| curl | CVE-2023-38546 | 高危 | 7.61.1-33.el8 | 7.61.1-33.el8_9.5 | curl: cookie injection with none file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15 | 
                            
                            
                                | kernel-headers | CVE-2024-38586 | 高危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38586 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-06-19 14:15 修改: 2024-07-05 08:15 | 
                            
                            
                                | kernel-headers | CVE-2024-40961 | 高危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: ipv6: prevent possible NULL deref in fib6_nh_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40961 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-12 13:15 修改: 2024-08-21 16:54 | 
                            
                            
                                | krb5-libs | CVE-2024-3596 | 高危 | 1.18.2-26.el8 | 1.18.2-30.el8_10 | freeradius: forgery attack 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3596 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-09 12:15 修改: 2024-12-30 19:23 | 
                            
                            
                                | libcurl-minimal | CVE-2023-38546 | 高危 | 7.61.1-33.el8 | 7.61.1-33.el8_9.5 | curl: cookie injection with none file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15 | 
                            
                            
                                | libsoup | CVE-2024-52530 | 高危 | 2.62.3-5.el8 | 2.62.3-6.el8_10 | libsoup: HTTP request smuggling via stripping null bytes from the ends of header names 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52530 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-11-11 20:15 修改: 2024-11-12 19:35 | 
                            
                            
                                | libsoup | CVE-2024-52532 | 高危 | 2.62.3-5.el8 | 2.62.3-6.el8_10 | libsoup: infinite loop while reading websocket data 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52532 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-11-11 20:15 修改: 2024-11-12 19:35 | 
                            
                            
                                | pam | CVE-2024-10041 | 高危 | 1.3.1-27.el8 | 1.3.1-36.el8_10 | pam: libpam: Libpam vulnerable to read hashed password 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15 | 
                            
                            
                                | pam | CVE-2024-10963 | 高危 | 1.3.1-27.el8 | 1.3.1-36.el8_10 | pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15 | 
                            
                            
                                | platform-python-setuptools | CVE-2024-6345 | 高危 | 39.2.0-7.el8 | 39.2.0-8.el8_10 | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | python3-setuptools | CVE-2024-6345 | 高危 | 39.2.0-7.el8 | 39.2.0-8.el8_10 | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | python3-setuptools-wheel | CVE-2024-6345 | 高危 | 39.2.0-7.el8 | 39.2.0-8.el8_10 | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | kernel-headers | CVE-2022-48773 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48773 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-16 12:15 修改: 2024-08-21 17:45 | 
                            
                            
                                | kernel-headers | CVE-2022-48936 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: gso: do not skip outer ip header in case of ipip and net_failover 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48936 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-08-22 04:15 修改: 2024-08-31 06:15 | 
                            
                            
                                | kernel-headers | CVE-2023-52492 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: dmaengine: fix NULL pointer in channel unregistration function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52492 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-03-11 18:15 修改: 2024-11-06 19:35 | 
                            
                            
                                | kernel-headers | CVE-2024-24857 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24857 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-02-05 08:15 修改: 2024-06-27 12:15 | 
                            
                            
                                | kernel-headers | CVE-2024-26851 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26851 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15 | 
                            
                            
                                | kernel-headers | CVE-2024-26924 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: netfilter: nft_set_pipapo: do not free live element 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26924 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-04-25 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | kernel-headers | CVE-2024-26976 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26976 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | kernel-headers | CVE-2024-27017 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27017 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-05-01 06:15 修改: 2024-10-17 14:15 | 
                            
                            
                                | kernel-headers | CVE-2024-27043 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.30.1.el8_10 | kernel: media: edia: dvbdev: fix a use-after-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27043 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-05-01 13:15 修改: 2024-12-23 19:13 | 
                            
                            
                                | kernel-headers | CVE-2024-27062 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: nouveau: lock the client object tree. 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27062 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-05-01 13:15 修改: 2024-11-05 17:35 | 
                            
                            
                                | kernel-headers | CVE-2024-27399 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.30.1.el8_10 | kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27399 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-05-14 15:12 修改: 2024-11-05 10:16 | 
                            
                            
                                | kernel-headers | CVE-2024-35839 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35839 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-05-17 15:15 修改: 2024-05-17 18:35 | 
                            
                            
                                | kernel-headers | CVE-2024-35898 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35898 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-05-19 09:15 修改: 2024-11-05 10:16 | 
                            
                            
                                | kernel-headers | CVE-2024-35939 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: dma-direct: Leak pages on dma_set_decrypted() failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35939 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00 | 
                            
