022-05-13 14:57
|
openjdk-7-jre |
CVE-2016-5573 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5573
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:30 修改: 2022-05-13 14:57
|
openjdk-7-jre |
CVE-2016-5582 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: incomplete type checks of System.arraycopy arguments (Hotspot, 8160591)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5582
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:30 修改: 2023-11-07 02:33
|
openjdk-7-jre |
CVE-2016-5597 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5597
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:31 修改: 2022-05-13 14:57
|
openjdk-7-jre |
CVE-2017-10067 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: JAR verifier incorrect handling of missing digest (Security, 8169392)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10067
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-06-27 17:36
|
openjdk-7-jre |
CVE-2017-10074 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: integer overflows in range check loop predicates (Hotspot, 8173770)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10074
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-06-27 17:36
|
openjdk-7-jre |
CVE-2017-10087 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in ThreadPoolExecutor (Libraries, 8172204)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10087
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:03
|
openjdk-7-jre |
CVE-2017-10089 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in ServiceRegistry (ImageIO, 8172461)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10089
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-08-12 18:05
|
openjdk-7-jre |
CVE-2017-10090 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in AsynchronousChannelGroupImpl (8172465, Libraries)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10090
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:03
|
openjdk-7-jre |
CVE-2017-10096 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in XML transformations (JAXP, 8172469)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10096
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:03
|
openjdk-7-jre |
CVE-2017-10101 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: unrestricted access to com.sun.org.apache.xml.internal.resolver (JAXP, 8173286)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10101
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
openjdk-7-jre |
CVE-2017-10102 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect handling of references in DGC (RMI, 8163958)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10102
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
openjdk-7-jre |
CVE-2017-10107 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in ActivationID (RMI, 8173697)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10107
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
openjdk-7-jre |
CVE-2017-10110 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in ImageWatched (AWT, 8174098)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10110
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-08-12 18:05
|
openjdk-7-jre |
CVE-2017-10115 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: DSA implementation timing attack (JCE, 8175106)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10115
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:01
|
openjdk-7-jre |
CVE-2017-10116 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: LDAPCertStore following referrals to non-LDAP URLs (Security, 8176067)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10116
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:01
|
openjdk-7-jre |
CVE-2017-10118 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: ECDSA implementation timing attack (JCE, 8175110)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10118
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jre |
CVE-2017-10135 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: PKCS#8 implementation timing attack (JCE, 8176760)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10135
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jre |
CVE-2017-10176 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect handling of certain EC points (Security, 8178135)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10176
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jre |
CVE-2017-10193 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect key size constraint check (Security, 8179101)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10193
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jre |
CVE-2017-10198 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect enforcement of certificate path restrictions (Security, 8179998)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10198
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jre |
CVE-2017-10274 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: CardImpl incorrect state handling (Smart Card IO, 8169026)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10274
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-19 19:45
|
openjdk-7-jre |
CVE-2017-10281 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: multiple unbounded memory allocations in deserialization (Serialization, 8174109)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10281
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jre |
CVE-2017-10285 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: incorrect privilege use when handling unreferenced objects (RMI, 8174966)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10285
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jre |
CVE-2017-10295 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: HTTP client insufficient check for newline in URLs (Networking, 8176751)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10295
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jre |
CVE-2017-10345 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded resource use in JceKeyStore deserialization (Serialization, 8181370)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10345
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-07-30 03:36
|
openjdk-7-jre |
CVE-2017-10346 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: insufficient loader constraints checks for invokespecial (Hotspot, 8180711)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10346
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-07-30 03:36
|
openjdk-7-jre |
CVE-2017-10347 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded memory allocation in SimpleTimeZone deserialization (Serialization, 8181323)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10347
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-07-30 03:36
|
openjdk-7-jre |
CVE-2017-10348 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: multiple unbounded memory allocations in deserialization (Libraries, 8181432)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10348
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jre |
CVE-2017-10349 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded memory allocation in PredicatedNodeTest deserialization (JAXP, 8181327)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10349
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jre |
CVE-2017-10350 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded memory allocation in JAXWSExceptionBase deserialization (JAX-WS, 8181100)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10350
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:58
|
openjdk-7-jre |
CVE-2017-10355 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: no default network operations timeouts in FtpClient (Networking, 8181612)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10355
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:58
|
openjdk-7-jre |
CVE-2017-10356 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: weak protection of key stores against brute forcing (Security, 8181692)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10356
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:58
|
openjdk-7-jre |
CVE-2017-10357 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded memory allocation in ObjectInputStream deserialization (Serialization, 8181597)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10357
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:57
|
openjdk-7-jre |
CVE-2017-10388 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: use of unprotected sname in Kerberos client (Libraries, 8178794)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10388
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:57
|
openjdk-7-jre |
CVE-2017-3241 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3241
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-12-10 19:29
|
openjdk-7-jre |
CVE-2017-3252 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3252
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre |
CVE-2017-3253 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3253
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre |
CVE-2017-3272 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3272
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre |
CVE-2017-3289 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: insecure class construction (Hotspot, 8167104)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3289
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre |
CVE-2017-3509 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: improper re-use of NTLM authenticated connections (Networking, 8163520)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3509
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2019-10-03 00:03
|
openjdk-7-jre |
CVE-2017-3511 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: untrusted extension directories search path in Launcher (JCE, 8163528)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3511
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2019-10-03 00:03
|
openjdk-7-jre |
CVE-2017-3526 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: incomplete XML parse tree size enforcement (JAXP, 8169011)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3526
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2019-10-03 00:03
|
openjdk-7-jre |
CVE-2018-2579 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2579
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:13
|
openjdk-7-jre |
CVE-2018-2588 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2588
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:13
|
openjdk-7-jre |
CVE-2018-2599 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: DnsClient missing source port randomization (JNDI, 8182125)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2599
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:09
|
openjdk-7-jre |
CVE-2018-2602 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: loading of classes from untrusted locations (I18n, 8182601)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2602
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:09
|
openjdk-7-jre |
CVE-2018-2618 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: insufficient strength of key agreement (JCE, 8185292)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2618
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:10
|
openjdk-7-jre |
CVE-2018-2629 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: GSS context use-after-free (JGSS, 8186212)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2629
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:10
|
openjdk-7-jre |
CVE-2018-2633 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2633
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:13
|
openjdk-7-jre |
CVE-2018-2634 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2634
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:13
|
openjdk-7-jre |
CVE-2018-2637 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2637
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:06
|
openjdk-7-jre |
CVE-2018-2641 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: GTK library loading use-after-free (AWT, 8185325)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2641
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:27
|
openjdk-7-jre |
CVE-2018-2663 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2663
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:06
|
openjdk-7-jre |
CVE-2018-2677 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2677
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:05
|
openjdk-7-jre |
CVE-2018-2678 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2678
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:04
|
openjdk-7-jre |
CVE-2018-2783 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2783
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2022-10-06 18:56
|
openjdk-7-jre |
CVE-2018-2794 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2794
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:30
|
openjdk-7-jre |
CVE-2018-2795 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2795
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:36
|
openjdk-7-jre |
CVE-2018-2796 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2796
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:40
|
openjdk-7-jre |
CVE-2018-2797 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2797
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:35
|
openjdk-7-jre |
CVE-2018-2798 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2798
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:40
|
openjdk-7-jre |
CVE-2018-2799 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2799
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:35
|
openjdk-7-jre |
CVE-2018-2800 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2800
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2022-05-13 14:57
|
openjdk-7-jre |
CVE-2018-2814 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2814
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:35
|
openjdk-7-jre |
CVE-2018-2815 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2815
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:41
|
openjdk-7-jre |
CVE-2018-2952 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.2 |
OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2952
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-07-18 13:29 修改: 2022-10-06 18:55
|
openjdk-7-jre |
CVE-2018-3136 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3136
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:34
|
openjdk-7-jre |
CVE-2018-3139 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3139
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:34
|
openjdk-7-jre |
CVE-2018-3149 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3149
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:33
|
openjdk-7-jre |
CVE-2018-3169 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Improper field access checks (Hotspot, 8199226)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3169
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:33
|
openjdk-7-jre |
CVE-2018-3180 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3180
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:33
|
openjdk-7-jre-headless |
CVE-2016-5542 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5542
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:30 修改: 2022-05-13 14:57
|
openjdk-7-jre-headless |
CVE-2016-5546 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: incorrect ECDSA signature extraction from the DER input (Libraries, 8168714)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5546
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre-headless |
CVE-2016-5547 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: missing ObjectIdentifier length check (Libraries, 8168705)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5547
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre-headless |
CVE-2016-5548 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: DSA implementation timing attack (Libraries, 8168728)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5548
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre-headless |
CVE-2016-5552 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: incorrect URL parsing in URLStreamHandler (Networking, 8167223)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5552
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre-headless |
CVE-2016-5554 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5554
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:30 修改: 2022-05-13 14:57
|
openjdk-7-jre-headless |
CVE-2016-5573 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5573
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:30 修改: 2022-05-13 14:57
|
openjdk-7-jre-headless |
