apt |
CVE-2019-3462 |
高危 |
1.0.1ubuntu2.17 |
1.0.1ubuntu2.19 |
Incorrect sanitation of the 302 redirect field in HTTP transport metho ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3462
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2019-01-28 21:29 修改: 2023-11-07 03:09
|
apt-utils |
CVE-2019-3462 |
高危 |
1.0.1ubuntu2.17 |
1.0.1ubuntu2.19 |
Incorrect sanitation of the 302 redirect field in HTTP transport metho ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3462
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2019-01-28 21:29 修改: 2023-11-07 03:09
|
libapt-inst1.5 |
CVE-2019-3462 |
高危 |
1.0.1ubuntu2.17 |
1.0.1ubuntu2.19 |
Incorrect sanitation of the 302 redirect field in HTTP transport metho ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3462
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2019-01-28 21:29 修改: 2023-11-07 03:09
|
libapt-pkg4.12 |
CVE-2019-3462 |
高危 |
1.0.1ubuntu2.17 |
1.0.1ubuntu2.19 |
Incorrect sanitation of the 302 redirect field in HTTP transport metho ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3462
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2019-01-28 21:29 修改: 2023-11-07 03:09
|
busybox-initramfs |
CVE-2018-1000517 |
中危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: wget: Heap-based buffer overflow in the retrieve_file_data() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000517
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-26 16:29 修改: 2021-02-18 14:41
|
busybox-initramfs |
CVE-2019-5747 |
中危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: Out of bounds read in udhcp components resulting in information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5747
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2019-01-09 16:29 修改: 2022-10-29 02:30
|
curl |
CVE-2018-1000301 |
中危 |
7.35.0-1ubuntu2.15 |
7.35.0-1ubuntu2.16 |
curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000301
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-05-24 13:29 修改: 2019-10-03 00:03
|
curl |
CVE-2018-14618 |
中危 |
7.35.0-1ubuntu2.15 |
7.35.0-1ubuntu2.17 |
curl: NTLM password overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14618
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-09-05 19:29 修改: 2019-04-22 17:48
|
curl |
CVE-2018-16839 |
中危 |
7.35.0-1ubuntu2.15 |
7.35.0-1ubuntu2.19 |
curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16839
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-10-31 18:29 修改: 2023-11-07 02:53
|
curl |
CVE-2018-16842 |
中危 |
7.35.0-1ubuntu2.15 |
7.35.0-1ubuntu2.19 |
curl: Heap-based buffer over-read in the curl tool warning formatting
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16842
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-10-31 19:29 修改: 2019-08-06 17:15
|
gnupg |
CVE-2017-7526 |
中危 |
1.4.16-1ubuntu2.4 |
1.4.16-1ubuntu2.6 |
libgcrypt: Use of left-to-right sliding window method allows full RSA key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7526
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-07-26 13:29 修改: 2023-11-07 02:50
|
gnupg |
CVE-2018-12020 |
中危 |
1.4.16-1ubuntu2.4 |
1.4.16-1ubuntu2.5 |
gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12020
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-08 21:29 修改: 2022-04-18 17:30
|
gpgv |
CVE-2017-7526 |
中危 |
1.4.16-1ubuntu2.4 |
1.4.16-1ubuntu2.6 |
libgcrypt: Use of left-to-right sliding window method allows full RSA key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7526
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-07-26 13:29 修改: 2023-11-07 02:50
|
gpgv |
CVE-2018-12020 |
中危 |
1.4.16-1ubuntu2.4 |
1.4.16-1ubuntu2.5 |
gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12020
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-08 21:29 修改: 2022-04-18 17:30
|
krb5-locales |
CVE-2015-8629 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: xdr_nullstring() doesn't check for terminating null character
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8629
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:24
|
krb5-locales |
CVE-2015-8630 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8630
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2020-01-21 15:47
|
krb5-locales |
CVE-2015-8631 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Memory leak caused by supplying a null principal name in request
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8631
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:15
|
krb5-locales |
CVE-2016-3119 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
krb5-locales |
CVE-2016-3120 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
krb5-locales |
CVE-2017-11368 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
busybox-initramfs |
CVE-2015-9261 |
中危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: Segmentation fault when unzipping specially crafted zip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-9261
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-07-26 19:29 修改: 2022-10-29 02:30
|
busybox-initramfs |
CVE-2017-16544 |
中危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: Insufficient sanitization of filenames when autocompleting
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16544
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2017-11-20 15:29 修改: 2022-10-28 19:29
|
libcurl3 |
CVE-2018-1000301 |
中危 |
7.35.0-1ubuntu2.15 |
7.35.0-1ubuntu2.16 |
curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000301
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-05-24 13:29 修改: 2019-10-03 00:03
|
libcurl3 |
CVE-2018-14618 |
中危 |
7.35.0-1ubuntu2.15 |
7.35.0-1ubuntu2.17 |
curl: NTLM password overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14618
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-09-05 19:29 修改: 2019-04-22 17:48
|
libcurl3 |
CVE-2018-16839 |
中危 |
7.35.0-1ubuntu2.15 |
7.35.0-1ubuntu2.19 |
curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16839
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-10-31 18:29 修改: 2023-11-07 02:53
|
libcurl3 |
CVE-2018-16842 |
中危 |
7.35.0-1ubuntu2.15 |
7.35.0-1ubuntu2.19 |
curl: Heap-based buffer over-read in the curl tool warning formatting
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16842
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-10-31 19:29 修改: 2019-08-06 17:15
|
libgd3 |
CVE-2018-1000222 |
中危 |
2.1.0-3ubuntu0.8 |
2.1.0-3ubuntu0.10 |
gd: Double free in src/gd_bump.c:gdImageBmpPtr() via crafted JPEG
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000222
