| expat |
CVE-2023-52425 |
高危 |
2.5.0-1.amzn2023.0.4 |
2.6.3-1.amzn2023.0.1 |
expat: parsing large tokens can trigger a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-02-04 20:15 修改: 2025-11-04 19:16
|
| expat |
CVE-2024-45490 |
高危 |
2.5.0-1.amzn2023.0.4 |
2.6.3-1.amzn2023.0.1 |
libexpat: Negative Length Parsing Vulnerability in libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-08-30 03:15 修改: 2025-11-04 17:16
|
| expat |
CVE-2025-59375 |
高危 |
2.5.0-1.amzn2023.0.4 |
2.6.3-1.amzn2023.0.3 |
expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-59375
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-15 03:15 修改: 2025-11-04 22:16
|
| glib2 |
CVE-2025-13601 |
高危 |
2.74.7-689.amzn2023.0.2 |
2.82.2-767.amzn2023 |
glib: Integer overflow in in g_escape_uri_string()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13601
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-11-26 15:15 修改: 2025-12-01 15:39
|
| glib2 |
CVE-2025-14087 |
高危 |
2.74.7-689.amzn2023.0.2 |
2.82.2-769.amzn2023 |
glib: GLib: Buffer underflow in GVariant parser leads to heap corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14087
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-12-10 09:15 修改: 2025-12-12 15:18
|
| glib2 |
CVE-2025-3360 |
高危 |
2.74.7-689.amzn2023.0.2 |
2.82.2-766.amzn2023 |
glibc: GLib prior to 2.82.5 is vulnerable to integer overflow and buffer under-read when parsing a very long invalid ISO 8601 timestamp with g_date_time_new_from_iso8601().
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3360
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-04-07 13:15 修改: 2025-04-14 12:15
|
| glib2 |
CVE-2025-6052 |
高危 |
2.74.7-689.amzn2023.0.2 |
2.82.2-766.amzn2023 |
glib: Integer overflow in g_string_maybe_expand() leading to potential buffer overflow in GLib GString
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6052
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-13 16:15 修改: 2025-08-20 17:27
|
| glibc |
CVE-2025-4802 |
高危 |
2.34-52.amzn2023.0.11 |
2.34-196.amzn2023.0.1 |
glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4802
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-05-16 20:15 修改: 2025-11-03 20:19
|
| glibc-common |
CVE-2025-4802 |
高危 |
2.34-52.amzn2023.0.11 |
2.34-196.amzn2023.0.1 |
glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4802
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-05-16 20:15 修改: 2025-11-03 20:19
|
| glibc-minimal-langpack |
CVE-2025-4802 |
高危 |
2.34-52.amzn2023.0.11 |
2.34-196.amzn2023.0.1 |
glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4802
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-05-16 20:15 修改: 2025-11-03 20:19
|
| libarchive |
CVE-2024-48957 |
高危 |
3.7.4-2.amzn2023.0.1 |
3.7.4-2.amzn2023.0.2 |
libarchive: Out-of-bounds access in libarchive's archive file handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48957
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-10-10 02:15 修改: 2025-09-29 21:35
|
| libarchive |
CVE-2024-48958 |
高危 |
3.7.4-2.amzn2023.0.1 |
3.7.4-2.amzn2023.0.2 |
libarchive: Out-of-bounds access in libarchive's RAR file handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48958
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-10-10 02:15 修改: 2025-11-03 21:16
|
| libarchive |
CVE-2025-5914 |
高危 |
3.7.4-2.amzn2023.0.1 |
3.7.4-2.amzn2023.0.3 |
libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5914
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-09 20:15 修改: 2026-01-21 15:16
|
| libcap |
CVE-2025-1390 |
高危 |
2.48-2.amzn2023.0.3 |
2.48-2.amzn2023.0.4 |
libcap: pam_cap: Fix potential configuration parsing error
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1390
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-18 03:15 修改: 2025-02-18 03:15
|
| libcap |
CVE-2025-22874 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.3 |
crypto/x509: Usage of ExtKeyUsageAny disables policy validation in crypto/x509
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22874
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-11 17:15 修改: 2025-06-12 16:06
|
| libcap |
CVE-2025-4673 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.3 |
net/http: Sensitive headers not cleared on cross-origin redirect in net/http
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4673
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-11 17:15 修改: 2025-06-12 16:06
|
| libcap |
CVE-2025-47912 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
net/url: Insufficient validation of bracketed IPv6 hostnames in net/url
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47912
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-58183 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
golang: archive/tar: Unbounded allocation when parsing GNU sparse map
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58183
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-58185 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
encoding/asn1: Parsing DER payload can cause memory exhaustion in encoding/asn1
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58185
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-58186 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
golang.org/net/http: Lack of limit when parsing cookies can cause memory exhaustion in net/http
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58186
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-58187 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
crypto/x509: Quadratic complexity when checking name constraints in crypto/x509
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58187
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-20 23:15
|
| libcap |
CVE-2025-58188 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
crypto/x509: golang: Panic when validating certificates with DSA public keys in crypto/x509
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58188
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-58189 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
crypto/tls: go crypto/tls ALPN negotiation error contains attacker controlled information
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58189
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-61723 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
encoding/pem: Quadratic complexity when parsing some invalid inputs in encoding/pem
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61723
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-61724 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
net/textproto: Excessive CPU consumption in Reader.ReadResponse in net/textproto
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61724
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-61725 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
net/mail: Excessive CPU consumption in ParseAddress in net/mail
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61725