                            
                                | kernel-headers | CVE-2024-38540 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38540 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-06-19 14:15 修改: 2024-11-14 16:15 | 
                            
                            
                                | kernel-headers | CVE-2024-38541 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: of: module: add buffer overflow check in of_modalias() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38541 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-06-19 14:15 修改: 2024-07-03 02:05 | 
                            
                            
                                | kernel-headers | CVE-2024-38564 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.30.1.el8_10 | kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38564 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-06-19 14:15 修改: 2024-06-20 12:44 | 
                            
                            
                                | kernel-headers | CVE-2024-38608 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: net/mlx5e: Fix netif state handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38608 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-06-19 14:15 修改: 2024-08-27 15:58 | 
                            
                            
                                | kernel-headers | CVE-2024-39503 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39503 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | kernel-headers | CVE-2024-40924 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: drm/i915/dpt: Make DPT object unshrinkable 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40924 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | kernel-headers | CVE-2024-40983 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: tipc: force a dst refcount before doing decryption 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40983 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | kernel-headers | CVE-2024-40984 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40984 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34 | 
                            
                            
                                | kernel-headers | CVE-2024-41009 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: bpf: Fix overrunning reservations in ringbuf 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41009 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-17 07:15 修改: 2024-07-29 07:15 | 
                            
                            
                                | kernel-headers | CVE-2024-41042 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: netfilter: nf_tables: prefer nft_chain_validate 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41042 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-29 15:15 修改: 2024-08-19 05:15 | 
                            
                            
                                | kernel-headers | CVE-2024-41066 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: ibmvnic: Add tx check to prevent skb leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41066 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-29 15:15 修改: 2024-09-10 17:06 | 
                            
                            
                                | kernel-headers | CVE-2024-41092 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41092 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-29 16:15 修改: 2024-08-08 17:51 | 
                            
                            
                                | kernel-headers | CVE-2024-41093 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: drm/amdgpu: avoid using null object of framebuffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41093 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-29 16:15 修改: 2024-08-08 17:40 | 
                            
                            
                                | kernel-headers | CVE-2024-42070 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42070 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:01 | 
                            
                            
                                | kernel-headers | CVE-2024-42079 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42079 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-07-29 16:15 修改: 2024-07-30 18:58 | 
                            
                            
                                | kernel-headers | CVE-2024-42244 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: USB: serial: mos7840: fix crash on resume 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42244 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:53 | 
                            
                            
                                | kernel-headers | CVE-2024-42284 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42284 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-08-17 09:15 修改: 2024-08-19 19:47 | 
                            
                            
                                | kernel-headers | CVE-2024-42292 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: kobject_uevent: Fix OOB access within zap_modalias_env() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42292 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59 | 
                            
                            
                                | kernel-headers | CVE-2024-42301 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: dev/parport: fix the array out-of-bounds risk 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42301 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-08-17 09:15 修改: 2024-08-22 16:31 | 
                            
                            
                                | kernel-headers | CVE-2024-43854 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: block: initialize integrity buffer to zero before writing it to media 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43854 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-08-17 10:15 修改: 2024-09-12 12:15 | 
                            
                            
                                | kernel-headers | CVE-2024-43880 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43880 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-08-21 01:15 修改: 2024-08-21 12:30 | 
                            
                            
                                | kernel-headers | CVE-2024-43889 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43889 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-08-26 11:15 修改: 2024-08-27 14:38 | 
                            
                            
                                | kernel-headers | CVE-2024-43892 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: memcg: protect concurrent access to mem_cgroup_idr 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43892 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-08-26 11:15 修改: 2024-09-12 12:15 | 
                            
                            
                                | kernel-headers | CVE-2024-44935 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44935 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-08-26 11:15 修改: 2024-08-27 16:09 | 
                            
                            
                                | kernel-headers | CVE-2024-44989 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: bonding: fix xfrm real_dev null pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44989 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:31 | 
                            
                            
                                | kernel-headers | CVE-2024-44990 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44990 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:31 | 
                            
                            
                                | kernel-headers | CVE-2024-45018 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: netfilter: flowtable: initialise extack before use 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45018 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:36 | 
                            
                            
                                | kernel-headers | CVE-2024-46695 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.32.1.el8_10 | kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46695 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-09-13 06:15 修改: 2024-10-17 14:15 | 
                            
                            
                                | kernel-headers | CVE-2024-46826 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: ELF: fix kernel.randomize_va_space double read 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46826 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-09-27 13:15 修改: 2024-11-20 17:19 | 
                            