CVE-2016-5582 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: incomplete type checks of System.arraycopy arguments (Hotspot, 8160591)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5582
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:30 修改: 2023-11-07 02:33
|
openjdk-7-jre-headless |
CVE-2016-5597 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5597
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-25 14:31 修改: 2022-05-13 14:57
|
openjdk-7-jre-headless |
CVE-2017-10067 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: JAR verifier incorrect handling of missing digest (Security, 8169392)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10067
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-06-27 17:36
|
openjdk-7-jre-headless |
CVE-2017-10074 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: integer overflows in range check loop predicates (Hotspot, 8173770)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10074
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-06-27 17:36
|
openjdk-7-jre-headless |
CVE-2017-10087 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in ThreadPoolExecutor (Libraries, 8172204)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10087
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:03
|
openjdk-7-jre-headless |
CVE-2017-10089 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in ServiceRegistry (ImageIO, 8172461)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10089
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-08-12 18:05
|
openjdk-7-jre-headless |
CVE-2017-10090 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in AsynchronousChannelGroupImpl (8172465, Libraries)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10090
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:03
|
openjdk-7-jre-headless |
CVE-2017-10096 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in XML transformations (JAXP, 8172469)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10096
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:03
|
openjdk-7-jre-headless |
CVE-2017-10101 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: unrestricted access to com.sun.org.apache.xml.internal.resolver (JAXP, 8173286)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10101
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
openjdk-7-jre-headless |
CVE-2017-10102 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect handling of references in DGC (RMI, 8163958)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10102
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
openjdk-7-jre-headless |
CVE-2017-10107 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in ActivationID (RMI, 8173697)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10107
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
openjdk-7-jre-headless |
CVE-2017-10110 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insufficient access control checks in ImageWatched (AWT, 8174098)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10110
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-08-12 18:05
|
openjdk-7-jre-headless |
CVE-2017-10115 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: DSA implementation timing attack (JCE, 8175106)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10115
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:01
|
openjdk-7-jre-headless |
CVE-2017-10116 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: LDAPCertStore following referrals to non-LDAP URLs (Security, 8176067)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10116
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:01
|
openjdk-7-jre-headless |
CVE-2017-10118 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: ECDSA implementation timing attack (JCE, 8175110)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10118
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jre-headless |
CVE-2017-10135 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: PKCS#8 implementation timing attack (JCE, 8176760)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10135
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jre-headless |
CVE-2017-10176 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect handling of certain EC points (Security, 8178135)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10176
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jre-headless |
CVE-2017-10193 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect key size constraint check (Security, 8179101)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10193
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jre-headless |
CVE-2017-10198 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect enforcement of certificate path restrictions (Security, 8179998)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10198
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:00
|
openjdk-7-jre-headless |
CVE-2017-10274 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: CardImpl incorrect state handling (Smart Card IO, 8169026)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10274
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-19 19:45
|
openjdk-7-jre-headless |
CVE-2017-10281 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: multiple unbounded memory allocations in deserialization (Serialization, 8174109)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10281
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jre-headless |
CVE-2017-10285 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: incorrect privilege use when handling unreferenced objects (RMI, 8174966)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10285
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jre-headless |
CVE-2017-10295 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: HTTP client insufficient check for newline in URLs (Networking, 8176751)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10295
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jre-headless |
CVE-2017-10345 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded resource use in JceKeyStore deserialization (Serialization, 8181370)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10345
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-07-30 03:36
|
openjdk-7-jre-headless |
CVE-2017-10346 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: insufficient loader constraints checks for invokespecial (Hotspot, 8180711)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10346
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-07-30 03:36
|
openjdk-7-jre-headless |
CVE-2017-10347 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded memory allocation in SimpleTimeZone deserialization (Serialization, 8181323)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10347
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-07-30 03:36
|
openjdk-7-jre-headless |
CVE-2017-10348 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: multiple unbounded memory allocations in deserialization (Libraries, 8181432)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10348
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jre-headless |
CVE-2017-10349 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded memory allocation in PredicatedNodeTest deserialization (JAXP, 8181327)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10349
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:59
|
openjdk-7-jre-headless |
CVE-2017-10350 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded memory allocation in JAXWSExceptionBase deserialization (JAX-WS, 8181100)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10350
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:58
|
openjdk-7-jre-headless |
CVE-2017-10355 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: no default network operations timeouts in FtpClient (Networking, 8181612)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10355
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:58
|
openjdk-7-jre-headless |
CVE-2017-10356 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: weak protection of key stores against brute forcing (Security, 8181692)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10356
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:58
|
openjdk-7-jre-headless |
CVE-2017-10357 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: unbounded memory allocation in ObjectInputStream deserialization (Serialization, 8181597)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10357
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:57
|
openjdk-7-jre-headless |
CVE-2017-10388 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-2ubuntu0.14.04.1 |
OpenJDK: use of unprotected sname in Kerberos client (Libraries, 8178794)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10388
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-19 17:29 修改: 2022-10-06 18:57
|
openjdk-7-jre-headless |
CVE-2017-3241 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: untrusted input deserialization in RMI registry and DCG (RMI, 8156802)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3241
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-12-10 19:29
|
openjdk-7-jre-headless |
CVE-2017-3252 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: LdapLoginModule incorrect userDN extraction (JAAS, 8161743)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3252
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre-headless |
CVE-2017-3253 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: imageio PNGImageReader failed to honor ignoreMetadata for iTXt and zTXt chunks (2D, 8166988)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3253
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre-headless |
CVE-2017-3272 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: insufficient protected field access checks in atomic field updaters (Libraries, 8165344)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3272
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre-headless |
CVE-2017-3289 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: insecure class construction (Hotspot, 8167104)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3289
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre-headless |
CVE-2017-3509 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: improper re-use of NTLM authenticated connections (Networking, 8163520)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3509
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2019-10-03 00:03
|
openjdk-7-jre-headless |
CVE-2017-3511 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: untrusted extension directories search path in Launcher (JCE, 8163528)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3511
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2019-10-03 00:03
|
openjdk-7-jre-headless |
CVE-2017-3526 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: incomplete XML parse tree size enforcement (JAXP, 8169011)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3526
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2019-10-03 00:03
|
openjdk-7-jre-headless |
CVE-2018-2579 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2579
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:13
|
openjdk-7-jre-headless |
CVE-2018-2588 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2588
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:13
|
openjdk-7-jre-headless |
CVE-2018-2599 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: DnsClient missing source port randomization (JNDI, 8182125)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2599
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:09
|
openjdk-7-jre-headless |
CVE-2018-2602 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: loading of classes from untrusted locations (I18n, 8182601)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2602
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:09
|
openjdk-7-jre-headless |
CVE-2018-2618 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: insufficient strength of key agreement (JCE, 8185292)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2618
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:10
|
openjdk-7-jre-headless |
CVE-2018-2629 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: GSS context use-after-free (JGSS, 8186212)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2629
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:10
|
openjdk-7-jre-headless |
CVE-2018-2633 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2633
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:13
|
openjdk-7-jre-headless |
CVE-2018-2634 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2634
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:13
|
openjdk-7-jre-headless |
CVE-2018-2637 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2637
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:06
|
openjdk-7-jre-headless |
CVE-2018-2641 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: GTK library loading use-after-free (AWT, 8185325)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2641
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:27
|
openjdk-7-jre-headless |
CVE-2018-2663 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2663
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:06
|
openjdk-7-jre-headless |
CVE-2018-2677 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2677
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:05
|
openjdk-7-jre-headless |
CVE-2018-2678 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2678
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 18:04
|
openjdk-7-jre-headless |
CVE-2018-2783 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
JDK: unspecified vulnerability fixed in 6u191, 7u171, and 8u161 (Security)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2783
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2022-10-06 18:56
|
openjdk-7-jre-headless |
CVE-2018-2794 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2794
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:30
|
openjdk-7-jre-headless |
CVE-2018-2795 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2795
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:36
|
openjdk-7-jre-headless |
CVE-2018-2796 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2796
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:40
|
openjdk-7-jre-headless |
CVE-2018-2797 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2797
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:35
|
openjdk-7-jre-headless |
CVE-2018-2798 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2798
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:40
|
openjdk-7-jre-headless |
CVE-2018-2799 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2799
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:35
|
openjdk-7-jre-headless |
CVE-2018-2800 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2800
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2022-05-13 14:57
|
openjdk-7-jre-headless |
CVE-2018-2814 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2814
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:35
|
openjdk-7-jre-headless |
CVE-2018-2815 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2815
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:41
|
openjdk-7-jre-headless |
CVE-2018-2952 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.2 |
OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2952
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-07-18 13:29 修改: 2022-10-06 18:55
|
openjdk-7-jre-headless |
CVE-2018-3136 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3136
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:34
|
openjdk-7-jre-headless |
CVE-2018-3139 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3139
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:34
|
openjdk-7-jre-headless |
CVE-2018-3149 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3149
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:33
|
openjdk-7-jre-headless |
CVE-2018-3169 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Improper field access checks (Hotspot, 8199226)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3169
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:33
|
openjdk-7-jre-headless |
CVE-2018-3180 |
中危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.3 |
OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3180
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-17 01:31 修改: 2022-06-27 17:33
|
openssl |
CVE-2016-7056 |
中危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.22 |
openssl: ECDSA P-256 timing attack key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7056
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-09-10 16:29 修改: 2023-02-12 23:25
|
openssl |
CVE-2017-3731 |
中危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.22 |