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-12-09 18:15
|
| libcap |
CVE-2025-61727 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.5 |
golang: crypto/x509: excluded subdomain constraint does not restrict wildcard SANs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61727
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-12-03 20:16 修改: 2025-12-18 20:15
|
| libcap |
CVE-2025-61729 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.5 |
crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61729
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-12-02 19:15 修改: 2025-12-19 18:25
|
| libpng |
CVE-2025-64505 |
高危 |
2:1.6.37-10.amzn2023.0.6 |
2:1.6.37-10.amzn2023.0.7 |
libpng: LIBPNG heap buffer overflow via malformed palette index
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-64505
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-25 00:15 修改: 2025-11-26 18:28
|
| libpng |
CVE-2025-64506 |
高危 |
2:1.6.37-10.amzn2023.0.6 |
2:1.6.37-10.amzn2023.0.7 |
libpng: LIBPNG heap buffer over-read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-64506
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-25 00:15 修改: 2025-11-26 18:34
|
| libpng |
CVE-2025-64720 |
高危 |
2:1.6.37-10.amzn2023.0.6 |
2:1.6.37-10.amzn2023.0.7 |
libpng: LIBPNG buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-64720
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-25 00:15 修改: 2025-11-26 18:35
|
| libpng |
CVE-2025-65018 |
高危 |
2:1.6.37-10.amzn2023.0.6 |
2:1.6.37-10.amzn2023.0.7 |
libpng: LIBPNG heap buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-65018
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-25 00:15 修改: 2025-11-26 18:34
|
| libpng |
CVE-2025-66293 |
高危 |
2:1.6.37-10.amzn2023.0.6 |
2:1.6.37-10.amzn2023.0.8 |
libpng: LIBPNG out-of-bounds read in png_image_read_composite
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66293
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-12-03 21:15 修改: 2025-12-16 19:12
|
| libxml2 |
CVE-2022-49043 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.8 |
libxml: use-after-free in xmlXIncludeAddNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49043
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-01-26 06:15 修改: 2025-11-03 21:15
|
| libxml2 |
CVE-2024-56171 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.9 |
libxml2: Use-After-Free in libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56171
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-18 22:15 修改: 2025-11-03 21:17
|
| libxml2 |
CVE-2025-24928 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.9 |
libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24928
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-18 23:15 修改: 2025-11-03 22:18
|
| libxml2 |
CVE-2025-27113 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.9 |
libxml2: NULL Pointer Dereference in libxml2 xmlPatMatch
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-27113
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-18 23:15 修改: 2025-11-03 22:18
|
| libxml2 |
CVE-2025-49794 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.12 |
libxml: Heap use after free (UAF) leads to Denial of service (DoS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-49794
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-16 16:15 修改: 2025-11-22 03:15
|
| libxml2 |
CVE-2025-49795 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.12 |
libxml: Null pointer dereference leads to Denial of service (DoS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-49795
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-16 16:15 修改: 2025-10-27 18:15
|
| libxml2 |
CVE-2025-49796 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.12 |
libxml: Type confusion leads to Denial of service (DoS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-49796
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-16 16:15 修改: 2025-11-22 03:15
|
| libxml2 |
CVE-2025-6021 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.11 |
libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6021
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-12 13:15 修改: 2025-11-29 01:16
|
| libxml2 |
CVE-2025-7425 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.13 |
libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7425
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-07-10 14:15 修改: 2025-11-22 03:15
|
| python3 |
CVE-2023-27043 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2023-04-19 00:15 修改: 2025-12-17 22:15
|
| python3 |
CVE-2024-12718 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: python: Bypass extraction filter to modify file metadata outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12718
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-07-24 16:15
|
| python3 |
CVE-2024-6232 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-09-03 13:15 修改: 2025-11-03 23:17
|
| python3 |
CVE-2024-8088 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-08-22 19:15 修改: 2025-11-03 23:17
|
| python3 |
CVE-2025-4138 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4138
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3 |
CVE-2025-4330 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: python: Extraction filter bypass for linking outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4330
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3 |
CVE-2025-4435 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: Tarfile extracts filtered members when errorlevel=0
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4435
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-04 14:54
|
| python3 |
CVE-2025-4516 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.22-1.amzn2023.0.2 |
cpython: python: CPython DecodeError Handling Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4516
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-05-15 14:15 修改: 2025-06-03 14:15
|
| python3 |
CVE-2025-4517 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
python: cpython: Arbitrary writes via tarfile realpath overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4517
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3 |
CVE-2025-8194 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.3 |
cpython: Cpython infinite loop when parsing a tarfile
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8194
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-07-28 19:15 修改: 2025-11-04 22:16
|
| python3-libs |
CVE-2023-27043 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2023-04-19 00:15 修改: 2025-12-17 22:15
|
| python3-libs |
CVE-2024-12718 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: python: Bypass extraction filter to modify file metadata outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12718
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-07-24 16:15
|
| python3-libs |
CVE-2024-6232 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-09-03 13:15 修改: 2025-11-03 23:17