                            
                                | kernel-headers | CVE-2024-46858 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.30.1.el8_10 | kernel: mptcp: pm: Fix uaf in __timer_delete_sync 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46858 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-09-27 13:15 修改: 2024-12-27 13:15 | 
                            
                            
                                | kernel-headers | CVE-2024-47668 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.27.1.el8_10 | kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47668 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-10-09 15:15 修改: 2024-10-23 15:30 | 
                            
                            
                                | kernel-headers | CVE-2024-49949 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.32.1.el8_10 | kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49949 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-10-21 18:15 修改: 2024-11-12 21:03 | 
                            
                            
                                | kernel-headers | CVE-2024-50082 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.32.1.el8_10 | kernel: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50082 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-10-29 01:15 修改: 2024-11-08 16:15 | 
                            
                            
                                | kernel-headers | CVE-2024-50099 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.32.1.el8_10 | kernel: arm64: probes: Remove broken LDR (literal) uprobe support 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50099 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-11-05 18:15 修改: 2024-11-12 16:28 | 
                            
                            
                                | kernel-headers | CVE-2024-50110 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.32.1.el8_10 | kernel: xfrm: fix one more kernel-infoleak in algo dumping 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50110 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-11-05 18:15 修改: 2024-11-08 21:05 | 
                            
                            
                                | kernel-headers | CVE-2024-50142 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.32.1.el8_10 | kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50142 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-11-07 10:15 修改: 2024-11-22 16:47 | 
                            
                            
                                | kernel-headers | CVE-2024-50192 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.32.1.el8_10 | kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50192 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-11-08 06:15 修改: 2024-11-29 19:00 | 
                            
                            
                                | kernel-headers | CVE-2024-50256 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.32.1.el8_10 | kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50256 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-11-09 11:15 修改: 2024-11-14 18:11 | 
                            
                            
                                | kernel-headers | CVE-2024-50264 | 中危 | 4.18.0-553.16.1.el8_10 | 4.18.0-553.32.1.el8_10 | kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50264 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-11-19 02:16 修改: 2024-12-11 15:15 | 
                            
                            
                                | expat | CVE-2023-52425 | 中危 | 2.2.5-11.el8 | 2.2.5-11.el8_9.1 | expat: parsing large tokens can trigger a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-02-04 20:15 修改: 2024-08-26 20:35 | 
                            
                            
                                | less | CVE-2022-48624 | 中危 | 530-1.el8 | 530-2.el8_9 | less: missing quoting of shell metacharacters in LESSCLOSE handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48624 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-02-19 01:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | expat | CVE-2024-45490 | 中危 | 2.2.5-11.el8 | 2.2.5-15.el8_10 | libexpat: Negative Length Parsing Vulnerability in libexpat 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24 | 
                            
                            
                                | libcurl-minimal | CVE-2023-28322 | 中危 | 7.61.1-33.el8 | 7.61.1-33.el8_9.5 | curl: more POST-after-PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15 | 
                            
                            
                                | libcurl-minimal | CVE-2023-46218 | 中危 | 7.61.1-33.el8 | 7.61.1-33.el8_9.5 | curl: information disclosure by exploiting a mixed case flaw 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15 | 
                            
                            
                                | expat | CVE-2024-45491 | 中危 | 2.2.5-11.el8 | 2.2.5-15.el8_10 | libexpat: Integer Overflow or Wraparound 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28 | 
                            
                            
                                | expat | CVE-2024-45492 | 中危 | 2.2.5-11.el8 | 2.2.5-15.el8_10 | libexpat: integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28 | 
                            
                            
                                | libxml2 | CVE-2024-25062 | 中危 | 2.9.7-16.el8_8.1 | 2.9.7-18.el8_10.1 | libxml2: use-after-free in XMLReader 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25062 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-02-04 16:15 修改: 2024-02-13 00:40 | 
                            
                            
                                | expat | CVE-2024-50602 | 中危 | 2.2.5-11.el8 | 2.2.5-16.el8_10 | libexpat: expat: DoS via XML_ResumeParser 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-10-27 05:15 修改: 2024-10-30 18:35 | 
                            
                            
                                | gnutls | CVE-2023-5981 | 中危 | 3.6.16-7.el8 | 3.6.16-8.el8_9 | gnutls: timing side-channel in the RSA-PSK authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2023-11-28 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | pam | CVE-2024-22365 | 中危 | 1.3.1-27.el8 | 1.3.1-33.el8 | pam: allowing unprivileged user to block another user namespace 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27 | 
                            