openssl: Truncated packet could crash via OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3731
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-05-04 19:29 修改: 2022-08-16 13:16
|
openssl |
CVE-2018-0739 |
中危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.24 |
openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0739
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-03-27 21:29 修改: 2023-11-07 02:51
|
passwd |
CVE-2016-6252 |
中危 |
1:4.1.5.1-1ubuntu9.2 |
1:4.1.5.1-1ubuntu9.4 |
shadow-utils: Incorrect integer handling results in LPE
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6252
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-02-17 17:59 修改: 2017-11-04 01:29
|
passwd |
CVE-2017-2616 |
中危 |
1:4.1.5.1-1ubuntu9.2 |
1:4.1.5.1-1ubuntu9.4 |
util-linux: Sending SIGKILL to other processes with root privileges via su
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2616
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-07-27 19:29 修改: 2019-10-09 23:26
|
perl |
CVE-2017-12837 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.3 |
perl: Heap buffer overflow in regular expression compiler
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12837
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl |
CVE-2017-12883 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.3 |
perl: Buffer over-read in regular expression parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12883
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl |
CVE-2018-12015 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.6 |
perl: Directory traversal in Archive::Tar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12015
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-07 13:29 修改: 2020-08-24 17:37
|
perl |
CVE-2018-18311 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.7 |
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18311
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl |
CVE-2018-18313 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.7 |
perl: Heap-based buffer read overflow in S_grok_bslash_N()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18313
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl |
CVE-2018-6913 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.4 |
perl: heap buffer overflow in pp_pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6913
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
perl-base |
CVE-2017-12837 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.3 |
perl: Heap buffer overflow in regular expression compiler
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12837
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl-base |
CVE-2017-12883 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.3 |
perl: Buffer over-read in regular expression parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12883
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl-base |
CVE-2018-12015 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.6 |
perl: Directory traversal in Archive::Tar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12015
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-07 13:29 修改: 2020-08-24 17:37
|
perl-base |
CVE-2018-18311 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.7 |
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18311
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl-base |
CVE-2018-18313 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.7 |
perl: Heap-based buffer read overflow in S_grok_bslash_N()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18313
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl-base |
CVE-2018-6913 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.4 |
perl: heap buffer overflow in pp_pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6913
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
perl-modules |
CVE-2017-12837 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.3 |
perl: Heap buffer overflow in regular expression compiler
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12837
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl-modules |
CVE-2017-12883 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.3 |
perl: Buffer over-read in regular expression parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12883
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl-modules |
CVE-2018-12015 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.6 |
perl: Directory traversal in Archive::Tar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12015
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-07 13:29 修改: 2020-08-24 17:37
|
perl-modules |
CVE-2018-18311 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.7 |
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18311
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl-modules |
CVE-2018-18313 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.7 |
perl: Heap-based buffer read overflow in S_grok_bslash_N()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18313
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl-modules |
CVE-2018-6913 |
中危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.4 |
perl: heap buffer overflow in pp_pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6913
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
procps |
CVE-2018-1122 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: Local privilege escalation in top
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1122
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-05-23 14:29 修改: 2019-10-03 00:03
|
procps |
CVE-2018-1123 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: denial of service in ps via mmap buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1123
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-05-23 14:29 修改: 2023-11-07 02:55
|
procps |
CVE-2018-1124 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: Integer overflows leading to heap overflow in file2strvec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1124
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-05-23 13:29 修改: 2020-09-09 14:58
|
procps |
CVE-2018-1125 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: stack buffer overflow in pgrep
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1125
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-05-23 14:29 修改: 2020-09-09 14:59
|
procps |
CVE-2018-1126 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1126
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-05-23 13:29 修改: 2019-07-30 13:15
|
python3.4 |
CVE-2016-0772 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
python: smtplib StartTLS stripping attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-0772
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-09-02 14:59 修改: 2019-02-09 11:29
|
python3.4 |
CVE-2016-1000110 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
CGIHandler: sets environmental variable based on user supplied Proxy request header
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000110
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-11-27 17:15 修改: 2023-11-07 02:29
|
python3.4 |
CVE-2016-5636 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
python: Heap overflow in zipimporter module
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5636
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-09-02 14:59 修改: 2019-02-09 11:29
|
python3.4 |
CVE-2016-5699 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
python: http protocol steam injection attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5699
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-09-02 14:59 修改: 2023-02-12 23:24
|
python3.4 |
CVE-2017-1000158 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.6 |
python: Integer overflow in PyString_DecodeEscape results in heap-base buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000158
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-11-17 05:29 修改: 2023-02-16 14:15
|
python3.4 |
CVE-2018-1000802 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: Command injection in the shutil module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000802
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-09-18 17:29 修改: 2023-11-07 02:51
|
python3.4 |
CVE-2018-14647 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: Missing salt initialization in _elementtree.c module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14647
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-09-25 00:29 修改: 2023-11-07 02:53
|
python3.4-minimal |
CVE-2016-0772 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
python: smtplib StartTLS stripping attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-0772
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-09-02 14:59 修改: 2019-02-09 11:29
|
python3.4-minimal |
CVE-2016-1000110 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
CGIHandler: sets environmental variable based on user supplied Proxy request header
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000110
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-11-27 17:15 修改: 2023-11-07 02:29
|
python3.4-minimal |
CVE-2016-5636 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
python: Heap overflow in zipimporter module
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5636
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-09-02 14:59 修改: 2019-02-09 11:29
|
python3.4-minimal |
CVE-2016-5699 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.5 |
python: http protocol steam injection attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5699
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-09-02 14:59 修改: 2023-02-12 23:24
|
python3.4-minimal |
CVE-2017-1000158 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.6 |
python: Integer overflow in PyString_DecodeEscape results in heap-base buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000158
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-11-17 05:29 修改: 2023-02-16 14:15
|
python3.4-minimal |
CVE-2018-1000802 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: Command injection in the shutil module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000802
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-09-18 17:29 修改: 2023-11-07 02:51
|
python3.4-minimal |
CVE-2018-14647 |
中危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: Missing salt initialization in _elementtree.c module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14647
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-09-25 00:29 修改: 2023-11-07 02:53
|
sensible-utils |
CVE-2017-17512 |
中危 |
0.0.9 |
0.0.9ubuntu0.14.04.1 |
sensible-browser in sensible-utils before 0.0.11 does not validate str ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17512
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-12-11 06:29 修改: 2018-03-16 01:29
|
isc-dhcp-client |
CVE-2018-5733 |
中危 |
4.2.4-7ubuntu12.6 |
4.2.4-7ubuntu12.12 |
dhcp: Reference count overflow in dhcpd allows denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5733
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-01-16 20:29 修改: 2020-01-09 21:08
|
tar |
CVE-2016-6321 |
中危 |
1.27.1-1 |
1.27.1-1ubuntu0.1 |
tar: Bypassing the extract path name
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6321
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-12-09 22:59 修改: 2023-02-13 04:50
|
isc-dhcp-common |
CVE-2018-5732 |
中危 |
4.2.4-7ubuntu12.6 |
4.2.4-7ubuntu12.12 |
dhcp: Buffer overflow in dhclient possibly allowing code execution triggered by malicious server
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5732
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-10-09 16:15 修改: 2020-01-09 21:14
|
isc-dhcp-common |
CVE-2018-5733 |
中危 |
4.2.4-7ubuntu12.6 |
4.2.4-7ubuntu12.12 |
dhcp: Reference count overflow in dhcpd allows denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5733
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-01-16 20:29 修改: 2020-01-09 21:08
|
tomcat7 |
CVE-2016-5018 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: security manager bypass via IntrospectHelper utility function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5018
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 16:29 修改: 2023-12-08 16:41
|
tomcat7 |
CVE-2016-6816 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6816
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-20 18:59 修改: 2023-12-08 16:41
|
tomcat7 |
CVE-2016-8745 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: information disclosure due to incorrect Processor sharing
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8745
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 22:29 修改: 2023-12-08 16:41
|
tomcat7 |
CVE-2016-9774 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
The postinst script in the tomcat6 package before 6.0.45+dfsg-1~deb7u4 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9774
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 16:59 修改: 2018-08-02 01:29
|
tomcat7 |
CVE-2016-9775 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
The postrm script in the tomcat6 package before 6.0.45+dfsg-1~deb7u3 o ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9775
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 16:59 修改: 2021-06-14 18:15
|
tomcat7 |
CVE-2017-12616 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Information Disclosure when using VirtualDirContext
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12616
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-19 13:29 修改: 2023-11-07 02:38
|
tomcat7 |
CVE-2017-5647 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Incorrect handling of pipelined requests when send file was used
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5647
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-17 16:59 修改: 2023-12-08 16:41
|
tomcat7 |
CVE-2017-5648 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Calls to application listeners did not use the appropriate facade object
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5648
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-17 16:59 修改: 2023-12-08 16:41
|
tomcat7 |
CVE-2017-5664 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Security constrained bypass in error page mechanism
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5664
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-06-06 14:29 修改: 2023-12-08 16:41
|
tomcat7 |
CVE-2017-6056 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.10 |
tomcat: Infinite loop in the processing of https requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6056
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-17 07:59 修改: 2023-11-07 02:49
|
tomcat7 |
CVE-2017-7674 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Vary header not added by CORS filter leading to cache poisoning
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7674
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-11 02:29 修改: 2023-12-08 16:41
|
tomcat7 |
CVE-2018-11784 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.16 |
tomcat: Open redirect in default servlet
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11784
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-04 13:29 修改: 2023-12-08 16:41
|
tomcat7 |
CVE-2018-1304 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1304
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-02-28 20:29 修改: 2023-12-08 16:41
|
tomcat7 |
CVE-2018-1305 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Late application of security constraints can lead to resource exposure for unauthorised users
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1305
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-02-23 23:29 修改: 2023-12-08 16:41
|
tomcat7 |
CVE-2018-1336 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.15 |
tomcat: A bug in the UTF-8 decoder can lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1336
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-02 14:29 修改: 2023-12-08 16:41
|
bash |
CVE-2016-7543 |
中危 |
4.3-7ubuntu1.5 |
4.3-7ubuntu1.7 |
bash: Specially crafted SHELLOPTS+PS4 variables allows command substitution
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7543
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-19 20:59 修改: 2023-11-07 02:34
|
busybox-initramfs |
CVE-2015-9261 |
中危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: Segmentation fault when unzipping specially crafted zip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-9261
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-07-26 19:29 修改: 2022-10-29 02:30
|
tomcat7-common |
CVE-2016-5018 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: security manager bypass via IntrospectHelper utility function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5018
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 16:29 修改: 2023-12-08 16:41
|
tomcat7-common |
CVE-2016-6816 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6816