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-08-20 20:29 修改: 2023-11-07 02:51
|
libgd3 |
CVE-2019-6977 |
中危 |
2.1.0-3ubuntu0.8 |
2.1.0-3ubuntu0.11 |
gd: Heap-based buffer overflow in gdImageColorMatch() in gd_color_match.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6977
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2019-01-27 02:29 修改: 2023-11-07 03:13
|
libglib2.0-0 |
CVE-2018-16428 |
中危 |
2.40.2-0ubuntu1 |
2.40.2-0ubuntu1.1 |
glib2: NULL pointer dereference in g_markup_parse_context_end_parse() function in gmarkup.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16428
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-09-04 00:29 修改: 2019-07-31 21:15
|
libglib2.0-0 |
CVE-2018-16429 |
中危 |
2.40.2-0ubuntu1 |
2.40.2-0ubuntu1.1 |
glib2: Out-of-bounds read in g_markup_parse_context_parse() in gmarkup.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16429
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-09-04 00:29 修改: 2023-11-07 02:53
|
libglib2.0-data |
CVE-2018-16428 |
中危 |
2.40.2-0ubuntu1 |
2.40.2-0ubuntu1.1 |
glib2: NULL pointer dereference in g_markup_parse_context_end_parse() function in gmarkup.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16428
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-09-04 00:29 修改: 2019-07-31 21:15
|
libglib2.0-data |
CVE-2018-16429 |
中危 |
2.40.2-0ubuntu1 |
2.40.2-0ubuntu1.1 |
glib2: Out-of-bounds read in g_markup_parse_context_parse() in gmarkup.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16429
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-09-04 00:29 修改: 2023-11-07 02:53
|
libgssapi-krb5-2 |
CVE-2015-8629 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: xdr_nullstring() doesn't check for terminating null character
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8629
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:24
|
libgssapi-krb5-2 |
CVE-2015-8630 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8630
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2020-01-21 15:47
|
libgssapi-krb5-2 |
CVE-2015-8631 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Memory leak caused by supplying a null principal name in request
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8631
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:15
|
libgssapi-krb5-2 |
CVE-2016-3119 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libgssapi-krb5-2 |
CVE-2016-3120 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
libgssapi-krb5-2 |
CVE-2017-11368 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
libk5crypto3 |
CVE-2015-8629 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: xdr_nullstring() doesn't check for terminating null character
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8629
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:24
|
libk5crypto3 |
CVE-2015-8630 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8630
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2020-01-21 15:47
|
libk5crypto3 |
CVE-2015-8631 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Memory leak caused by supplying a null principal name in request
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8631
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:15
|
libk5crypto3 |
CVE-2016-3119 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libk5crypto3 |
CVE-2016-3120 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
libk5crypto3 |
CVE-2017-11368 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
libkrb5-3 |
CVE-2015-8629 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: xdr_nullstring() doesn't check for terminating null character
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8629
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:24
|
libkrb5-3 |
CVE-2015-8630 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8630
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2020-01-21 15:47
|
libkrb5-3 |
CVE-2015-8631 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Memory leak caused by supplying a null principal name in request
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8631
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:15
|
libkrb5-3 |
CVE-2016-3119 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libkrb5-3 |
CVE-2016-3120 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
libkrb5-3 |
CVE-2017-11368 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
libkrb5support0 |
CVE-2015-8629 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: xdr_nullstring() doesn't check for terminating null character
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8629
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:24
|
libkrb5support0 |
CVE-2015-8630 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: krb5 doesn't check for null policy when KADM5_POLICY is set in the mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8630
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2020-01-21 15:47
|
libkrb5support0 |
CVE-2015-8631 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Memory leak caused by supplying a null principal name in request
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8631
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-02-13 02:59 修改: 2021-02-02 19:15
|
libkrb5support0 |
CVE-2016-3119 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libkrb5support0 |
CVE-2016-3120 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
libkrb5support0 |
CVE-2017-11368 |
中危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
libperl5.18 |
CVE-2018-12015 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.6 |
perl: Directory traversal in Archive::Tar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12015
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-06-07 13:29 修改: 2020-08-24 17:37
|
libperl5.18 |
CVE-2018-18311 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.7 |
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18311
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
libperl5.18 |
CVE-2018-18313 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.7 |
perl: Heap-based buffer read overflow in S_grok_bslash_N()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18313
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
libperl5.18 |
CVE-2018-6913 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl: heap buffer overflow in pp_pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6913
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
libprocps3 |
CVE-2018-1122 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: Local privilege escalation in top
