libexpat |
CVE-2024-45491 |
严重 |
2.5.0-r2 |
2.6.3-r0 |
libexpat: Integer Overflow or Wraparound
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28
|
libexpat |
CVE-2024-45492 |
严重 |
2.5.0-r2 |
2.6.3-r0 |
libexpat: integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28
|
giflib |
CVE-2021-40633 |
高危 |
5.2.1-r5 |
5.2.2-r0 |
A memory leak (out-of-memory) in gif2rgb in util/gif2rgb.c in giflib 5 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40633
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2022-06-14 11:15 修改: 2022-06-23 14:20
|
giflib |
CVE-2023-48161 |
高危 |
5.2.1-r5 |
5.2.2-r0 |
giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48161
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2023-11-22 06:15 修改: 2023-11-29 18:48
|
libexpat |
CVE-2023-52425 |
高危 |
2.5.0-r2 |
2.6.0-r0 |
expat: parsing large tokens can trigger a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-02-04 20:15 修改: 2024-08-26 20:35
|
libexpat |
CVE-2024-28757 |
高危 |
2.5.0-r2 |
2.6.2-r0 |
expat: XML Entity Expansion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28757
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-03-10 05:15 修改: 2024-05-01 19:15
|
libexpat |
CVE-2024-45490 |
高危 |
2.5.0-r2 |
2.6.3-r0 |
libexpat: Negative Length Parsing Vulnerability in libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24
|
openjdk8-jre |
CVE-2024-20918 |
高危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20918
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-01-16 22:15 修改: 2024-02-15 03:18
|
openjdk8-jre |
CVE-2024-20952 |
高危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20952
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-01-16 22:15 修改: 2024-08-30 16:35
|
openjdk8-jre-base |
CVE-2024-20918 |
高危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20918
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-01-16 22:15 修改: 2024-02-15 03:18
|
openjdk8-jre-base |
CVE-2024-20952 |
高危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20952
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-01-16 22:15 修改: 2024-08-30 16:35
|
openjdk8-jre-lib |
CVE-2024-20918 |
高危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20918
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-01-16 22:15 修改: 2024-02-15 03:18
|
openjdk8-jre-lib |
CVE-2024-20952 |
高危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20952
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-01-16 22:15 修改: 2024-08-30 16:35
|
libcrypto3 |
CVE-2024-0727 |
中危 |
3.1.4-r2 |
3.1.4-r5 |
openssl: denial of service via null dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15
|
libcrypto3 |
CVE-2024-4603 |
中危 |
3.1.4-r2 |
3.1.5-r0 |
openssl: Excessive time spent checking DSA keys and parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4603
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-05-16 16:15 修改: 2024-10-14 15:15
|
libcrypto3 |
CVE-2024-4741 |
中危 |
3.1.4-r2 |
3.1.6-r0 |
openssl: Use After Free with SSL_free_buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libcrypto3 |
CVE-2024-5535 |
中危 |
3.1.4-r2 |
3.1.6-r0 |
openssl: SSL_select_next_proto buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15
|
libcrypto3 |
CVE-2024-6119 |
中危 |
3.1.4-r2 |
3.1.7-r0 |
openssl: Possible denial of service in X.509 name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35
|
busybox |
CVE-2023-42365 |
中危 |
1.36.1-r15 |
1.36.1-r19 |
busybox: use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42365
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2023-11-27 23:15 修改: 2023-11-30 05:08
|
busybox |
CVE-2023-42366 |
中危 |
1.36.1-r15 |
1.36.1-r16 |
busybox: A heap-buffer-overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42366
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2023-11-27 23:15 修改: 2023-11-30 05:08
|
busybox-binsh |
CVE-2023-42363 |
中危 |
1.36.1-r15 |
1.36.1-r17 |
busybox: use-after-free in awk
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42363
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2023-11-27 22:15 修改: 2023-11-30 05:06
|
busybox-binsh |
CVE-2023-42364 |
中危 |
1.36.1-r15 |
1.36.1-r19 |
busybox: use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42364