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-20 18:59 修改: 2023-12-08 16:41
|
tomcat7-common |
CVE-2016-8745 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: information disclosure due to incorrect Processor sharing
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8745
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 22:29 修改: 2023-12-08 16:41
|
tomcat7-common |
CVE-2016-9774 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
The postinst script in the tomcat6 package before 6.0.45+dfsg-1~deb7u4 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9774
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 16:59 修改: 2018-08-02 01:29
|
tomcat7-common |
CVE-2016-9775 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
The postrm script in the tomcat6 package before 6.0.45+dfsg-1~deb7u3 o ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9775
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 16:59 修改: 2021-06-14 18:15
|
tomcat7-common |
CVE-2017-12616 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Information Disclosure when using VirtualDirContext
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12616
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-19 13:29 修改: 2023-11-07 02:38
|
tomcat7-common |
CVE-2017-5647 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Incorrect handling of pipelined requests when send file was used
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5647
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-17 16:59 修改: 2023-12-08 16:41
|
tomcat7-common |
CVE-2017-5648 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Calls to application listeners did not use the appropriate facade object
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5648
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-17 16:59 修改: 2023-12-08 16:41
|
tomcat7-common |
CVE-2017-5664 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Security constrained bypass in error page mechanism
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5664
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-06-06 14:29 修改: 2023-12-08 16:41
|
tomcat7-common |
CVE-2017-6056 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.10 |
tomcat: Infinite loop in the processing of https requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6056
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-17 07:59 修改: 2023-11-07 02:49
|
tomcat7-common |
CVE-2017-7674 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.13 |
tomcat: Vary header not added by CORS filter leading to cache poisoning
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7674
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-11 02:29 修改: 2023-12-08 16:41
|
tomcat7-common |
CVE-2018-11784 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.16 |
tomcat: Open redirect in default servlet
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11784
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-04 13:29 修改: 2023-12-08 16:41
|
tomcat7-common |
CVE-2018-1304 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1304
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-02-28 20:29 修改: 2023-12-08 16:41
|
tomcat7-common |
CVE-2018-1305 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Late application of security constraints can lead to resource exposure for unauthorised users
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1305
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-02-23 23:29 修改: 2023-12-08 16:41
|
tomcat7-common |
CVE-2018-1336 |
中危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.15 |
tomcat: A bug in the UTF-8 decoder can lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1336
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-02 14:29 修改: 2023-12-08 16:41
|
udev |
CVE-2018-1049 |
中危 |
204-5ubuntu20.19 |
204-5ubuntu20.26 |
systemd: automount: access to automounted volumes can lock up
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1049
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-02-16 21:29 修改: 2022-01-31 18:26
|
udev |
CVE-2019-3842 |
中危 |
204-5ubuntu20.19 |
204-5ubuntu20.31 |
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3842
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-04-09 21:29 修改: 2023-11-07 03:10
|
vim-common |
CVE-2016-1248 |
中危 |
2:7.4.052-1ubuntu3 |
2:7.4.052-1ubuntu3.1 |
vim: Lack of validation of values for few options results in code exection
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1248
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-11-23 15:59 修改: 2017-07-28 01:29
|
vim-tiny |
CVE-2016-1248 |
中危 |
2:7.4.052-1ubuntu3 |
2:7.4.052-1ubuntu3.1 |
vim: Lack of validation of values for few options results in code exection
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1248
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-11-23 15:59 修改: 2017-07-28 01:29
|
openjdk-7-jdk |
CVE-2017-3533 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: newline injection in the FTP client (Networking, 8170222)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3533
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2022-05-13 14:52
|
openjdk-7-jdk |
CVE-2017-3539 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: MD5 allowed for jar verification (Security, 8171121)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3539
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2022-05-13 14:52
|
openjdk-7-jdk |
CVE-2017-3544 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: newline injection in the SMTP client (Networking, 8171533)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3544
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2022-05-13 14:52
|
openjdk-7-jdk |
CVE-2018-2603 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2603
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:08
|
openjdk-7-jdk |
CVE-2018-2790 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2790
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:36
|
openjdk-7-jdk |
CVE-2019-2422 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u211-2.6.17-0ubuntu0.1 |
OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-2422
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-01-16 19:30 修改: 2022-10-06 17:52
|
libtiff5 |
CVE-2016-3991 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: out-of-bounds write in loadImage() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3991
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-09-21 18:59 修改: 2018-10-30 16:27
|
libtiff5 |
CVE-2016-5102 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.9 |
libtiff: Buffer overflow in readgifimage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5102
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-06 17:59 修改: 2018-03-28 01:29
|
libtiff5 |
CVE-2016-5318 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.9 |
libtiff: Stack-based buffer overflow in thumbnail's _TIFFVGetField function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5318
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-20 15:59 修改: 2018-03-28 01:29
|
libtiff5 |
CVE-2016-5323 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: more tiffcrop readSeparateTilesIntoBuffer() memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5323
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-20 15:59 修改: 2018-10-30 16:27
|
libtiff5 |
CVE-2016-5652 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: tiff2pdf JPEG Compression Tables Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5652
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-06 21:59 修改: 2018-01-05 02:31
|
libtiff5 |
CVE-2016-6223 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Out-of-bounds read on memory-mapped files in TIFFReadRawStrip1() and TIFFReadRawTile1()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6223
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-23 21:59 修改: 2017-11-04 01:29
|
libtiff5 |
CVE-2016-9273 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Out-of-bounds heap read in cpStrips
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9273
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-18 17:59 修改: 2017-11-04 01:29
|
libtiff5 |
CVE-2016-9297 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Out-of-bounds heap read in _TIFFPrintField (tif_print.c:127)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9297
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-18 17:59 修改: 2017-11-04 01:29
|
libtiff5 |
CVE-2016-9448 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Null pointer dereference in TIFFFetchNormalTag() (regression of CVE-2016-9297)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9448
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 17:59 修改: 2018-10-30 16:27
|
libtiff5 |
CVE-2016-9532 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Multiple uint32 overflows leading to heap buffer over-read
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9532
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-06 17:59 修改: 2017-02-08 18:43
|
libtiff5 |
CVE-2016-9536 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: t2p_process_jpeg_strip heap-buffer-overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9536
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-11-22 19:59 修改: 2018-01-05 02:31
|
libtiff5 |
CVE-2016-9537 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Out-of-bounds write vulnerabilities in tools/tiffcrop.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9537
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-11-22 19:59 修改: 2018-01-05 02:31
|
libtiff5 |
CVE-2016-9538 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Integer overflow leads to reading undefined buffer in readContigStripsIntoBuffer()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9538
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-11-22 19:59 修改: 2017-11-04 01:29
|
libtiff5 |
CVE-2016-9539 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Out-of-bounds read in readContigTilesIntoBuffer()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9539
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-11-22 19:59 修改: 2016-12-10 02:59
|
libtiff5 |
CVE-2016-9540 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: cpStripToTile heap-buffer-overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9540
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-11-22 19:59 修改: 2018-01-05 02:31
|
libtiff5 |
CVE-2017-10688 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Assertion abort in the TIFFWriteDirectoryTagCheckedLong8Array function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10688
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-06-29 23:29 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-11335 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Heap-based buffer overflow in tiff2pdf
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11335
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-07-17 13:18 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-11613 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.9 |
libtiff: Memory leak via corrupt td_imagelength in TIFFOpen function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11613
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-07-26 08:29 修改: 2018-12-01 11:29
|
libtiff5 |
CVE-2017-12944 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Mishandled memory allocation for short files in the TIFFReadDirEntryArray function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12944
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-18 15:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-13726 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Reachable assertion abort in the function TIFFWriteDirectorySec()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13726
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-29 06:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-13727 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Reachable assertion abort in the function TIFFWriteDirectoryTagSubifd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13727
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-29 06:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-17095 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.9 |
libtiff: Heap-based buffer overflow in tools/pal2rgb.c can lead to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17095
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-12-02 06:29 修改: 2018-12-01 11:29
|
libtiff5 |
CVE-2017-18013 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18013
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-01 08:29 修改: 2018-03-28 01:29
|
libtiff5 |
CVE-2017-5563 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.9 |
libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5563
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-23 07:59 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-9117 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.9 |
libtiff: Heap-based buffer over-read in bmp2tiff
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9117
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-05-21 19:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-9403 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Memory leak in TIFFReadDirEntryLong8Array
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9403
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-06-02 19:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-9404 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Memory leak in OJPEGReadHeaderInfoSecTablesQTable
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9404
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-06-02 19:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-9815 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Memory leak in the TIFFReadDirEntryLong8Array function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9815
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-06-22 15:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2018-10779 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.11 |
libtiff: heap-based buffer over-read in TIFFWriteScanline function in tif_write.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10779
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-05-07 07:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2018-10963 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.10 |
libtiff: reachable assertion in TIFFWriteDirectorySec function in tif_dirwrite.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10963
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-05-10 02:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2018-12900 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.11 |
libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12900
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-26 22:29 修改: 2021-03-05 19:15
|
libtiff5 |
CVE-2018-15209 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.9 |
libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15209
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-08 04:29 修改: 2020-08-24 17:37
|
libtiff5 |
CVE-2018-17000 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.11 |
libtiff: NULL pointer dereference in function _TIFFmemcmp at tif_unix.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17000
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-09-13 16:29 修改: 2019-04-05 21:29
|
libtiff5 |
CVE-2018-18661 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.10 |
libtiff: tiff2bw tool failed memory allocation leads to crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18661
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-26 14:29 修改: 2019-08-06 17:15
|
libtiff5 |
CVE-2018-19210 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.11 |
libtiff: NULL pointer dereference in TIFFWriteDirectorySec function in tif_dirwrite.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19210
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-11-12 19:29 修改: 2023-11-07 02:55
|
libtiff5 |
CVE-2018-5360 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
LibTIFF: heap-based buffer over-read in the ReadTIFFImage function in coders/tiff.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5360
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-14 02:29 修改: 2019-04-22 16:25
|
libtiff5 |
CVE-2018-5784 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: uncontrolled resource consumption in TIFFSetDirectory function in tif_dir.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5784
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-19 08:29 修改: 2019-04-22 16:19
|
libtiff5 |
CVE-2018-7456 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.10 |
libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7456
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-02-24 06:29 修改: 2021-01-29 20:15
|
libtiff5 |
CVE-2018-8905 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.10 |