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1122
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-05-23 14:29 修改: 2019-10-03 00:03
|
libprocps3 |
CVE-2018-1123 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: denial of service in ps via mmap buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1123
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-05-23 14:29 修改: 2023-11-07 02:55
|
libprocps3 |
CVE-2018-1124 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: Integer overflows leading to heap overflow in file2strvec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1124
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-05-23 13:29 修改: 2020-09-09 14:58
|
libprocps3 |
CVE-2018-1125 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: stack buffer overflow in pgrep
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1125
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-05-23 14:29 修改: 2020-09-09 14:59
|
libprocps3 |
CVE-2018-1126 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1126
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-05-23 13:29 修改: 2019-07-30 13:15
|
libpython3.4-minimal |
CVE-2018-1000802 |
中危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: Command injection in the shutil module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000802
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-09-18 17:29 修改: 2023-11-07 02:51
|
libpython3.4-minimal |
CVE-2018-14647 |
中危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: Missing salt initialization in _elementtree.c module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14647
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-09-25 00:29 修改: 2023-11-07 02:53
|
libpython3.4-stdlib |
CVE-2018-1000802 |
中危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: Command injection in the shutil module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000802
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-09-18 17:29 修改: 2023-11-07 02:51
|
libpython3.4-stdlib |
CVE-2018-14647 |
中危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: Missing salt initialization in _elementtree.c module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14647
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-09-25 00:29 修改: 2023-11-07 02:53
|
libtiff5 |
CVE-2018-17100 |
中危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.10 |
libtiff: Integer overflow in multiply_ms in tools/ppm2tiff.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17100
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-09-16 21:29 修改: 2019-03-21 16:00
|
libtiff5 |
CVE-2018-17101 |
中危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.10 |
libtiff: Two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17101
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-09-16 21:29 修改: 2019-03-21 16:00
|
libtiff5 |
CVE-2018-18557 |
中危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.10 |
libtiff: Out-of-bounds write in tif_jbig.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18557
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-10-22 16:29 修改: 2021-03-05 18:15
|
libtiff5 |
CVE-2019-7663 |
中危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.11 |
libtiff: integer overflow in libtiff/tif_dirwrite.c resulting in an invalid pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7663
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2019-02-09 16:29 修改: 2020-08-24 17:37
|
libtiffxx5 |
CVE-2018-17100 |
中危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.10 |
libtiff: Integer overflow in multiply_ms in tools/ppm2tiff.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17100
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-09-16 21:29 修改: 2019-03-21 16:00
|
libtiffxx5 |
CVE-2018-17101 |
中危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.10 |
libtiff: Two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17101
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-09-16 21:29 修改: 2019-03-21 16:00
|
libtiffxx5 |
CVE-2018-18557 |
中危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.10 |
libtiff: Out-of-bounds write in tif_jbig.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18557
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-10-22 16:29 修改: 2021-03-05 18:15
|
libtiffxx5 |
CVE-2019-7663 |
中危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.11 |
libtiff: integer overflow in libtiff/tif_dirwrite.c resulting in an invalid pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7663
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2019-02-09 16:29 修改: 2020-08-24 17:37
|
libudev1 |
CVE-2019-3842 |
中危 |
204-5ubuntu20.26 |
204-5ubuntu20.31 |
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3842
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2019-04-09 21:29 修改: 2023-11-07 03:10
|
libx11-6 |
CVE-2018-14598 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Crash on invalid reply in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14598
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-6 |
CVE-2018-14599 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Off-by-one error in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14599
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-6 |
CVE-2018-14600 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Out of Bounds write in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14600
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-08-24 19:29 修改: 2019-08-06 17:15
|
libx11-data |
CVE-2018-14598 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Crash on invalid reply in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14598
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-data |
CVE-2018-14599 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Off-by-one error in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14599
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-data |
CVE-2018-14600 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Out of Bounds write in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14600
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-08-24 19:29 修改: 2019-08-06 17:15
|
libx11-doc |
CVE-2018-14598 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Crash on invalid reply in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14598
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-doc |
CVE-2018-14599 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Off-by-one error in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14599