                            
                                | platform-python | CVE-2024-11168 | 中危 | 3.6.8-67.el8_10.rocky.0 | 3.6.8-69.el8_10.rocky.0 | python: Improper validation of IPv6 and IPvFuture addresses 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-11-12 22:15 修改: 2024-12-03 21:15 | 
                            
                            
                                | platform-python | CVE-2024-9287 | 中危 | 3.6.8-67.el8_10.rocky.0 | 3.6.8-69.el8_10.rocky.0 | python: Virtual environment (venv) activation scripts don't quote paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15 | 
                            
                            
                                | platform-python-devel | CVE-2024-11168 | 中危 | 3.6.8-67.el8_10.rocky.0 | 3.6.8-69.el8_10.rocky.0 | python: Improper validation of IPv6 and IPvFuture addresses 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-11-12 22:15 修改: 2024-12-03 21:15 | 
                            
                            
                                | platform-python-devel | CVE-2024-9287 | 中危 | 3.6.8-67.el8_10.rocky.0 | 3.6.8-69.el8_10.rocky.0 | python: Virtual environment (venv) activation scripts don't quote paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15 | 
                            
                            
                                | gnutls | CVE-2024-28834 | 中危 | 3.6.16-7.el8 | 3.6.16-8.el8_9.3 | gnutls: vulnerable to Minerva side-channel information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28834 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-03-21 14:15 修改: 2024-11-21 21:15 | 
                            
                            
                                | python3-libs | CVE-2024-11168 | 中危 | 3.6.8-67.el8_10.rocky.0 | 3.6.8-69.el8_10.rocky.0 | python: Improper validation of IPv6 and IPvFuture addresses 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-11-12 22:15 修改: 2024-12-03 21:15 | 
                            
                            
                                | python3-libs | CVE-2024-9287 | 中危 | 3.6.8-67.el8_10.rocky.0 | 3.6.8-69.el8_10.rocky.0 | python: Virtual environment (venv) activation scripts don't quote paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15 | 
                            
                            
                                | curl | CVE-2023-28322 | 中危 | 7.61.1-33.el8 | 7.61.1-33.el8_9.5 | curl: more POST-after-PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15 | 
                            
                            
                                | curl | CVE-2023-46218 | 中危 | 7.61.1-33.el8 | 7.61.1-33.el8_9.5 | curl: information disclosure by exploiting a mixed case flaw 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15 | 
                            
                            
                                | python3.11 | CVE-2024-9287 | 中危 | 3.11.10-1.el8_10 | 3.11.11-1.el8_10 | python: Virtual environment (venv) activation scripts don't quote paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15 | 
                            
                            
                                | python3.11-libs | CVE-2024-9287 | 中危 | 3.11.10-1.el8_10 | 3.11.11-1.el8_10 | python: Virtual environment (venv) activation scripts don't quote paths 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15 | 
                            
                            
                                | sqlite-libs | CVE-2023-7104 | 中危 | 3.26.0-18.el8_8 | 3.26.0-19.el8_9 | sqlite: heap-buffer-overflow at sessionfuzz 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7104 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2023-12-29 10:15 修改: 2024-05-17 02:34 | 
                            
                            
                                | krb5-libs | CVE-2024-26458 | 低危 | 1.18.2-26.el8 | 1.18.2-27.el8_10 | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15 | 
                            
                            
                                | openssl | CVE-2024-5535 | 低危 | 1:1.1.1k-12.el8_9 | 1:1.1.1k-14.el8_10 | openssl: SSL_select_next_proto buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15 | 
                            
                            
                                | openssl-libs | CVE-2024-5535 | 低危 | 1:1.1.1k-12.el8_9 | 1:1.1.1k-14.el8_10 | openssl: SSL_select_next_proto buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15 | 
                            
                            
                                | krb5-libs | CVE-2024-26461 | 低危 | 1.18.2-26.el8 | 1.18.2-27.el8_10 | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | binutils | CVE-2018-12699 | 低危 | 2.30-123.el8 | 2.30-125.el8_10 | binutils: heap-based buffer overflow in finish_stab in stabs.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12699 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15 | 
                            
                            
                                | bzip2-libs | CVE-2019-12900 | 低危 | 1.0.6-26.el8 | 1.0.6-27.el8_10 | bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail). 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12900 镜像层: sha256:4fc62b090abd2f7a5f84480ef04f4d1a6c0cf09986fcb13acb1b7124ae8d6490 发布日期: 2019-06-19 23:15 修改: 2023-11-07 03:03 |