libtiff: heap-based buffer overflow in tif_lzw.c:LZWDecodeCompat() allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8905
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-03-22 04:29 修改: 2023-03-01 17:13
|
libtiff5 |
CVE-2019-6128 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.11 |
libtiff: memory leak in TIFFFdOpen function in tif_unix.c when using pal2rgb
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6128
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-01-11 05:29 修改: 2023-03-01 18:41
|
isc-dhcp-client |
CVE-2017-3144 |
低危 |
4.2.4-7ubuntu12.6 |
4.2.4-7ubuntu12.12 |
dhcp: omapi code doesn't free socket descriptors when empty message is received allowing denial-of-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3144
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-01-16 20:29 修改: 2020-01-09 21:07
|
busybox-initramfs |
CVE-2018-20679 |
低危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: Out of bounds read in udhcp components resulting in information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20679
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-01-09 16:29 修改: 2019-09-04 23:15
|
libgnutls26 |
CVE-2016-8610 |
低危 |
2.12.23-12ubuntu2.5 |
2.12.23-12ubuntu2.6 |
SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8610
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-11-13 22:29 修改: 2024-01-26 17:44
|
libnss3 |
CVE-2016-2183 |
低危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.1 |
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2183
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-09-01 00:59 修改: 2023-02-12 23:17
|
libnss3 |
CVE-2018-0495 |
低危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.4 |
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51
|
libnss3 |
CVE-2018-12384 |
低危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.4 |
nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12384
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-04-29 15:29 修改: 2020-08-24 17:37
|
libgnutls26 |
CVE-2017-7869 |
低危 |
2.12.23-12ubuntu2.5 |
2.12.23-12ubuntu2.8 |
gnutls: Out-of-bounds write related to the cdk_pkt_read function (GNUTLS-SA-2017-3)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7869
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-04-14 04:59 修改: 2018-01-05 02:31
|
libc6 |
CVE-2016-1234 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: Stack-based buffer overflow in glob with GLOB_ALTDIRFUNC and crafted directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1234
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-06-01 20:59 修改: 2023-11-07 02:29
|
libc6 |
CVE-2016-3706 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: stack (frame) overflow in getaddrinfo() when called with AF_INET, AF_INET6 (incomplete fix for CVE-2013-4458)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3706
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-06-10 15:59 修改: 2023-02-12 23:18
|
libc6 |
CVE-2016-4429 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: libtirpc: stack (frame) overflow in Sun RPC clntudp_call()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4429
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-06-10 15:59 修改: 2023-11-07 02:32
|
libc6 |
CVE-2016-6323 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: Missing unwind info in __startcontext causes infinite loop in _Unwind_Backtrace
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6323
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-10-07 14:59 修改: 2023-11-07 02:33
|
libc6 |
CVE-2017-1000408 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Memory leak reachable via LD_HWCAP_MASK
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000408
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-02-01 04:29 修改: 2019-10-03 00:03
|
libc6 |
CVE-2017-1000409 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Buffer overflow triggerable via LD_LIBRARY_PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000409
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-02-01 04:29 修改: 2019-04-04 11:29
|
libc6 |
CVE-2017-15670 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Buffer overflow in glob with GLOB_TILDE
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15670
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-10-20 17:29 修改: 2018-06-20 01:29
|
libc6 |
CVE-2017-15804 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Buffer overflow during unescaping of user names with the ~ operator
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15804
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-10-22 20:29 修改: 2023-11-07 02:40
|
libnss3-nssdb |
CVE-2016-2183 |
低危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.1 |
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2183
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-09-01 00:59 修改: 2023-02-12 23:17
|
libnss3-nssdb |
CVE-2018-0495 |
低危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.4 |
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51
|
libtomcat7-java |
CVE-2016-5388 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
Tomcat: CGI sets environmental variable based on user supplied Proxy request header
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5388
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-07-19 02:00 修改: 2023-02-12 23:23
|
libtomcat7-java |
CVE-2016-6794 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: system property disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6794
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 16:29 修改: 2023-12-08 16:41
|
libtomcat7-java |
CVE-2016-6796 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: security manager bypass via JSP Servlet config parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6796
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-11 02:29 修改: 2023-12-08 16:41
|
libtomcat7-java |
CVE-2016-6797 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: unrestricted access to global resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6797
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 22:29 修改: 2023-12-08 16:41
|
libtomcat7-java |
CVE-2018-8014 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8014
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-05-16 16:29 修改: 2023-12-08 16:41
|
libtomcat7-java |
CVE-2018-8034 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.15 |
tomcat: Host name verification missing in WebSocket client
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8034
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-01 18:29 修改: 2024-10-21 16:35
|
libnss3-nssdb |
CVE-2018-12384 |
低危 |
2:3.23-0ubuntu0.14.04.1 |
2:3.28.4-0ubuntu0.14.04.4 |
nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12384
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-04-29 15:29 修改: 2020-08-24 17:37
|
libc6 |
CVE-2017-16997 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Incorrect handling of RPATH in elf/dl-load.c can be used to execute code loaded from arbitrary libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16997
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-12-18 01:29 修改: 2020-10-15 13:28
|
bash |
CVE-2016-0634 |
低危 |
4.3-7ubuntu1.5 |
4.3-7ubuntu1.7 |
bash: Arbitrary code execution via malicious hostname
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-0634
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-08-28 15:29 修改: 2018-01-05 02:30
|
libpng12-0 |
CVE-2016-10087 |
低危 |
1.2.50-1ubuntu2.14.04.2 |
1.2.50-1ubuntu2.14.04.3 |
libpng: NULL pointer dereference in png_set_text_2()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10087
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-30 22:59 修改: 2023-11-07 02:29
|
isc-dhcp-common |
CVE-2016-2774 |
低危 |
4.2.4-7ubuntu12.6 |
4.2.4-7ubuntu12.12 |
dhcp: unclosed TCP connections to OMAPI or failover ports can cause DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2774
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-03-09 15:59 修改: 2020-01-08 17:17
|
libvorbis0a |
CVE-2017-11333 |
低危 |
1.3.2-1.3ubuntu1 |
1.3.2-1.3ubuntu1.1 |
libvorbis: Memory exhaustion in vorbis_analysis_wrote function in lib/block.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11333
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-07-31 13:29 修改: 2019-10-03 00:03
|
isc-dhcp-common |
CVE-2017-3144 |
低危 |
4.2.4-7ubuntu12.6 |
4.2.4-7ubuntu12.12 |
dhcp: omapi code doesn't free socket descriptors when empty message is received allowing denial-of-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3144
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2019-01-16 20:29 修改: 2020-01-09 21:07
|
file |
CVE-2014-9620 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: limit the number of ELF notes processed
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9620
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2015-01-21 18:59 修改: 2018-06-16 01:29
|
libgssapi-krb5-2 |
CVE-2017-11462 |
低危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
libvorbisenc2 |
CVE-2017-11333 |
低危 |
1.3.2-1.3ubuntu1 |
1.3.2-1.3ubuntu1.1 |
libvorbis: Memory exhaustion in vorbis_analysis_wrote function in lib/block.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11333
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-07-31 13:29 修改: 2019-10-03 00:03
|
libgssapi-krb5-2 |
CVE-2018-5729 |
低危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libgssapi-krb5-2 |
CVE-2018-5730 |
低危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
file |
CVE-2014-9621 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: limit string printing to 100 chars
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9621
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2015-01-21 18:59 修改: 2018-06-16 01:29
|
libx11-6 |
CVE-2016-7942 |
低危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Insufficient validation of server responses in XGetImage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7942
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
openjdk-7-jre |
CVE-2016-10165 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
lcms2: Out-of-bounds read in Type_MLU_Read()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10165
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-03 19:59 修改: 2024-01-10 18:26
|
openjdk-7-jre |
CVE-2016-2183 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2183
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-09-01 00:59 修改: 2023-02-12 23:17
|
openjdk-7-jre |
CVE-2017-10053 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: reading of unprocessed image data in JPEGImageReader (2D, 8169209)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10053
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-06-27 17:32
|
openjdk-7-jre |
CVE-2017-10081 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect bracket processing in function signature handling (Hotspot, 8170966)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10081
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-06-27 17:35
|
openjdk-7-jre |
CVE-2017-10108 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: unbounded memory allocation in BasicAttribute deserialization (Serialization, 8174105)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10108
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
openjdk-7-jre |
CVE-2017-10109 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: unbounded memory allocation in CodeSource deserialization (Serialization, 8174113)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10109
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
openjdk-7-jre |
CVE-2017-10243 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insecure XML parsing in wsdlimport (JAX-WS, 8182054)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10243
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 18:59
|
openjdk-7-jre |
CVE-2017-3231 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3231
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre |
CVE-2017-3261 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3261
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre |
CVE-2017-3533 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: newline injection in the FTP client (Networking, 8170222)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3533
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2022-05-13 14:52
|
openjdk-7-jre |
CVE-2017-3539 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: MD5 allowed for jar verification (Security, 8171121)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3539
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2022-05-13 14:52
|
openjdk-7-jre |
CVE-2017-3544 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: newline injection in the SMTP client (Networking, 8171533)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3544
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2022-05-13 14:52
|
openjdk-7-jre |
CVE-2018-2603 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2603
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:08
|
openjdk-7-jre |
CVE-2018-2790 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2790
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:36
|
openjdk-7-jre |
CVE-2019-2422 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u211-2.6.17-0ubuntu0.1 |
OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-2422
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-01-16 19:30 修改: 2022-10-06 17:52
|
libx11-6 |
CVE-2016-7943 |
低危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Insufficient validation of server responses in FontNames
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7943
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
file |
CVE-2014-9653 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: malformed elf file causes access to uninitialized memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9653
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2015-03-30 10:59 修改: 2018-06-16 01:29
|
file |
CVE-2015-8865 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: Buffer over-write in finfo_open with malformed magic file
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8865
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-05-20 10:59 修改: 2023-11-07 02:28
|
libavahi-client3 |
CVE-2017-6519 |
低危 |
0.6.31-4ubuntu1.1 |
0.6.31-4ubuntu1.3 |
avahi: Multicast DNS responds to unicast queries outside of local network
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6519
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-05-01 01:59 修改: 2023-11-07 02:49
|
libx11-data |
CVE-2016-7942 |
低危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Insufficient validation of server responses in XGetImage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7942
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libx11-data |
CVE-2016-7943 |
低危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Insufficient validation of server responses in FontNames
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7943
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libavahi-common-data |
CVE-2017-6519 |
低危 |
0.6.31-4ubuntu1.1 |
0.6.31-4ubuntu1.3 |
avahi: Multicast DNS responds to unicast queries outside of local network
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6519
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-05-01 01:59 修改: 2023-11-07 02:49
|
libavahi-common3 |
CVE-2017-6519 |
低危 |
0.6.31-4ubuntu1.1 |
0.6.31-4ubuntu1.3 |
avahi: Multicast DNS responds to unicast queries outside of local network
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6519
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-05-01 01:59 修改: 2023-11-07 02:49
|
libpython3.4-minimal |
CVE-2018-1060 |
低危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1060
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-18 14:29 修改: 2023-11-07 02:55
|
libx11-xcb1 |
CVE-2016-7942 |
低危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Insufficient validation of server responses in XGetImage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7942
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libx11-xcb1 |
CVE-2016-7943 |
低危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Insufficient validation of server responses in FontNames
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7943
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libpython3.4-minimal |
CVE-2018-1061 |
低危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1061
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-19 12:29 修改: 2023-11-07 02:55
|
file |
CVE-2018-10360 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: out-of-bounds read via a crafted ELF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10360
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-11 10:29 修改: 2019-05-02 14:40
|
bash |
CVE-2016-9401 |
低危 |
4.3-7ubuntu1.5 |
4.3-7ubuntu1.7 |
bash: popd controlled free
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9401
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-23 21:59 修改: 2020-09-14 18:32
|
busybox-initramfs |