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-doc |
CVE-2018-14600 |
中危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Out of Bounds write in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14600
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-08-24 19:29 修改: 2019-08-06 17:15
|
libxml2 |
CVE-2018-14404 |
中危 |
2.9.1+dfsg1-3ubuntu4.12 |
2.9.1+dfsg1-3ubuntu4.13 |
libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14404
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-07-19 13:29 修改: 2020-09-10 01:15
|
libxml2 |
CVE-2018-14567 |
中危 |
2.9.1+dfsg1-3ubuntu4.12 |
2.9.1+dfsg1-3ubuntu4.13 |
libxml2: Infinite loop caused by incorrect error detection during LZMA decompression
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14567
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-08-16 20:29 修改: 2020-09-10 01:15
|
libxslt1.1 |
CVE-2019-11068 |
中危 |
1.1.28-2ubuntu0.1 |
1.1.28-2ubuntu0.2 |
libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11068
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2019-04-10 20:29 修改: 2023-11-07 03:02
|
ntpdate |
CVE-2018-7183 |
中危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.12 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.13 |
ntp: decodearr() can write beyond its buffer limit
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7183
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-03-08 20:29 修改: 2021-07-20 23:15
|
perl |
CVE-2018-12015 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.6 |
perl: Directory traversal in Archive::Tar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12015
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-07 13:29 修改: 2020-08-24 17:37
|
perl |
CVE-2018-18311 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.7 |
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18311
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl |
CVE-2018-18313 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.7 |
perl: Heap-based buffer read overflow in S_grok_bslash_N()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18313
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl |
CVE-2018-6913 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl: heap buffer overflow in pp_pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6913
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
perl-base |
CVE-2018-12015 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.6 |
perl: Directory traversal in Archive::Tar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12015
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-07 13:29 修改: 2020-08-24 17:37
|
perl-base |
CVE-2018-18311 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.7 |
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18311
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl-base |
CVE-2018-18313 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.7 |
perl: Heap-based buffer read overflow in S_grok_bslash_N()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18313
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl-base |
CVE-2018-6913 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl: heap buffer overflow in pp_pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6913
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
perl-modules |
CVE-2018-12015 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.6 |
perl: Directory traversal in Archive::Tar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12015
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-07 13:29 修改: 2020-08-24 17:37
|
perl-modules |
CVE-2018-18311 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.7 |
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18311
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl-modules |
CVE-2018-18313 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.7 |
perl: Heap-based buffer read overflow in S_grok_bslash_N()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18313
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl-modules |
CVE-2018-6913 |
中危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl: heap buffer overflow in pp_pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6913
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
procps |
CVE-2018-1122 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: Local privilege escalation in top
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1122
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-05-23 14:29 修改: 2019-10-03 00:03
|
procps |
CVE-2018-1123 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: denial of service in ps via mmap buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1123
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-05-23 14:29 修改: 2023-11-07 02:55
|
procps |
CVE-2018-1124 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: Integer overflows leading to heap overflow in file2strvec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1124
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-05-23 13:29 修改: 2020-09-09 14:58
|
procps |
CVE-2018-1125 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: stack buffer overflow in pgrep
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1125
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-05-23 14:29 修改: 2020-09-09 14:59
|
procps |
CVE-2018-1126 |
中危 |
1:3.3.9-1ubuntu2.2 |
1:3.3.9-1ubuntu2.3 |
procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1126
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-05-23 13:29 修改: 2019-07-30 13:15
|
python3.4 |
CVE-2018-1000802 |
中危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: Command injection in the shutil module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000802
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-09-18 17:29 修改: 2023-11-07 02:51
|
python3.4 |
CVE-2018-14647 |
中危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: Missing salt initialization in _elementtree.c module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14647
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-09-25 00:29 修改: 2023-11-07 02:53
|
python3.4-minimal |
CVE-2018-1000802 |
中危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: Command injection in the shutil module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000802
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-09-18 17:29 修改: 2023-11-07 02:51
|
python3.4-minimal |
CVE-2018-14647 |
中危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: Missing salt initialization in _elementtree.c module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14647