|
| python3-libs |
CVE-2024-8088 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-08-22 19:15 修改: 2025-11-03 23:17
|
| python3-libs |
CVE-2025-4138 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4138
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3-libs |
CVE-2025-4330 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: python: Extraction filter bypass for linking outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4330
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3-libs |
CVE-2025-4435 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: Tarfile extracts filtered members when errorlevel=0
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4435
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-04 14:54
|
| python3-libs |
CVE-2025-4516 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.22-1.amzn2023.0.2 |
cpython: python: CPython DecodeError Handling Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4516
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-05-15 14:15 修改: 2025-06-03 14:15
|
| python3-libs |
CVE-2025-4517 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
python: cpython: Arbitrary writes via tarfile realpath overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4517
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3-libs |
CVE-2025-8194 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.3 |
cpython: Cpython infinite loop when parsing a tarfile
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8194
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-07-28 19:15 修改: 2025-11-04 22:16
|
| python3-setuptools-wheel |
CVE-2025-47273 |
高危 |
59.6.0-2.amzn2023.0.5 |
59.6.0-2.amzn2023.0.6 |
setuptools: Path Traversal Vulnerability in setuptools PackageIndex
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47273
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-05-17 16:15 修改: 2025-06-12 16:29
|
| sqlite-libs |
CVE-2022-46908 |
高危 |
3.40.0-1.amzn2023.0.4 |
3.40.0-1.amzn2023.0.5 |
sqlite: safe mode authorizer callback allows disallowed UDFs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46908
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2022-12-12 06:15 修改: 2025-05-05 16:15
|
| grub2-common |
CVE-2025-0686 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: romfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading dat
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0686
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 18:15 修改: 2025-07-28 17:23
|
| grub2-common |
CVE-2025-0689 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: udf: Heap based buffer overflow in grub_udf_read_block() may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0689
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 15:15 修改: 2026-01-08 04:15
|
| grub2-common |
CVE-2025-0690 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: read: Integer overflow may lead to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0690
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-24 08:15 修改: 2025-05-13 20:15
|
| grub2-common |
CVE-2025-1118 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1118
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-19 18:15 修改: 2025-09-18 09:15
|
| grub2-common |
CVE-2025-1125 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/hfs: Integer overflow may lead to heap based out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1125
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 15:15 修改: 2026-01-08 04:15
|
| grub2-common |
CVE-2025-54770 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Use-after-free in net_set_vlan
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-54770
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| grub2-common |
CVE-2025-54771 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Use-after-free in grub_file_close()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-54771
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| grub2-common |
CVE-2025-61661 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: grub2: Out-of-bounds write via malicious USB device
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61661
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| grub2-common |
CVE-2025-61662 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Missing unregister call for gettext command may lead to use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61662
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2026-01-21 14:16
|
| grub2-common |
CVE-2025-61663 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Missing unregister call for normal commands may lead to use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61663
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| grub2-common |
CVE-2025-61664 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Missing unregister call for normal_exit command may lead to use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61664
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| grub2-tools |
CVE-2024-45774 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: reader/jpeg: Heap OOB Write during JPEG parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45774
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 19:15 修改: 2025-05-13 20:15
|
| grub2-tools |
CVE-2024-45775 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: commands/extcmd: Missing check for failed allocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45775
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-05-13 20:15
|
| grub2-tools |
CVE-2024-45776 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write and Read.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45776
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-09-18 09:15
|
| grub2-tools |
CVE-2024-45777 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45777
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-19 18:15 修改: 2025-11-11 17:15
|
| grub2-tools |
CVE-2024-45778 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/bfs: Integer overflow in the BFS parser.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45778
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 17:15 修改: 2025-03-07 20:42
|
| grub2-tools |
CVE-2024-45779 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/bfs: Integer overflow leads to Heap OOB Read in the BFS parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45779
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 15:15 修改: 2025-03-25 05:15
|
| grub2-tools |
CVE-2024-45780 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/tar: Integer Overflow causes Heap OOB Write
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45780
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 15:15 修改: 2025-03-07 22:14
|
| grub2-tools |
CVE-2024-45781 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/ufs: OOB write in the heap
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45781