CVE-2011-5325 |
低危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: Path traversal via crafted tar file containing symlink
漏洞详情: https://avd.aquasec.com/nvd/cve-2011-5325
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-08-07 17:29 修改: 2021-02-19 15:57
|
busybox-initramfs |
CVE-2014-9645 |
低危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: unprivileged arbitrary module load via basename abuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9645
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-12 06:59 修改: 2019-04-03 15:29
|
libjasper1 |
CVE-2015-5203 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: integer overflow in jas_image_cmpt_create()
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5203
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-02 19:29 修改: 2023-11-07 02:26
|
libjasper1 |
CVE-2015-5221 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: use-after-free and double-free flaws in mif_process_cmpt()
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5221
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-07-25 18:29 修改: 2023-11-07 02:26
|
libjasper1 |
CVE-2016-10248 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: NULL pointer dereference in jpc_tsfb_synthesize()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10248
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-15 14:59 修改: 2018-06-29 01:29
|
libpython3.4-stdlib |
CVE-2018-1060 |
低危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1060
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-18 14:29 修改: 2023-11-07 02:55
|
libpython3.4-stdlib |
CVE-2018-1061 |
低危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1061
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-19 12:29 修改: 2023-11-07 02:55
|
libjasper1 |
CVE-2016-1867 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.4 |
jasper: out-of-bounds read in jpc_pi_nextcprl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1867
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-01-20 16:59 修改: 2018-01-05 02:30
|
libjasper1 |
CVE-2016-2089 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.4 |
jasper: matrix rows_ NULL pointer dereference in jas_matrix_clip()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2089
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-02-08 19:59 修改: 2018-01-05 02:30
|
libjasper1 |
CVE-2016-8690 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.4 |
jasper: missing jas_matrix_create() parameter checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8690
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-15 19:59 修改: 2023-11-07 02:36
|
libjasper1 |
CVE-2016-8691 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.4 |
jasper: missing SIZ marker segment XRsiz and YRsiz fields range check
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8691
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-15 19:59 修改: 2023-11-07 02:36
|
libxml2 |
CVE-2016-4448 |
低危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.9 |
libxml2: Format string vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4448
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-06-09 16:59 修改: 2023-02-12 23:21
|
libxml2 |
CVE-2016-9318 |
低危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.13 |
libxml2: XML External Entity vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9318
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-11-16 00:59 修改: 2022-04-08 23:15
|
libxml2 |
CVE-2017-16932 |
低危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.11 |
libxml2: Infinite recursion in parameter entities
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16932
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-11-23 21:29 修改: 2023-11-07 02:40
|
libxml2 |
CVE-2017-18258 |
低危 |
2.9.1+dfsg1-3ubuntu4.8 |
2.9.1+dfsg1-3ubuntu4.13 |
libxml2: Unrestricted memory usage in xz_head() function in xzlib.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18258
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-08 17:29 修改: 2020-09-10 01:15
|
libjasper1 |
CVE-2016-8692 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.4 |
jasper: missing SIZ marker segment XRsiz and YRsiz fields range check
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8692
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-15 19:59 修改: 2023-11-07 02:36
|
libjasper1 |
CVE-2016-8693 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.4 |
jasper: incorrect handling of bufsize 0 in mem_resize()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8693
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-15 19:59 修改: 2023-11-07 02:36
|
libjasper1 |
CVE-2016-8883 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: reachable asserts in jpc_dec_tiledecode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8883
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-13 16:59 修改: 2018-06-29 01:29
|
libjasper1 |
CVE-2016-9387 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: integer overflow in jpc_dec_process_siz()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9387
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 18:59 修改: 2018-06-29 01:29
|
libjasper1 |
CVE-2016-9388 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: reachable assertions in RAS encoder/decoder
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9388
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 18:59 修改: 2024-09-09 13:56
|
libjasper1 |
CVE-2016-9389 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: reachable assertions caused by insufficient component domains checks in ICT/RCT in JPC codec
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9389
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 18:59 修改: 2019-01-16 19:29
|
libjasper1 |
CVE-2016-9390 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: insufficient SIZ marker tilexoff and tileyoff checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9390
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 18:59 修改: 2018-06-29 01:29
|
multiarch-support |
CVE-2016-1234 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: Stack-based buffer overflow in glob with GLOB_ALTDIRFUNC and crafted directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1234
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-06-01 20:59 修改: 2023-11-07 02:29
|
multiarch-support |
CVE-2016-3706 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: stack (frame) overflow in getaddrinfo() when called with AF_INET, AF_INET6 (incomplete fix for CVE-2013-4458)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3706
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-06-10 15:59 修改: 2023-02-12 23:18
|
multiarch-support |
CVE-2016-4429 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: libtirpc: stack (frame) overflow in Sun RPC clntudp_call()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4429
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-06-10 15:59 修改: 2023-11-07 02:32
|
multiarch-support |
CVE-2016-6323 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: Missing unwind info in __startcontext causes infinite loop in _Unwind_Backtrace
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6323
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-10-07 14:59 修改: 2023-11-07 02:33
|
multiarch-support |
CVE-2017-1000408 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Memory leak reachable via LD_HWCAP_MASK
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000408
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-02-01 04:29 修改: 2019-10-03 00:03
|
multiarch-support |
CVE-2017-1000409 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Buffer overflow triggerable via LD_LIBRARY_PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000409
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-02-01 04:29 修改: 2019-04-04 11:29
|
multiarch-support |
CVE-2017-15670 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Buffer overflow in glob with GLOB_TILDE
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15670
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-10-20 17:29 修改: 2018-06-20 01:29
|
multiarch-support |
CVE-2017-15804 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Buffer overflow during unescaping of user names with the ~ operator
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15804
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-10-22 20:29 修改: 2023-11-07 02:40
|
multiarch-support |
CVE-2017-16997 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Incorrect handling of RPATH in elf/dl-load.c can be used to execute code loaded from arbitrary libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16997
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-12-18 01:29 修改: 2020-10-15 13:28
|
libjasper1 |
CVE-2016-9391 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: reachable assertions in the JPC bitstream code
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9391
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 18:59 修改: 2018-06-29 01:29
|
libjasper1 |
CVE-2016-9392 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: insufficient SIZ marker segment data sanity checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9392
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 18:59 修改: 2019-01-16 19:29
|
libjasper1 |
CVE-2016-9393 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: insufficient SIZ marker segment data sanity checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9393
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 18:59 修改: 2018-06-29 01:29
|
libjasper1 |
CVE-2016-9394 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: insufficient SIZ marker segment data sanity checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9394
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 18:59 修改: 2018-06-29 01:29
|
libjasper1 |
CVE-2016-9396 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: reachable assertion in JPC_NOMINALGAIN()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9396
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-23 18:59 修改: 2023-11-07 02:37
|
libjasper1 |
CVE-2016-9600 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: JP2 encoder NULL pointer dereference due to uninitialized cmprof_
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9600
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-03-12 15:29 修改: 2019-10-09 23:20
|
libservlet3.0-java |
CVE-2016-5388 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
Tomcat: CGI sets environmental variable based on user supplied Proxy request header
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5388
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-07-19 02:00 修改: 2023-02-12 23:23
|
libservlet3.0-java |
CVE-2016-6794 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: system property disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6794
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 16:29 修改: 2023-12-08 16:41
|
ntpdate |
CVE-2015-7973 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: replay attack on authenticated broadcast mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7973
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-30 21:59 修改: 2021-04-26 17:42
|
ntpdate |
CVE-2015-7974 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: missing key check allows impersonation between authenticated peers (VU#357792)
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7974
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-01-26 19:59 修改: 2021-04-26 17:42
|
ntpdate |
CVE-2015-7976 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: 'ntpq saveconfig' command allows dangerous characters in filenames
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7976
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-30 21:59 修改: 2018-10-30 16:27
|
ntpdate |
CVE-2015-7979 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: off-path denial of service on authenticated broadcast mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7979
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-30 21:59 修改: 2021-04-15 21:15
|
ntpdate |
CVE-2015-8158 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: potential infinite loop in ntpq
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8158
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-30 21:59 修改: 2018-01-05 02:30
|
ntpdate |
CVE-2016-0727 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: Privilege escalation via cronjob
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-0727
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-04-14 18:59 修改: 2017-04-20 16:34
|
ntpdate |
CVE-2016-2518 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: out-of-bounds references on crafted packet
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2518
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-30 21:59 修改: 2021-06-10 13:15
|
ntpdate |
CVE-2016-4954 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: partial processing of spoofed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4954
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-07-05 01:59 修改: 2023-11-07 02:32
|
ntpdate |
CVE-2016-4955 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: autokey association reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4955
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-07-05 01:59 修改: 2023-11-07 02:32
|
ntpdate |
CVE-2016-4956 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 |
ntp: broadcast interleave (incomplete fix for CVE-2016-1548)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4956
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-07-05 01:59 修改: 2023-11-07 02:32
|
ntpdate |
CVE-2016-7426 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
ntp: Client rate limiting and server responses
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7426
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-13 16:59 修改: 2020-06-18 18:14
|
ntpdate |
CVE-2016-7427 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
ntp: Broadcast Mode Replay Prevention DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7427
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-13 16:59 修改: 2019-01-24 11:29
|
ntpdate |
CVE-2016-7428 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
ntp: Broadcast Mode Poll Interval Enforcement DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7428
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-13 16:59 修改: 2019-01-24 11:29
|
ntpdate |
CVE-2016-7429 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
ntp: Attack on interface selection
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7429
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-13 16:59 修改: 2018-01-05 02:31
|
ntpdate |
CVE-2016-9310 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
ntp: Mode 6 unauthenticated trap information disclosure and DDoS vector
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9310
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-13 16:59 修改: 2019-01-24 11:29
|
ntpdate |
CVE-2016-9311 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
ntp: Null pointer dereference when trap service is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9311
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-01-13 16:59 修改: 2019-01-24 11:29
|
ntpdate |
CVE-2017-6458 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
ntp: Potential Overflows in ctl_put() functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6458
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-27 17:59 修改: 2023-11-07 02:49
|
ntpdate |
CVE-2017-6462 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
ntp: Buffer Overflow in DPTS Clock
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6462
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-27 17:59 修改: 2019-01-24 11:29
|
ntpdate |
CVE-2017-6463 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
ntp: Authenticated DoS via Malicious Config Option
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6463
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-27 17:59 修改: 2019-01-24 11:29
|
ntpdate |
CVE-2017-6464 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.11 |
ntp: Denial of Service via Malformed Config
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6464
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-03-27 17:59 修改: 2018-04-12 01:29
|
ntpdate |
CVE-2018-7185 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.8 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.13 |
ntp: Unauthenticated packet can reset authenticated interleaved association
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7185
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-03-06 20:29 修改: 2020-08-24 17:37
|
libservlet3.0-java |
CVE-2016-6796 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: security manager bypass via JSP Servlet config parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6796
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-11 02:29 修改: 2023-12-08 16:41
|
libservlet3.0-java |