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-09-25 00:29 修改: 2023-11-07 02:53
|
udev |
CVE-2019-3842 |
中危 |
204-5ubuntu20.26 |
204-5ubuntu20.31 |
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3842
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2019-04-09 21:29 修改: 2023-11-07 03:10
|
wget |
CVE-2018-0494 |
中危 |
1.15-1ubuntu1.14.04.3 |
1.15-1ubuntu1.14.04.4 |
wget: Cookie injection allows malicious website to write arbitrary cookie entries into cookie jar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0494
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-05-06 22:29 修改: 2019-03-15 01:22
|
wget |
CVE-2019-5953 |
中危 |
1.15-1ubuntu1.14.04.3 |
1.15-1ubuntu1.14.04.5 |
wget: do_conversion() heap-based buffer overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5953
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2019-05-17 16:29 修改: 2020-08-24 17:37
|
busybox-initramfs |
CVE-2011-5325 |
低危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: Path traversal via crafted tar file containing symlink
漏洞详情: https://avd.aquasec.com/nvd/cve-2011-5325
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2017-08-07 17:29 修改: 2021-02-19 15:57
|
busybox-initramfs |
CVE-2014-9645 |
低危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: unprivileged arbitrary module load via basename abuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9645
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2017-03-12 06:59 修改: 2019-04-03 15:29
|
libpython3.4-stdlib |
CVE-2018-1060 |
低危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1060
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-18 14:29 修改: 2023-11-07 02:55
|
libpython3.4-stdlib |
CVE-2018-1061 |
低危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1061
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-19 12:29 修改: 2023-11-07 02:55
|
libsqlite3-0 |
CVE-2018-8740 |
低危 |
3.8.2-1ubuntu2.1 |
3.8.2-1ubuntu2.2 |
sqlite: NULL pointer dereference with databases with schema corrupted with CREATE TABLE AS allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8740
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-03-17 00:29 修改: 2023-11-07 03:01
|
libssl-doc |
CVE-2018-0495 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.26 |
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51
|
libssl-doc |
CVE-2018-0732 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.26 |
openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0732
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-06-12 13:29 修改: 2023-11-07 02:51
|
libssl-doc |
CVE-2018-0734 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.27 |
openssl: timing side channel attack in the DSA signature algorithm
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0734
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-10-30 12:29 修改: 2023-11-07 02:51
|
libssl-doc |
CVE-2018-0737 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.26 |
openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0737
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-04-16 18:29 修改: 2023-11-07 02:51
|
libssl-doc |
CVE-2018-5407 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.27 |
openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5407
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-11-15 21:29 修改: 2023-11-07 02:58
|
libssl1.0.0 |
CVE-2018-0495 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.26 |
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-0732 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.26 |
openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0732
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-12 13:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-0734 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.27 |
openssl: timing side channel attack in the DSA signature algorithm
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0734
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-10-30 12:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-0737 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.26 |
openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0737
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-04-16 18:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-5407 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.27 |
openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5407
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-11-15 21:29 修改: 2023-11-07 02:58
|
libcurl3 |
CVE-2019-3823 |
低危 |
7.35.0-1ubuntu2.15 |
7.35.0-1ubuntu2.20 |
curl: SMTP end-of-response out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3823
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
libgcrypt11 |
CVE-2018-0495 |
低危 |
1.5.3-2ubuntu4.5 |
1.5.3-2ubuntu4.6 |
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51
|
busybox-initramfs |
CVE-2016-2147 |
低危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: out of bounds write (heap) due to integer underflow in udhcpc
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2147
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2017-02-09 15:59 修改: 2021-02-18 14:46
|
libk5crypto3 |
CVE-2017-11462 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
libtiff5 |
CVE-2018-10779 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.11 |
libtiff: heap-based buffer over-read in TIFFWriteScanline function in tif_write.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10779
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-05-07 07:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2018-10963 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.10 |
libtiff: reachable assertion in TIFFWriteDirectorySec function in tif_dirwrite.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10963
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-05-10 02:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2018-12900 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.11 |
libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12900
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-06-26 22:29 修改: 2021-03-05 19:15
|
libtiff5 |
CVE-2018-17000 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.11 |
libtiff: NULL pointer dereference in function _TIFFmemcmp at tif_unix.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17000
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-09-13 16:29 修改: 2019-04-05 21:29
|
libtiff5 |
CVE-2018-18661 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.10 |