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-09-18 09:15
|
| grub2-tools |
CVE-2024-45782 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/hfs: strcpy() using the volume name (fs/hfs.c:382)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45782
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 17:15 修改: 2025-03-25 05:15
|
| grub2-tools |
CVE-2024-45783 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/hfs+: refcount can be decremented twice
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45783
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-05-13 20:15
|
| grub2-tools |
CVE-2024-56737 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.14 |
grub2: heap-based buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56737
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2024-12-29 07:15 修改: 2025-06-24 00:30
|
| grub2-tools |
CVE-2025-0622 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: command/gpg: Use-after-free due to hooks not being removed on module unload
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0622
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-09-18 09:15
|
| grub2-tools |
CVE-2025-0624 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: net: Out-of-bounds write in grub_net_search_config_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0624
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-19 19:15 修改: 2025-05-21 15:16
|
| grub2-tools |
CVE-2025-0677 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0677
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-19 19:15 修改: 2025-09-18 09:15
|
| grub2-tools |
CVE-2025-0678 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: squash4: Integer overflow may lead to heap based out-of-bounds write when reading data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0678
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 17:15 修改: 2025-03-25 05:15
|
| grub2-tools |
CVE-2025-0684 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: reiserfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0684
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 18:15 修改: 2025-07-28 17:22
|
| grub2-tools |
CVE-2025-0685 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: jfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0685
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 18:15 修改: 2025-07-28 17:23
|
| grub2-tools |
CVE-2025-0686 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: romfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading dat
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0686
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 18:15 修改: 2025-07-28 17:23
|
| grub2-tools |
CVE-2025-0689 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: udf: Heap based buffer overflow in grub_udf_read_block() may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0689
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 15:15 修改: 2026-01-08 04:15
|
| grub2-tools |
CVE-2025-0690 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: read: Integer overflow may lead to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0690
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-24 08:15 修改: 2025-05-13 20:15
|
| grub2-tools |
CVE-2025-1118 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1118
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-19 18:15 修改: 2025-09-18 09:15
|
| grub2-tools |
CVE-2025-1125 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/hfs: Integer overflow may lead to heap based out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1125
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 15:15 修改: 2026-01-08 04:15
|
| grub2-tools |
CVE-2025-54770 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Use-after-free in net_set_vlan
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-54770
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| grub2-tools |
CVE-2025-54771 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Use-after-free in grub_file_close()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-54771
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| grub2-tools |
CVE-2025-61661 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: grub2: Out-of-bounds write via malicious USB device
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61661
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| grub2-tools |
CVE-2025-61662 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Missing unregister call for gettext command may lead to use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61662
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2026-01-21 14:16
|
| grub2-tools |
CVE-2025-61663 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Missing unregister call for normal commands may lead to use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61663
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| grub2-tools |
CVE-2025-61664 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Missing unregister call for normal_exit command may lead to use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61664
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| grub2-tools-minimal |
CVE-2024-45774 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: reader/jpeg: Heap OOB Write during JPEG parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45774
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 19:15 修改: 2025-05-13 20:15
|
| grub2-tools-minimal |
CVE-2024-45775 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: commands/extcmd: Missing check for failed allocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45775
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-05-13 20:15
|
| grub2-tools-minimal |
CVE-2024-45776 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write and Read.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45776
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-09-18 09:15
|
| grub2-tools-minimal |
CVE-2024-45777 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45777
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-19 18:15 修改: 2025-11-11 17:15
|
| grub2-tools-minimal |
CVE-2024-45778 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/bfs: Integer overflow in the BFS parser.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45778
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 17:15 修改: 2025-03-07 20:42
|
| grub2-tools-minimal |
CVE-2024-45779 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/bfs: Integer overflow leads to Heap OOB Read in the BFS parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45779
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 15:15 修改: 2025-03-25 05:15
|
| grub2-tools-minimal |
CVE-2024-45780 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/tar: Integer Overflow causes Heap OOB Write
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45780