CVE-2016-6797 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: unrestricted access to global resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6797
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 22:29 修改: 2023-12-08 16:41
|
libservlet3.0-java |
CVE-2018-8014 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8014
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-05-16 16:29 修改: 2023-12-08 16:41
|
openjdk-7-jre-headless |
CVE-2016-10165 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
lcms2: Out-of-bounds read in Type_MLU_Read()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10165
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-03 19:59 修改: 2024-01-10 18:26
|
openjdk-7-jre-headless |
CVE-2016-2183 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2183
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-09-01 00:59 修改: 2023-02-12 23:17
|
openjdk-7-jre-headless |
CVE-2017-10053 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: reading of unprocessed image data in JPEGImageReader (2D, 8169209)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10053
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-06-27 17:32
|
openjdk-7-jre-headless |
CVE-2017-10081 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect bracket processing in function signature handling (Hotspot, 8170966)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10081
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-06-27 17:35
|
openjdk-7-jre-headless |
CVE-2017-10108 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: unbounded memory allocation in BasicAttribute deserialization (Serialization, 8174105)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10108
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
openjdk-7-jre-headless |
CVE-2017-10109 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: unbounded memory allocation in CodeSource deserialization (Serialization, 8174113)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10109
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
openjdk-7-jre-headless |
CVE-2017-10243 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insecure XML parsing in wsdlimport (JAX-WS, 8182054)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10243
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 18:59
|
openjdk-7-jre-headless |
CVE-2017-3231 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3231
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre-headless |
CVE-2017-3261 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3261
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jre-headless |
CVE-2017-3533 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: newline injection in the FTP client (Networking, 8170222)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3533
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2022-05-13 14:52
|
openjdk-7-jre-headless |
CVE-2017-3539 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: MD5 allowed for jar verification (Security, 8171121)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3539
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2022-05-13 14:52
|
openjdk-7-jre-headless |
CVE-2017-3544 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u131-2.6.9-0ubuntu0.14.04.1 |
OpenJDK: newline injection in the SMTP client (Networking, 8171533)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3544
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-24 19:59 修改: 2022-05-13 14:52
|
openjdk-7-jre-headless |
CVE-2018-2603 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u171-2.6.13-0ubuntu0.14.04.2 |
OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2603
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-01-18 02:29 修改: 2023-11-21 19:08
|
openjdk-7-jre-headless |
CVE-2018-2790 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u181-2.6.14-0ubuntu0.1 |
OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-2790
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-19 02:29 修改: 2023-11-22 19:36
|
openjdk-7-jre-headless |
CVE-2019-2422 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u211-2.6.17-0ubuntu0.1 |
OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-2422
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2019-01-16 19:30 修改: 2022-10-06 17:52
|
libservlet3.0-java |
CVE-2018-8034 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.15 |
tomcat: Host name verification missing in WebSocket client
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8034
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-01 18:29 修改: 2024-10-21 16:35
|
libjasper1 |
CVE-2017-1000050 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: NULL pointer exception in jp2_encode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000050
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-07-17 13:18 修改: 2023-11-07 02:37
|
libsndfile1 |
CVE-2017-7585 |
低危 |
1.0.25-7ubuntu2.1 |
1.0.25-7ubuntu2.2 |
libsndfile: Stack-based buffer overflow in flac_buffer_copy()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7585
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-07 20:59 修改: 2017-07-11 01:33
|
openssl |
CVE-2016-2177 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.22 |
openssl: Possible integer overflow vulnerabilities in codebase
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2177
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-06-20 01:59 修改: 2023-11-07 02:31
|
openssl |
CVE-2016-8610 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.22 |
SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8610
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-11-13 22:29 修改: 2024-01-26 17:44
|
openssl |
CVE-2017-3735 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.23 |
openssl: Malformed X.509 IPAdressFamily could cause OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3735
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-28 19:29 修改: 2022-12-13 12:15
|
openssl |
CVE-2018-0495 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.26 |
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-0732 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.26 |
openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0732
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-12 13:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-0734 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.27 |
openssl: timing side channel attack in the DSA signature algorithm
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0734
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-10-30 12:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-0737 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.26 |
openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0737
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-04-16 18:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-5407 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.27 |
openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5407
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-11-15 21:29 修改: 2023-11-07 02:58
|
libsndfile1 |
CVE-2017-7586 |
低危 |
1.0.25-7ubuntu2.1 |
1.0.25-7ubuntu2.2 |
libsndfile: Error in header_read() causing stack-based buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7586
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-07 20:59 修改: 2017-07-11 01:33
|
libsndfile1 |
CVE-2017-7742 |
低危 |
1.0.25-7ubuntu2.1 |
1.0.25-7ubuntu2.2 |
libsndfile: Invalid memory read in flac_buffer_copy function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7742
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-12 18:59 修改: 2017-07-11 01:33
|
libsndfile1 |
CVE-2017-8361 |
低危 |
1.0.25-7ubuntu2.1 |
1.0.25-7ubuntu2.2 |
libsndfile: Buffer overflow in the flac_buffer_copy function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8361
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-30 19:59 修改: 2019-03-05 17:43
|
libsndfile1 |
CVE-2017-8362 |
低危 |
1.0.25-7ubuntu2.1 |
1.0.25-7ubuntu2.2 |
libsndfile: Out-of-bounds read in the flac_buffer_copy function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8362
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-30 19:59 修改: 2019-03-04 13:09
|
libsndfile1 |
CVE-2017-8363 |
低危 |
1.0.25-7ubuntu2.1 |
1.0.25-7ubuntu2.2 |
libsndfile: Heap buffer over-read in the flac_buffer_copy function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8363
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-30 19:59 修改: 2019-10-03 00:03
|
libsndfile1 |
CVE-2017-8365 |
低危 |
1.0.25-7ubuntu2.1 |
1.0.25-7ubuntu2.2 |
libsndfile: Buffer over-read in the l2les_array function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8365
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-04-30 19:59 修改: 2019-10-03 00:03
|
libsqlite3-0 |
CVE-2018-8740 |
低危 |
3.8.2-1ubuntu2.1 |
3.8.2-1ubuntu2.2 |
sqlite: NULL pointer dereference with databases with schema corrupted with CREATE TABLE AS allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8740
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-03-17 00:29 修改: 2023-11-07 03:01
|
libjasper1 |
CVE-2017-6850 |
低危 |
1.900.1-14ubuntu3.3 |
1.900.1-14ubuntu3.5 |
jasper: uninitialized pointer use in jp2_cdef_destroy()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6850
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-15 14:59 修改: 2018-06-29 01:29
|
perl |
CVE-2015-8853 |
低危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.4 |
perl: regexp matching hangs indefinitely on illegal UTF-8 input
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8853
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-05-25 15:59 修改: 2018-05-02 01:29
|
perl |
CVE-2016-6185 |
低危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.4 |
perl: XSLoader loads relative paths not included in @INC
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6185
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-08-02 14:59 修改: 2023-11-07 02:33
|
perl |
CVE-2017-6512 |
低危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.4 |
perl-File-Path: rmtree/remove_tree race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6512
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-06-01 16:29 修改: 2020-04-29 20:24
|
libjpeg-turbo8 |
CVE-2014-9092 |
低危 |
1.3.0-0ubuntu2 |
1.3.0-0ubuntu2.1 |
libjpeg-turbo: denial of service via specially-crafted JPEG file
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9092
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-10-10 13:29 修改: 2018-07-12 01:29
|
libjpeg-turbo8 |
CVE-2016-3616 |
低危 |
1.3.0-0ubuntu2 |
1.3.0-0ubuntu2.1 |
libjpeg: null pointer dereference in cjpeg
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3616
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-13 18:59 修改: 2019-08-06 17:15
|
libssl1.0.0 |
CVE-2016-2177 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.22 |
openssl: Possible integer overflow vulnerabilities in codebase
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2177
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-06-20 01:59 修改: 2023-11-07 02:31
|
libssl1.0.0 |
CVE-2016-8610 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.22 |
SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8610
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-11-13 22:29 修改: 2024-01-26 17:44
|
libssl1.0.0 |
CVE-2017-3735 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.23 |
openssl: Malformed X.509 IPAdressFamily could cause OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3735
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-08-28 19:29 修改: 2022-12-13 12:15
|
libssl1.0.0 |
CVE-2018-0495 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.26 |
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51
|
perl-base |
CVE-2015-8853 |
低危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.4 |
perl: regexp matching hangs indefinitely on illegal UTF-8 input
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8853
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-05-25 15:59 修改: 2018-05-02 01:29
|
perl-base |
CVE-2016-6185 |
低危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.4 |
perl: XSLoader loads relative paths not included in @INC
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6185
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-08-02 14:59 修改: 2023-11-07 02:33
|
perl-base |
CVE-2017-6512 |
低危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.4 |
perl-File-Path: rmtree/remove_tree race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6512
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-06-01 16:29 修改: 2020-04-29 20:24
|
libssl1.0.0 |
CVE-2018-0732 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.26 |
openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0732
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-12 13:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-0734 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.27 |
openssl: timing side channel attack in the DSA signature algorithm
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0734
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-10-30 12:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-0737 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.26 |
openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0737
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-04-16 18:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-5407 |
低危 |
1.0.1f-1ubuntu2.21 |
1.0.1f-1ubuntu2.27 |
openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5407
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-11-15 21:29 修改: 2023-11-07 02:58
|
libjpeg-turbo8 |
CVE-2018-11212 |
低危 |
1.3.0-0ubuntu2 |
1.3.0-0ubuntu2.1 |
libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11212
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-05-16 17:29 修改: 2022-04-20 00:15
|
libtasn1-6 |
CVE-2017-10790 |
低危 |
3.4-3ubuntu0.4 |
3.4-3ubuntu0.6 |
libtasn1: NULL pointer dereference in the _asn1_check_identifier function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10790
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-07-02 03:29 修改: 2023-11-07 02:38
|
perl-modules |
CVE-2015-8853 |
低危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.4 |
perl: regexp matching hangs indefinitely on illegal UTF-8 input
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8853
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-05-25 15:59 修改: 2018-05-02 01:29
|
perl-modules |
CVE-2016-6185 |
低危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.4 |
perl: XSLoader loads relative paths not included in @INC
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6185
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-08-02 14:59 修改: 2023-11-07 02:33
|
perl-modules |
CVE-2017-6512 |
低危 |
5.18.2-2ubuntu1.1 |
5.18.2-2ubuntu1.4 |
perl-File-Path: rmtree/remove_tree race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6512
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-06-01 16:29 修改: 2020-04-29 20:24
|
libjpeg-turbo8 |
CVE-2018-11213 |
低危 |
1.3.0-0ubuntu2 |
1.3.0-0ubuntu2.1 |
libjpeg: Segmentation fault in get_text_gray_row function in rdppm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11213
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-05-16 17:29 修改: 2019-10-03 00:03
|
libjpeg-turbo8 |
CVE-2018-11214 |
低危 |
1.3.0-0ubuntu2 |
1.3.0-0ubuntu2.1 |
libjpeg: Segmentation fault in get_text_rgb_row function in rdppm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11214
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-05-16 17:29 修改: 2019-10-03 00:03
|
libjpeg-turbo8 |
CVE-2018-1152 |
低危 |
1.3.0-0ubuntu2 |
1.3.0-0ubuntu2.1 |
libjpeg-turbo: Divide by zero allows for denial of service via crafted BMP image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1152
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-06-18 14:29 修改: 2020-07-31 21:15
|
busybox-initramfs |
CVE-2016-2147 |
低危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: out of bounds write (heap) due to integer underflow in udhcpc
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2147
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-02-09 15:59 修改: 2021-02-18 14:46
|
libgcrypt11 |
CVE-2018-0495 |
低危 |
1.5.3-2ubuntu4.4 |
1.5.3-2ubuntu4.6 |
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51
|
libc-bin |
CVE-2016-1234 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: Stack-based buffer overflow in glob with GLOB_ALTDIRFUNC and crafted directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1234
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-06-01 20:59 修改: 2023-11-07 02:29
|
libc-bin |
CVE-2016-3706 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: stack (frame) overflow in getaddrinfo() when called with AF_INET, AF_INET6 (incomplete fix for CVE-2013-4458)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3706
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-06-10 15:59 修改: 2023-02-12 23:18
|
libc-bin |