libtiff: tiff2bw tool failed memory allocation leads to crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18661
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-10-26 14:29 修改: 2019-08-06 17:15
|
libtiff5 |
CVE-2018-19210 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.11 |
libtiff: NULL pointer dereference in TIFFWriteDirectorySec function in tif_dirwrite.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19210
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-11-12 19:29 修改: 2023-11-07 02:55
|
libtiff5 |
CVE-2018-7456 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.10 |
libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7456
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-02-24 06:29 修改: 2021-01-29 20:15
|
libtiff5 |
CVE-2018-8905 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.10 |
libtiff: heap-based buffer overflow in tif_lzw.c:LZWDecodeCompat() allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8905
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-03-22 04:29 修改: 2023-03-01 17:13
|
libtiff5 |
CVE-2019-6128 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.11 |
libtiff: memory leak in TIFFFdOpen function in tif_unix.c when using pal2rgb
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6128
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2019-01-11 05:29 修改: 2023-03-01 18:41
|
libk5crypto3 |
CVE-2018-5729 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libk5crypto3 |
CVE-2018-5730 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
busybox-initramfs |
CVE-2016-2148 |
低危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: heap-based buffer overflow in OPTION_6RD parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2148
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2017-02-09 15:59 修改: 2021-02-22 18:34
|
libgd3 |
CVE-2018-5711 |
低危 |
2.1.0-3ubuntu0.8 |
2.1.0-3ubuntu0.10 |
gd: Infinite loop in gdImageCreateFromGifCtx() in gd_gif_in.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5711
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58
|
libtiffxx5 |
CVE-2018-10779 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.11 |
libtiff: heap-based buffer over-read in TIFFWriteScanline function in tif_write.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10779
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-05-07 07:29 修改: 2019-10-03 00:03
|
libtiffxx5 |
CVE-2018-10963 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.10 |
libtiff: reachable assertion in TIFFWriteDirectorySec function in tif_dirwrite.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10963
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-05-10 02:29 修改: 2019-10-03 00:03
|
libtiffxx5 |
CVE-2018-12900 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.11 |
libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12900
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-06-26 22:29 修改: 2021-03-05 19:15
|
libtiffxx5 |
CVE-2018-17000 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.11 |
libtiff: NULL pointer dereference in function _TIFFmemcmp at tif_unix.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17000
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-09-13 16:29 修改: 2019-04-05 21:29
|
libtiffxx5 |
CVE-2018-18661 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.10 |
libtiff: tiff2bw tool failed memory allocation leads to crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18661
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-10-26 14:29 修改: 2019-08-06 17:15
|
libtiffxx5 |
CVE-2018-19210 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.11 |
libtiff: NULL pointer dereference in TIFFWriteDirectorySec function in tif_dirwrite.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19210
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-11-12 19:29 修改: 2023-11-07 02:55
|
libtiffxx5 |
CVE-2018-7456 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.10 |
libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7456
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-02-24 06:29 修改: 2021-01-29 20:15
|
libtiffxx5 |
CVE-2018-8905 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.10 |
libtiff: heap-based buffer overflow in tif_lzw.c:LZWDecodeCompat() allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8905
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-03-22 04:29 修改: 2023-03-01 17:13
|
libtiffxx5 |
CVE-2019-6128 |
低危 |
4.0.3-7ubuntu0.9 |
4.0.3-7ubuntu0.11 |
libtiff: memory leak in TIFFFdOpen function in tif_unix.c when using pal2rgb
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6128
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2019-01-11 05:29 修改: 2023-03-01 18:41
|
libgd3 |
CVE-2019-6978 |
低危 |
2.1.0-3ubuntu0.8 |
2.1.0-3ubuntu0.11 |
gd: Double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6978
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2019-01-28 08:29 修改: 2023-11-07 03:13
|
curl |
CVE-2019-3823 |
低危 |
7.35.0-1ubuntu2.15 |
7.35.0-1ubuntu2.20 |
curl: SMTP end-of-response out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3823
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
file |
CVE-2014-9620 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: limit the number of ELF notes processed
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9620
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2015-01-21 18:59 修改: 2018-06-16 01:29
|
file |
CVE-2014-9621 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: limit string printing to 100 chars
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9621
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2015-01-21 18:59 修改: 2018-06-16 01:29
|
libx11-6 |
CVE-2016-7942 |
低危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Insufficient validation of server responses in XGetImage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7942
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libx11-6 |
CVE-2016-7943 |
低危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Insufficient validation of server responses in FontNames
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7943
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libkrb5-3 |
CVE-2017-11462 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
libkrb5-3 |
CVE-2018-5729 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libkrb5-3 |
CVE-2018-5730 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
libx11-data |
CVE-2016-7942 |
低危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Insufficient validation of server responses in XGetImage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7942