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 15:15 修改: 2025-03-07 22:14
|
| grub2-tools-minimal |
CVE-2024-45781 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/ufs: OOB write in the heap
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45781
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-09-18 09:15
|
| grub2-tools-minimal |
CVE-2024-45782 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/hfs: strcpy() using the volume name (fs/hfs.c:382)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45782
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 17:15 修改: 2025-03-25 05:15
|
| grub2-tools-minimal |
CVE-2024-45783 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/hfs+: refcount can be decremented twice
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45783
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-05-13 20:15
|
| grub2-tools-minimal |
CVE-2024-56737 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.14 |
grub2: heap-based buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56737
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2024-12-29 07:15 修改: 2025-06-24 00:30
|
| grub2-tools-minimal |
CVE-2025-0622 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: command/gpg: Use-after-free due to hooks not being removed on module unload
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0622
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-09-18 09:15
|
| grub2-tools-minimal |
CVE-2025-0624 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: net: Out-of-bounds write in grub_net_search_config_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0624
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-19 19:15 修改: 2025-05-21 15:16
|
| grub2-tools-minimal |
CVE-2025-0677 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0677
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-19 19:15 修改: 2025-09-18 09:15
|
| grub2-tools-minimal |
CVE-2025-0678 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: squash4: Integer overflow may lead to heap based out-of-bounds write when reading data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0678
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 17:15 修改: 2025-03-25 05:15
|
| grub2-tools-minimal |
CVE-2025-0684 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: reiserfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0684
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 18:15 修改: 2025-07-28 17:22
|
| grub2-tools-minimal |
CVE-2025-0685 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: jfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0685
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 18:15 修改: 2025-07-28 17:23
|
| grub2-tools-minimal |
CVE-2025-0686 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: romfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading dat
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0686
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 18:15 修改: 2025-07-28 17:23
|
| grub2-tools-minimal |
CVE-2025-0689 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: udf: Heap based buffer overflow in grub_udf_read_block() may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0689
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 15:15 修改: 2026-01-08 04:15
|
| grub2-tools-minimal |
CVE-2025-0690 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: read: Integer overflow may lead to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0690
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-24 08:15 修改: 2025-05-13 20:15
|
| grub2-tools-minimal |
CVE-2025-1118 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1118
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-19 18:15 修改: 2025-09-18 09:15
|
| grub2-tools-minimal |
CVE-2025-1125 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/hfs: Integer overflow may lead to heap based out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1125
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 15:15 修改: 2026-01-08 04:15
|
| grub2-tools-minimal |
CVE-2025-54770 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Use-after-free in net_set_vlan
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-54770
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| grub2-tools-minimal |
CVE-2025-54771 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Use-after-free in grub_file_close()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-54771
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| grub2-tools-minimal |
CVE-2025-61661 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: grub2: Out-of-bounds write via malicious USB device
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61661
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| grub2-tools-minimal |
CVE-2025-61662 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Missing unregister call for gettext command may lead to use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61662
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2026-01-21 14:16
|
| grub2-tools-minimal |
CVE-2025-61663 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Missing unregister call for normal commands may lead to use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61663
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| grub2-tools-minimal |
CVE-2025-61664 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.21 |
grub2: Missing unregister call for normal_exit command may lead to use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61664
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-11-18 19:15 修改: 2025-11-19 19:14
|
| harfbuzz |
CVE-2024-56732 |
中危 |
7.0.0-2.amzn2023.0.1 |
7.0.0-2.amzn2023.0.2 |
HarfBuzz is a text shaping engine. Starting with 8.5.0 through 10.0.1, ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56732
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2024-12-27 20:15 修改: 2024-12-28 17:15
|
| krb5-libs |
CVE-2025-24528 |
中危 |
1.21.3-1.amzn2023.0.1 |
1.21.3-6.amzn2023.0.1 |
krb5: overflow when calculating ulog block size
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24528
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2026-01-16 18:16 修改: 2026-01-16 19:16
|
| krb5-libs |
CVE-2025-3576 |
中危 |
1.21.3-1.amzn2023.0.1 |
1.21.3-6.amzn2023.0.1 |
krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3576
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-04-15 06:15 修改: 2025-09-02 10:15
|
| elfutils-default-yama-scope |
CVE-2025-1372 |
中危 |
0.188-3.amzn2023.0.2 |
0.188-3.amzn2023.0.3 |
elfutils: GNU elfutils eu-readelf readelf.c print_string_section buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1372
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-17 03:15 修改: 2025-11-04 20:19
|
| elfutils-libelf |
CVE-2025-1352 |
中危 |
0.188-3.amzn2023.0.2 |
0.188-3.amzn2023.0.3 |
elfutils: GNU elfutils eu-readelf libdw_alloc.c __libdw_thread_tail memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1352