CVE-2016-4429 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: libtirpc: stack (frame) overflow in Sun RPC clntudp_call()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4429
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-06-10 15:59 修改: 2023-11-07 02:32
|
libgdk-pixbuf2.0-0 |
CVE-2017-6311 |
低危 |
2.30.7-0ubuntu1.6 |
2.30.7-0ubuntu1.7 |
gdk-pixbuf: NULL pointer dereference in gdk-pixbuf-thumbnailer
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6311
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-10 02:59 修改: 2023-11-07 02:49
|
libk5crypto3 |
CVE-2017-11462 |
低危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
libk5crypto3 |
CVE-2018-5729 |
低危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libk5crypto3 |
CVE-2018-5730 |
低危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
python3.4 |
CVE-2018-1060 |
低危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1060
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-18 14:29 修改: 2023-11-07 02:55
|
python3.4 |
CVE-2018-1061 |
低危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1061
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-19 12:29 修改: 2023-11-07 02:55
|
libgdk-pixbuf2.0-0 |
CVE-2017-6312 |
低危 |
2.30.7-0ubuntu1.6 |
2.30.7-0ubuntu1.8 |
gdk-pixbuf: Out-of-bounds read in io-ico.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6312
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-10 02:59 修改: 2023-11-07 02:49
|
libgdk-pixbuf2.0-0 |
CVE-2017-6313 |
低危 |
2.30.7-0ubuntu1.6 |
2.30.7-0ubuntu1.8 |
gdk-pixbuf: Integer underflow in io-icns.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6313
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-10 02:59 修改: 2023-11-07 02:49
|
libgdk-pixbuf2.0-0 |
CVE-2017-6314 |
低危 |
2.30.7-0ubuntu1.6 |
2.30.7-0ubuntu1.8 |
gdk-pixbuf: Infinite loop in io-tiff.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6314
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-10 02:59 修改: 2023-11-07 02:49
|
libc-bin |
CVE-2016-6323 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.10 |
glibc: Missing unwind info in __startcontext causes infinite loop in _Unwind_Backtrace
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6323
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-10-07 14:59 修改: 2023-11-07 02:33
|
libc-bin |
CVE-2017-1000408 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Memory leak reachable via LD_HWCAP_MASK
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000408
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-02-01 04:29 修改: 2019-10-03 00:03
|
libc-bin |
CVE-2017-1000409 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Buffer overflow triggerable via LD_LIBRARY_PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000409
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-02-01 04:29 修改: 2019-04-04 11:29
|
libkrb5-3 |
CVE-2017-11462 |
低危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
python3.4-minimal |
CVE-2018-1060 |
低危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1060
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-18 14:29 修改: 2023-11-07 02:55
|
python3.4-minimal |
CVE-2018-1061 |
低危 |
3.4.3-1ubuntu1~14.04.4 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1061
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-19 12:29 修改: 2023-11-07 02:55
|
libkrb5-3 |
CVE-2018-5729 |
低危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libkrb5-3 |
CVE-2018-5730 |
低危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
libgdk-pixbuf2.0-common |
CVE-2017-6311 |
低危 |
2.30.7-0ubuntu1.6 |
2.30.7-0ubuntu1.7 |
gdk-pixbuf: NULL pointer dereference in gdk-pixbuf-thumbnailer
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6311
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-10 02:59 修改: 2023-11-07 02:49
|
libgdk-pixbuf2.0-common |
CVE-2017-6312 |
低危 |
2.30.7-0ubuntu1.6 |
2.30.7-0ubuntu1.8 |
gdk-pixbuf: Out-of-bounds read in io-ico.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6312
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-10 02:59 修改: 2023-11-07 02:49
|
libgdk-pixbuf2.0-common |
CVE-2017-6313 |
低危 |
2.30.7-0ubuntu1.6 |
2.30.7-0ubuntu1.8 |
gdk-pixbuf: Integer underflow in io-icns.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6313
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-10 02:59 修改: 2023-11-07 02:49
|
libgdk-pixbuf2.0-common |
CVE-2017-6314 |
低危 |
2.30.7-0ubuntu1.6 |
2.30.7-0ubuntu1.8 |
gdk-pixbuf: Infinite loop in io-tiff.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6314
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-10 02:59 修改: 2023-11-07 02:49
|
libc-bin |
CVE-2017-15670 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Buffer overflow in glob with GLOB_TILDE
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15670
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-10-20 17:29 修改: 2018-06-20 01:29
|
libc-bin |
CVE-2017-15804 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Buffer overflow during unescaping of user names with the ~ operator
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15804
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-10-22 20:29 修改: 2023-11-07 02:40
|
libkrb5support0 |
CVE-2017-11462 |
低危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
libkrb5support0 |
CVE-2018-5729 |
低危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libkrb5support0 |
CVE-2018-5730 |
低危 |
1.12+dfsg-2ubuntu5.2 |
1.12+dfsg-2ubuntu5.4 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
libmagic1 |
CVE-2014-9620 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: limit the number of ELF notes processed
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9620
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2015-01-21 18:59 修改: 2018-06-16 01:29
|
libmagic1 |
CVE-2014-9621 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: limit string printing to 100 chars
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9621
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2015-01-21 18:59 修改: 2018-06-16 01:29
|
libmagic1 |
CVE-2014-9653 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: malformed elf file causes access to uninitialized memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9653
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2015-03-30 10:59 修改: 2018-06-16 01:29
|
libmagic1 |
CVE-2015-8865 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: Buffer over-write in finfo_open with malformed magic file
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8865
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-05-20 10:59 修改: 2023-11-07 02:28
|
libmagic1 |
CVE-2018-10360 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: out-of-bounds read via a crafted ELF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10360
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2018-06-11 10:29 修改: 2019-05-02 14:40
|
libc-bin |
CVE-2017-16997 |
低危 |
2.19-0ubuntu6.9 |
2.19-0ubuntu6.14 |
glibc: Incorrect handling of RPATH in elf/dl-load.c can be used to execute code loaded from arbitrary libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16997
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-12-18 01:29 修改: 2020-10-15 13:28
|
busybox-initramfs |
CVE-2016-2148 |
低危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: heap-based buffer overflow in OPTION_6RD parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2148
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-02-09 15:59 修改: 2021-02-22 18:34
|
busybox-initramfs |
CVE-2017-15873 |
低危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: Integer overflow in the get_next_block function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15873
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-10-24 20:29 修改: 2021-02-18 14:43
|
libgnutls-openssl27 |
CVE-2016-8610 |
低危 |
2.12.23-12ubuntu2.5 |
2.12.23-12ubuntu2.6 |
SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8610
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-11-13 22:29 修改: 2024-01-26 17:44
|
tomcat7 |
CVE-2016-5388 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
Tomcat: CGI sets environmental variable based on user supplied Proxy request header
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5388
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-07-19 02:00 修改: 2023-02-12 23:23
|
tomcat7 |
CVE-2016-6794 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: system property disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6794
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 16:29 修改: 2023-12-08 16:41
|
tomcat7 |
CVE-2016-6796 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: security manager bypass via JSP Servlet config parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6796
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-11 02:29 修改: 2023-12-08 16:41
|
tomcat7 |
CVE-2016-6797 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: unrestricted access to global resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6797
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 22:29 修改: 2023-12-08 16:41
|
tomcat7 |
CVE-2018-8014 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8014
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-05-16 16:29 修改: 2023-12-08 16:41
|
tomcat7 |
CVE-2018-8034 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.15 |
tomcat: Host name verification missing in WebSocket client
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8034
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-01 18:29 修改: 2024-10-21 16:35
|
libgnutls-openssl27 |
CVE-2017-7869 |
低危 |
2.12.23-12ubuntu2.5 |
2.12.23-12ubuntu2.8 |
gnutls: Out-of-bounds write related to the cdk_pkt_read function (GNUTLS-SA-2017-3)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7869
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2017-04-14 04:59 修改: 2018-01-05 02:31
|
isc-dhcp-client |
CVE-2016-2774 |
低危 |
4.2.4-7ubuntu12.6 |
4.2.4-7ubuntu12.12 |
dhcp: unclosed TCP connections to OMAPI or failover ports can cause DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2774
镜像层: sha256:78ff13900d615402568a24175b5ff1d7582c12f3ba4903f99a73752c6d5f597e
发布日期: 2016-03-09 15:59 修改: 2020-01-08 17:17
|
libtiff5 |
CVE-2015-8668 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: OOB read in bmp2tiff
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8668
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-01-08 19:59 修改: 2023-12-20 18:28
|
libtiff5 |
CVE-2016-10266 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Divide-by-zero in tif_read.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10266
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-24 19:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2016-10267 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Divide-by-zero in tif_ojpeg.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10267
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-24 19:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2016-10268 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Integer underflow in tiffcp.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10268
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-24 19:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2016-10269 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Heap-based buffer overflow in tiff_unix.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10269
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-24 19:59 修改: 2020-10-16 21:15
|
libtiff5 |
CVE-2016-10272 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Heap-based buffer overflow in tif_next.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10272
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-03-24 19:59 修改: 2017-03-31 01:59
|
libtiff5 |
CVE-2016-10371 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.8 |
libtiff: Assertion failure in TIFFWriteDirectoryTagCheckedRational
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10371
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-05-10 05:29 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2016-3622 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: Division by zero in fpAcc function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3622
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-03 16:09 修改: 2017-11-04 01:29
|
libtiff5 |
CVE-2016-3623 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: divide by zero in the rgb2ycybr tool
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3623
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-03 16:09 修改: 2018-10-30 16:27
|
libtiff5 |
CVE-2016-3658 |
低危 |
4.0.3-7ubuntu0.4 |
4.0.3-7ubuntu0.6 |
libtiff: out-of-bounds read in the TIFFWriteDirectoryTagLongLong8Array function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3658
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-10-03 16:09 修改: 2018-10-30 16:27
|
openjdk-7-jdk |
CVE-2016-10165 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.1 |
lcms2: Out-of-bounds read in Type_MLU_Read()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10165
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-02-03 19:59 修改: 2024-01-10 18:26
|
openjdk-7-jdk |
CVE-2016-2183 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2183
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-09-01 00:59 修改: 2023-02-12 23:17
|
openjdk-7-jdk |
CVE-2017-10053 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: reading of unprocessed image data in JPEGImageReader (2D, 8169209)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10053
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-06-27 17:32
|
openjdk-7-jdk |
CVE-2017-10081 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: incorrect bracket processing in function signature handling (Hotspot, 8170966)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10081
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-06-27 17:35
|
openjdk-7-jdk |
CVE-2017-10108 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: unbounded memory allocation in BasicAttribute deserialization (Serialization, 8174105)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10108
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
tomcat7-common |
CVE-2016-5388 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
Tomcat: CGI sets environmental variable based on user supplied Proxy request header
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5388
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2016-07-19 02:00 修改: 2023-02-12 23:23
|
tomcat7-common |
CVE-2016-6794 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: system property disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6794
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 16:29 修改: 2023-12-08 16:41
|
tomcat7-common |
CVE-2016-6796 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: security manager bypass via JSP Servlet config parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6796
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-11 02:29 修改: 2023-12-08 16:41
|
tomcat7-common |
CVE-2016-6797 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.8 |
tomcat: unrestricted access to global resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6797
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-10 22:29 修改: 2023-12-08 16:41
|
tomcat7-common |
CVE-2018-8014 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.14 |
tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8014
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-05-16 16:29 修改: 2023-12-08 16:41
|
tomcat7-common |
CVE-2018-8034 |
低危 |
7.0.52-1ubuntu0.7 |
7.0.52-1ubuntu0.15 |
tomcat: Host name verification missing in WebSocket client
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8034
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2018-08-01 18:29 修改: 2024-10-21 16:35
|
openjdk-7-jdk |
CVE-2017-10109 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: unbounded memory allocation in CodeSource deserialization (Serialization, 8174113)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10109
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 19:02
|
openjdk-7-jdk |
CVE-2017-10243 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u151-2.6.11-0ubuntu1.14.04.1 |
OpenJDK: insecure XML parsing in wsdlimport (JAX-WS, 8182054)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10243
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-08-08 15:29 修改: 2022-10-06 18:59
|
openjdk-7-jdk |
CVE-2017-3231 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: URLClassLoader insufficient access control checks (Networking, 8151934)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3231
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|
openjdk-7-jdk |
CVE-2017-3261 |
低危 |
7u111-2.6.7-0ubuntu0.14.04.3 |
7u121-2.6.8-1ubuntu0.14.04.3 |
OpenJDK: integer overflow in SocketOutputStream boundary check (Networking, 8164147)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3261
镜像层: sha256:5ee52271b8b7932d0d2ce5f999140e16e2f994defd51fe2ff1cdd00367a896a7
发布日期: 2017-01-27 22:59 修改: 2018-01-05 02:31
|