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libx11-data |
CVE-2016-7943 |
低危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Insufficient validation of server responses in FontNames
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7943
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
file |
CVE-2014-9653 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: malformed elf file causes access to uninitialized memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9653
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2015-03-30 10:59 修改: 2018-06-16 01:29
|
krb5-locales |
CVE-2017-11462 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
krb5-locales |
CVE-2018-5729 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libx11-doc |
CVE-2016-7942 |
低危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Insufficient validation of server responses in XGetImage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7942
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libx11-doc |
CVE-2016-7943 |
低危 |
2:1.6.2-1ubuntu2 |
2:1.6.2-1ubuntu2.1 |
libX11: Insufficient validation of server responses in FontNames
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7943
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
krb5-locales |
CVE-2018-5730 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
file |
CVE-2015-8865 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: Buffer over-write in finfo_open with malformed magic file
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8865
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2016-05-20 10:59 修改: 2023-11-07 02:28
|
libxml2 |
CVE-2016-9318 |
低危 |
2.9.1+dfsg1-3ubuntu4.12 |
2.9.1+dfsg1-3ubuntu4.13 |
libxml2: XML External Entity vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9318
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-11-16 00:59 修改: 2022-04-08 23:15
|
libxml2 |
CVE-2017-18258 |
低危 |
2.9.1+dfsg1-3ubuntu4.12 |
2.9.1+dfsg1-3ubuntu4.13 |
libxml2: Unrestricted memory usage in xz_head() function in xzlib.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18258
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-04-08 17:29 修改: 2020-09-10 01:15
|
file |
CVE-2018-10360 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: out-of-bounds read via a crafted ELF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10360
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-11 10:29 修改: 2019-05-02 14:40
|
libkrb5support0 |
CVE-2017-11462 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
ntpdate |
CVE-2018-7185 |
低危 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.12 |
1:4.2.6.p5+dfsg-3ubuntu2.14.04.13 |
ntp: Unauthenticated packet can reset authenticated interleaved association
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7185
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-03-06 20:29 修改: 2020-08-24 17:37
|
openssl |
CVE-2018-0495 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.26 |
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-0732 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.26 |
openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0732
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-06-12 13:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-0734 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.27 |
openssl: timing side channel attack in the DSA signature algorithm
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0734
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-10-30 12:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-0737 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.26 |
openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0737
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-04-16 18:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-5407 |
低危 |
1.0.1f-1ubuntu2.24 |
1.0.1f-1ubuntu2.27 |
openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5407
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-11-15 21:29 修改: 2023-11-07 02:58
|
libkrb5support0 |
CVE-2018-5729 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libkrb5support0 |
CVE-2018-5730 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
libmagic1 |
CVE-2014-9620 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: limit the number of ELF notes processed
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9620
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2015-01-21 18:59 修改: 2018-06-16 01:29
|
libmagic1 |
CVE-2014-9621 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: limit string printing to 100 chars
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9621
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2015-01-21 18:59 修改: 2018-06-16 01:29
|
perl |
CVE-2015-8853 |
低危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl: regexp matching hangs indefinitely on illegal UTF-8 input
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8853
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2016-05-25 15:59 修改: 2018-05-02 01:29
|
perl |
CVE-2016-6185 |
低危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl: XSLoader loads relative paths not included in @INC
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6185
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2016-08-02 14:59 修改: 2023-11-07 02:33
|
perl |
CVE-2017-6512 |
低危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl-File-Path: rmtree/remove_tree race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6512
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2017-06-01 16:29 修改: 2020-04-29 20:24
|
libmagic1 |
CVE-2014-9653 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: malformed elf file causes access to uninitialized memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9653
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2015-03-30 10:59 修改: 2018-06-16 01:29
|
libmagic1 |
CVE-2015-8865 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: Buffer over-write in finfo_open with malformed magic file
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8865
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2016-05-20 10:59 修改: 2023-11-07 02:28
|
libmagic1 |
CVE-2018-10360 |
低危 |
1:5.14-2ubuntu3.3 |
1:5.14-2ubuntu3.4 |
file: out-of-bounds read via a crafted ELF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10360
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-11 10:29 修改: 2019-05-02 14:40
|
busybox-initramfs |
CVE-2017-15873 |