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-16 15:15 修改: 2025-11-03 20:34
|
| elfutils-libelf |
CVE-2025-1372 |
中危 |
0.188-3.amzn2023.0.2 |
0.188-3.amzn2023.0.3 |
elfutils: GNU elfutils eu-readelf readelf.c print_string_section buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1372
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-17 03:15 修改: 2025-11-04 20:19
|
| libarchive |
CVE-2025-5915 |
中危 |
3.7.4-2.amzn2023.0.1 |
3.7.4-2.amzn2023.0.4 |
libarchive: Heap buffer over read in copy_from_lzss_window() at archive_read_support_format_rar.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5915
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-09 20:15 修改: 2026-01-08 04:15
|
| libarchive |
CVE-2025-5917 |
中危 |
3.7.4-2.amzn2023.0.1 |
3.7.4-2.amzn2023.0.4 |
libarchive: Off by one error in build_ustar_entry_name() at archive_write_set_format_pax.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5917
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-09 20:15 修改: 2025-12-12 01:15
|
| elfutils-libs |
CVE-2025-1352 |
中危 |
0.188-3.amzn2023.0.2 |
0.188-3.amzn2023.0.3 |
elfutils: GNU elfutils eu-readelf libdw_alloc.c __libdw_thread_tail memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1352
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-16 15:15 修改: 2025-11-03 20:34
|
| elfutils-libs |
CVE-2025-1372 |
中危 |
0.188-3.amzn2023.0.2 |
0.188-3.amzn2023.0.3 |
elfutils: GNU elfutils eu-readelf readelf.c print_string_section buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1372
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-17 03:15 修改: 2025-11-04 20:19
|
| cairo |
CVE-2025-50422 |
中危 |
1.17.6-2.amzn2023.0.1 |
1.18.0-4.amzn2023.0.3 |
poppler: Poppler crash on malformed input
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-50422
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-08-04 17:15 修改: 2025-08-26 19:15
|
| coreutils-single |
CVE-2025-5278 |
中危 |
8.32-30.amzn2023.0.3 |
8.32-30.amzn2023.0.4 |
coreutils: Heap Buffer Under-Read in GNU Coreutils sort via Key Specification
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5278
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-05-27 21:15 修改: 2025-10-22 20:15
|
| curl-minimal |
CVE-2024-11053 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: curl netrc password leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-12-11 08:15 修改: 2025-11-03 21:16
|
| expat |
CVE-2024-50602 |
中危 |
2.5.0-1.amzn2023.0.4 |
2.6.3-1.amzn2023.0.2 |
libexpat: expat: DoS via XML_ResumeParser
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-10-27 05:15 修改: 2025-10-15 17:54
|
| curl-minimal |
CVE-2024-9681 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.11.1-4.amzn2023.0.1 |
curl: HSTS subdomain overwrites parent cache entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-11-06 08:15 修改: 2025-11-03 21:18
|
| curl-minimal |
CVE-2025-0167 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
When asked to use a `.netrc` file for credentials **and** to follow HT ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0167
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-05 10:15 修改: 2025-07-30 19:41
|
| curl-minimal |
CVE-2025-10148 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: predictable WebSocket mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10148
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:55
|
| curl-minimal |
CVE-2025-10966 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: Curl missing SFTP host verification with wolfSSH backend
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10966
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-11-07 08:15 修改: 2026-01-20 14:57
|
| curl-minimal |
CVE-2025-11563 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.11.1-4.amzn2023.0.3 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11563
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| glibc |
CVE-2021-43396 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43396
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2021-11-04 20:15 修改: 2024-11-21 06:29
|
| glibc |
CVE-2024-33599 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:56
|
| glibc |
CVE-2024-33600 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:50
|
| glibc |
CVE-2024-33601 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-08-01 01:56
|
| libcurl-minimal |
CVE-2024-11053 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: curl netrc password leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-12-11 08:15 修改: 2025-11-03 21:16
|
| libcurl-minimal |
CVE-2024-9681 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.11.1-4.amzn2023.0.1 |
curl: HSTS subdomain overwrites parent cache entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-11-06 08:15 修改: 2025-11-03 21:18
|
| libcurl-minimal |
CVE-2025-0167 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
When asked to use a `.netrc` file for credentials **and** to follow HT ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0167
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-05 10:15 修改: 2025-07-30 19:41
|
| libcurl-minimal |
CVE-2025-10148 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: predictable WebSocket mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10148
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:55
|
| libcurl-minimal |
CVE-2025-10966 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: Curl missing SFTP host verification with wolfSSH backend
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10966
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-11-07 08:15 修改: 2026-01-20 14:57
|
| libcurl-minimal |
CVE-2025-11563 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.11.1-4.amzn2023.0.3 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11563
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| libcurl-minimal |
CVE-2025-9086 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| glibc |
CVE-2024-33602 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:40
|
| glibc |
CVE-2025-0395 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: buffer overflow in the GNU C Library's assert()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0395
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-01-22 13:15 修改: 2025-04-30 05:15
|
| glibc |
CVE-2025-8058 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-231.amzn2023.0.1 |
glibc: Double free in glibc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8058
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-07-23 20:15 修改: 2025-11-04 22:16
|
| curl-minimal |
CVE-2025-9086 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| glibc-common |
CVE-2021-43396 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43396
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2021-11-04 20:15 修改: 2024-11-21 06:29
|
| libtasn1 |
CVE-2024-12133 |
中危 |
4.19.0-1.amzn2023.0.4 |
4.19.0-1.amzn2023.0.5 |