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2023-11-27 23:15 修改: 2024-10-11 21:36
|
busybox-binsh |
CVE-2023-42365 |
中危 |
1.36.1-r15 |
1.36.1-r19 |
busybox: use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42365
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2023-11-27 23:15 修改: 2023-11-30 05:08
|
libexpat |
CVE-2023-52426 |
中危 |
2.5.0-r2 |
2.6.0-r0 |
expat: recursive XML entity expansion vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52426
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-02-04 20:15 修改: 2024-03-07 17:15
|
libssl3 |
CVE-2023-6129 |
中危 |
3.1.4-r2 |
3.1.4-r3 |
mysql: openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6129
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-01-09 17:15 修改: 2024-10-14 15:15
|
libssl3 |
CVE-2023-6237 |
中危 |
3.1.4-r2 |
3.1.4-r4 |
openssl: Excessive time spent checking invalid RSA public keys
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6237
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-04-25 07:15 修改: 2024-11-01 15:35
|
libssl3 |
CVE-2024-0727 |
中危 |
3.1.4-r2 |
3.1.4-r5 |
openssl: denial of service via null dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15
|
libssl3 |
CVE-2024-4603 |
中危 |
3.1.4-r2 |
3.1.5-r0 |
openssl: Excessive time spent checking DSA keys and parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4603
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-05-16 16:15 修改: 2024-10-14 15:15
|
libssl3 |
CVE-2024-4741 |
中危 |
3.1.4-r2 |
3.1.6-r0 |
openssl: Use After Free with SSL_free_buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libssl3 |
CVE-2024-5535 |
中危 |
3.1.4-r2 |
3.1.6-r0 |
openssl: SSL_select_next_proto buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15
|
libssl3 |
CVE-2024-6119 |
中危 |
3.1.4-r2 |
3.1.7-r0 |
openssl: Possible denial of service in X.509 name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35
|
nss |
CVE-2023-5388 |
中危 |
3.94-r0 |
3.98-r0 |
nss: timing attack against RSA decryption
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5388
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-03-19 12:15 修改: 2024-03-25 17:15
|
busybox-binsh |
CVE-2023-42366 |
中危 |
1.36.1-r15 |
1.36.1-r16 |
busybox: A heap-buffer-overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42366
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2023-11-27 23:15 修改: 2023-11-30 05:08
|
busybox |
CVE-2023-42363 |
中危 |
1.36.1-r15 |
1.36.1-r17 |
busybox: use-after-free in awk
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42363
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2023-11-27 22:15 修改: 2023-11-30 05:06
|
openjdk8-jre |
CVE-2024-20919 |
中危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20919
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-02-17 02:15 修改: 2024-02-20 19:51
|
openjdk8-jre |
CVE-2024-20921 |
中危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: range check loop optimization issue (8314307)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20921
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-02-17 02:15 修改: 2024-11-05 16:35
|
openjdk8-jre |
CVE-2024-20926 |
中危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: arbitrary Java code execution in Nashorn (8314284)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20926
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-01-16 22:15 修改: 2024-02-02 17:35
|
openjdk8-jre |
CVE-2024-20945 |
中危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: logging of digital signature private keys (8316976)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20945
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-02-17 02:15 修改: 2024-02-20 19:51
|
busybox |
CVE-2023-42364 |
中危 |
1.36.1-r15 |
1.36.1-r19 |
busybox: use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42364
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2023-11-27 23:15 修改: 2024-10-11 21:36
|
giflib |
CVE-2023-39742 |
中危 |
5.2.1-r5 |
5.2.2-r0 |
giflib: segfault via getarg.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39742
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2023-08-25 14:15 修改: 2023-11-07 04:17
|
openjdk8-jre-base |
CVE-2024-20919 |
中危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20919