低危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: Integer overflow in the get_next_block function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15873
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2017-10-24 20:29 修改: 2021-02-18 14:43
|
perl-base |
CVE-2015-8853 |
低危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl: regexp matching hangs indefinitely on illegal UTF-8 input
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8853
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2016-05-25 15:59 修改: 2018-05-02 01:29
|
perl-base |
CVE-2016-6185 |
低危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl: XSLoader loads relative paths not included in @INC
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6185
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2016-08-02 14:59 修改: 2023-11-07 02:33
|
perl-base |
CVE-2017-6512 |
低危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl-File-Path: rmtree/remove_tree race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6512
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2017-06-01 16:29 修改: 2020-04-29 20:24
|
libgssapi-krb5-2 |
CVE-2017-11462 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
libgssapi-krb5-2 |
CVE-2018-5729 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libgssapi-krb5-2 |
CVE-2018-5730 |
低危 |
1.12+dfsg-2ubuntu5.3 |
1.12+dfsg-2ubuntu5.4 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
libperl5.18 |
CVE-2015-8853 |
低危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl: regexp matching hangs indefinitely on illegal UTF-8 input
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8853
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-05-25 15:59 修改: 2018-05-02 01:29
|
perl-modules |
CVE-2015-8853 |
低危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl: regexp matching hangs indefinitely on illegal UTF-8 input
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8853
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2016-05-25 15:59 修改: 2018-05-02 01:29
|
perl-modules |
CVE-2016-6185 |
低危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl: XSLoader loads relative paths not included in @INC
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6185
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2016-08-02 14:59 修改: 2023-11-07 02:33
|
perl-modules |
CVE-2017-6512 |
低危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl-File-Path: rmtree/remove_tree race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6512
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2017-06-01 16:29 修改: 2020-04-29 20:24
|
libperl5.18 |
CVE-2016-6185 |
低危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl: XSLoader loads relative paths not included in @INC
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6185
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2016-08-02 14:59 修改: 2023-11-07 02:33
|
libperl5.18 |
CVE-2017-6512 |
低危 |
5.18.2-2ubuntu1.3 |
5.18.2-2ubuntu1.4 |
perl-File-Path: rmtree/remove_tree race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6512
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2017-06-01 16:29 修改: 2020-04-29 20:24
|
libpng12-0 |
CVE-2016-10087 |
低危 |
1.2.50-1ubuntu2.14.04.2 |
1.2.50-1ubuntu2.14.04.3 |
libpng: NULL pointer dereference in png_set_text_2()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10087
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2017-01-30 22:59 修改: 2023-11-07 02:29
|
libjpeg-turbo8 |
CVE-2014-9092 |
低危 |
1.3.0-0ubuntu2 |
1.3.0-0ubuntu2.1 |
libjpeg-turbo: denial of service via specially-crafted JPEG file
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9092
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2017-10-10 13:29 修改: 2018-07-12 01:29
|
libjpeg-turbo8 |
CVE-2016-3616 |
低危 |
1.3.0-0ubuntu2 |
1.3.0-0ubuntu2.1 |
libjpeg: null pointer dereference in cjpeg
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3616
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2017-02-13 18:59 修改: 2019-08-06 17:15
|
libjpeg-turbo8 |
CVE-2018-11212 |
低危 |
1.3.0-0ubuntu2 |
1.3.0-0ubuntu2.1 |
libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11212
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-05-16 17:29 修改: 2022-04-20 00:15
|
libjpeg-turbo8 |
CVE-2018-11213 |
低危 |
1.3.0-0ubuntu2 |
1.3.0-0ubuntu2.1 |
libjpeg: Segmentation fault in get_text_gray_row function in rdppm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11213
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-05-16 17:29 修改: 2019-10-03 00:03
|
python3.4 |
CVE-2018-1060 |
低危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1060
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-18 14:29 修改: 2023-11-07 02:55
|
python3.4 |
CVE-2018-1061 |
低危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1061
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-19 12:29 修改: 2023-11-07 02:55
|
libjpeg-turbo8 |
CVE-2018-11214 |
低危 |
1.3.0-0ubuntu2 |
1.3.0-0ubuntu2.1 |
libjpeg: Segmentation fault in get_text_rgb_row function in rdppm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11214
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-05-16 17:29 修改: 2019-10-03 00:03
|
libjpeg-turbo8 |
CVE-2018-1152 |
低危 |
1.3.0-0ubuntu2 |
1.3.0-0ubuntu2.1 |
libjpeg-turbo: Divide by zero allows for denial of service via crafted BMP image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1152
镜像层: sha256:9a95b1936f7e1cc2424bdd670852aad2f9dd7401c63fc48e345a884e4bb73498
发布日期: 2018-06-18 14:29 修改: 2020-07-31 21:15
|
python3.4-minimal |
CVE-2018-1060 |
低危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1060
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-18 14:29 修改: 2023-11-07 02:55
|
python3.4-minimal |
CVE-2018-1061 |
低危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1061
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-19 12:29 修改: 2023-11-07 02:55
|
busybox-initramfs |
CVE-2018-20679 |
低危 |
1:1.21.0-1ubuntu1 |
1:1.21.0-1ubuntu1.4 |
busybox: Out of bounds read in udhcp components resulting in information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20679
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2019-01-09 16:29 修改: 2019-09-04 23:15
|
libpython3.4-minimal |
CVE-2018-1060 |
低危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1060
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-18 14:29 修改: 2023-11-07 02:55
|
libpython3.4-minimal |
CVE-2018-1061 |
低危 |
3.4.3-1ubuntu1~14.04.6 |
3.4.3-1ubuntu1~14.04.7 |
python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1061
镜像层: sha256:187107f7c00ed031ec24864d2c3166b8b88cfa237ca2cc93bef921327b8332b9
发布日期: 2018-06-19 12:29 修改: 2023-11-07 02:55
|