libtasn1: Inefficient DER Decoding in libtasn1 Leading to Potential Remote DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12133
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-10 16:15 修改: 2025-10-06 02:15
|
| glibc-common |
CVE-2024-33599 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:56
|
| glibc-common |
CVE-2024-33600 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:50
|
| glibc-common |
CVE-2024-33601 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-08-01 01:56
|
| glibc-common |
CVE-2024-33602 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:40
|
| glibc-common |
CVE-2025-0395 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: buffer overflow in the GNU C Library's assert()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0395
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-01-22 13:15 修改: 2025-04-30 05:15
|
| glibc-common |
CVE-2025-8058 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-231.amzn2023.0.1 |
glibc: Double free in glibc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8058
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-07-23 20:15 修改: 2025-11-04 22:16
|
| elfutils-default-yama-scope |
CVE-2025-1352 |
中危 |
0.188-3.amzn2023.0.2 |
0.188-3.amzn2023.0.3 |
elfutils: GNU elfutils eu-readelf libdw_alloc.c __libdw_thread_tail memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1352
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-16 15:15 修改: 2025-11-03 20:34
|
| glibc-minimal-langpack |
CVE-2021-43396 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43396
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2021-11-04 20:15 修改: 2024-11-21 06:29
|
| glibc-minimal-langpack |
CVE-2024-33599 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:56
|
| libxml2 |
CVE-2024-34459 |
中危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.7 |
libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-14 15:39 修改: 2025-11-04 22:16
|
| libxml2 |
CVE-2025-32414 |
中危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.10 |
libxml2: Out-of-Bounds Read in libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32414
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-04-08 03:15 修改: 2025-11-03 20:18
|
| libxml2 |
CVE-2025-32415 |
中危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.10 |
libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32415
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-04-17 17:15 修改: 2025-11-03 20:18
|
| openssl-libs |
CVE-2024-13176 |
中危 |
1:3.0.8-1.amzn2023.0.16 |
1:3.0.8-1.amzn2023.0.19 |
openssl: Timing side-channel in ECDSA signature computation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-13176
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-01-20 14:15 修改: 2025-11-03 20:16
|
| openssl-libs |
CVE-2025-9230 |
中危 |
1:3.0.8-1.amzn2023.0.16 |
1:3.2.2-1.amzn2023.0.2 |
openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9230
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-30 14:15 修改: 2025-11-04 22:16
|
| openssl-libs |
CVE-2025-9231 |
中危 |
1:3.0.8-1.amzn2023.0.16 |
1:3.2.2-1.amzn2023.0.2 |
openssl: Timing side-channel in SM2 algorithm on 64 bit ARM
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9231
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-30 14:15 修改: 2025-11-04 22:16
|
| pam |
CVE-2024-10041 |
中危 |
1.5.1-8.amzn2023.0.4 |
1.5.1-8.amzn2023.0.5 |
pam: libpam: Libpam vulnerable to read hashed password
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15
|
| pam |
CVE-2025-6020 |
中危 |
1.5.1-8.amzn2023.0.4 |
1.5.1-8.amzn2023.0.6 |
linux-pam: Linux-pam directory Traversal
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6020
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-06-17 13:15 修改: 2025-11-25 11:15
|
| pam |
CVE-2025-8941 |
中危 |
1.5.1-8.amzn2023.0.4 |
1.5.1-8.amzn2023.0.7 |
linux-pam: Incomplete fix for CVE-2025-6020
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8941
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-08-13 15:15 修改: 2025-11-20 21:16
|
| glibc-minimal-langpack |
CVE-2024-33600 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:50
|
| glibc-minimal-langpack |
CVE-2024-33601 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-08-01 01:56
|
| glibc-minimal-langpack |
CVE-2024-33602 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:40
|
| glibc-minimal-langpack |
CVE-2025-0395 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: buffer overflow in the GNU C Library's assert()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0395
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-01-22 13:15 修改: 2025-04-30 05:15
|
| glibc-minimal-langpack |
CVE-2025-8058 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-231.amzn2023.0.1 |
glibc: Double free in glibc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8058
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-07-23 20:15 修改: 2025-11-04 22:16
|
| grub2-common |
CVE-2024-45774 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: reader/jpeg: Heap OOB Write during JPEG parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45774
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 19:15 修改: 2025-05-13 20:15
|
| grub2-common |
CVE-2024-45775 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: commands/extcmd: Missing check for failed allocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45775
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-05-13 20:15
|
| grub2-common |
CVE-2024-45776 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write and Read.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45776
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-09-18 09:15
|
| grub2-common |
CVE-2024-45777 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45777
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-19 18:15 修改: 2025-11-11 17:15
|
| grub2-common |
CVE-2024-45778 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/bfs: Integer overflow in the BFS parser.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45778
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 17:15 修改: 2025-03-07 20:42
|
| python3 |
CVE-2007-4559 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: tarfile module directory traversal
漏洞详情: https://avd.aquasec.com/nvd/cve-2007-4559
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2007-08-28 01:17 修改: 2025-04-09 00:30
|
| python3 |
CVE-2024-11168 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.1 |
python: Improper validation of IPv6 and IPvFuture addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-11-12 22:15 修改: 2025-11-03 22:16
|
| python3 |
CVE-2024-4032 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: incorrect IPv4 and IPv6 private ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-06-17 15:15 修改: 2025-11-03 22:18
|
| python3 |
CVE-2024-6923 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-08-01 14:15 修改: 2025-11-03 23:17
|
| python3 |