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-02-17 02:15 修改: 2024-02-20 19:51
|
openjdk8-jre-base |
CVE-2024-20921 |
中危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: range check loop optimization issue (8314307)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20921
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-02-17 02:15 修改: 2024-11-05 16:35
|
openjdk8-jre-base |
CVE-2024-20926 |
中危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: arbitrary Java code execution in Nashorn (8314284)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20926
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-01-16 22:15 修改: 2024-02-02 17:35
|
openjdk8-jre-base |
CVE-2024-20945 |
中危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: logging of digital signature private keys (8316976)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20945
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-02-17 02:15 修改: 2024-02-20 19:51
|
libcrypto3 |
CVE-2023-6129 |
中危 |
3.1.4-r2 |
3.1.4-r3 |
mysql: openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6129
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-01-09 17:15 修改: 2024-10-14 15:15
|
libcrypto3 |
CVE-2023-6237 |
中危 |
3.1.4-r2 |
3.1.4-r4 |
openssl: Excessive time spent checking invalid RSA public keys
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6237
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-04-25 07:15 修改: 2024-11-01 15:35
|
openjdk8-jre-lib |
CVE-2024-20919 |
中危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20919
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-02-17 02:15 修改: 2024-02-20 19:51
|
openjdk8-jre-lib |
CVE-2024-20921 |
中危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: range check loop optimization issue (8314307)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20921
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-02-17 02:15 修改: 2024-11-05 16:35
|
openjdk8-jre-lib |
CVE-2024-20926 |
中危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: arbitrary Java code execution in Nashorn (8314284)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20926
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-01-16 22:15 修改: 2024-02-02 17:35
|
openjdk8-jre-lib |
CVE-2024-20945 |
中危 |
8.392.08-r1 |
8.402.06-r0 |
OpenJDK: logging of digital signature private keys (8316976)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-20945
镜像层: sha256:607f3f1bbd5b91af0e57b89fa1d22194e0d87e3d11496eb224229ab661eeba30
发布日期: 2024-02-17 02:15 修改: 2024-02-20 19:51
|
ssl_client |
CVE-2023-42363 |
中危 |
1.36.1-r15 |
1.36.1-r17 |
busybox: use-after-free in awk
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42363
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2023-11-27 22:15 修改: 2023-11-30 05:06
|
ssl_client |
CVE-2023-42364 |
中危 |
1.36.1-r15 |
1.36.1-r19 |
busybox: use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42364
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2023-11-27 23:15 修改: 2024-10-11 21:36
|
ssl_client |
CVE-2023-42365 |
中危 |
1.36.1-r15 |
1.36.1-r19 |
busybox: use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42365
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2023-11-27 23:15 修改: 2023-11-30 05:08
|
ssl_client |
CVE-2023-42366 |
中危 |
1.36.1-r15 |
1.36.1-r16 |
busybox: A heap-buffer-overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42366
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2023-11-27 23:15 修改: 2023-11-30 05:08
|
libssl3 |
CVE-2024-9143 |
低危 |
3.1.4-r2 |
3.1.7-r1 |
openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-10-16 17:15 修改: 2024-10-18 12:53
|
libcrypto3 |
CVE-2024-9143 |
低危 |
3.1.4-r2 |
3.1.7-r1 |
openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-10-16 17:15 修改: 2024-10-18 12:53
|
libcrypto3 |
CVE-2024-2511 |
低危 |
3.1.4-r2 |
3.1.4-r6 |
openssl: Unbounded memory growth with session handling in TLSv1.3
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15
|
libssl3 |
CVE-2024-2511 |
低危 |
3.1.4-r2 |
3.1.4-r6 |
openssl: Unbounded memory growth with session handling in TLSv1.3
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511
镜像层: sha256:3ce819cc49704a39ce4614b73a325ad6efff50e1754005a2a8f17834071027dc
发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15
|