CVE-2024-7592 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
cpython: python: Uncontrolled CPU resource consumption when in http.cookies module
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-08-19 19:15 修改: 2025-11-03 23:17
|
| python3 |
CVE-2024-9287 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.1 |
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-10-22 17:15 修改: 2025-11-03 23:17
|
| python3 |
CVE-2025-0938 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.2 |
python: cpython: URL parser allowed square brackets in domain names
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0938
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-01-31 18:15 修改: 2025-11-03 21:18
|
| python3 |
CVE-2025-12084 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.25-1.amzn2023.0.2 |
cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-12084
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-12-03 19:15 修改: 2026-01-14 19:16
|
| python3 |
CVE-2025-13837 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.25-1.amzn2023.0.2 |
cpython: Out-of-memory when loading Plist
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13837
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-12-01 18:16 修改: 2026-01-15 19:08
|
| python3 |
CVE-2025-6069 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.2 |
cpython: Python HTMLParser quadratic complexity
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6069
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-17 14:15 修改: 2025-07-07 18:15
|
| python3 |
CVE-2025-8291 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.24-1.amzn2023.0.3 |
cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8291
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-07 18:16 修改: 2025-10-29 16:15
|
| grub2-common |
CVE-2024-45779 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/bfs: Integer overflow leads to Heap OOB Read in the BFS parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45779
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 15:15 修改: 2025-03-25 05:15
|
| grub2-common |
CVE-2024-45780 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/tar: Integer Overflow causes Heap OOB Write
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45780
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 15:15 修改: 2025-03-07 22:14
|
| grub2-common |
CVE-2024-45781 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/ufs: OOB write in the heap
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45781
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-09-18 09:15
|
| grub2-common |
CVE-2024-45782 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/hfs: strcpy() using the volume name (fs/hfs.c:382)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45782
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 17:15 修改: 2025-03-25 05:15
|
| grub2-common |
CVE-2024-45783 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: fs/hfs+: refcount can be decremented twice
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45783
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-05-13 20:15
|
| grub2-common |
CVE-2024-56737 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.14 |
grub2: heap-based buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56737
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2024-12-29 07:15 修改: 2025-06-24 00:30
|
| grub2-common |
CVE-2025-0622 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: command/gpg: Use-after-free due to hooks not being removed on module unload
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0622
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-18 20:15 修改: 2025-09-18 09:15
|
| grub2-common |
CVE-2025-0624 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: net: Out-of-bounds write in grub_net_search_config_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0624
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-19 19:15 修改: 2025-05-21 15:16
|
| grub2-common |
CVE-2025-0677 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0677
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-02-19 19:15 修改: 2025-09-18 09:15
|
| grub2-common |
CVE-2025-0678 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: squash4: Integer overflow may lead to heap based out-of-bounds write when reading data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0678
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 17:15 修改: 2025-03-25 05:15
|
| python3-libs |
CVE-2007-4559 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: tarfile module directory traversal
漏洞详情: https://avd.aquasec.com/nvd/cve-2007-4559
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2007-08-28 01:17 修改: 2025-04-09 00:30
|
| python3-libs |
CVE-2024-11168 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.1 |
python: Improper validation of IPv6 and IPvFuture addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-11-12 22:15 修改: 2025-11-03 22:16
|
| python3-libs |
CVE-2024-4032 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: incorrect IPv4 and IPv6 private ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-06-17 15:15 修改: 2025-11-03 22:18
|
| python3-libs |
CVE-2024-6923 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-08-01 14:15 修改: 2025-11-03 23:17
|
| python3-libs |
CVE-2024-7592 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
cpython: python: Uncontrolled CPU resource consumption when in http.cookies module
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-08-19 19:15 修改: 2025-11-03 23:17
|
| python3-libs |
CVE-2024-9287 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.1 |
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-10-22 17:15 修改: 2025-11-03 23:17
|
| python3-libs |
CVE-2025-0938 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.2 |
python: cpython: URL parser allowed square brackets in domain names
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0938
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-01-31 18:15 修改: 2025-11-03 21:18
|
| python3-libs |
CVE-2025-12084 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.25-1.amzn2023.0.2 |
cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-12084
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-12-03 19:15 修改: 2026-01-14 19:16
|
| python3-libs |
CVE-2025-13837 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.25-1.amzn2023.0.2 |
cpython: Out-of-memory when loading Plist
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13837
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-12-01 18:16 修改: 2026-01-15 19:08
|
| python3-libs |
CVE-2025-6069 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.2 |
cpython: Python HTMLParser quadratic complexity
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6069
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-17 14:15 修改: 2025-07-07 18:15
|
| python3-libs |
CVE-2025-8291 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.24-1.amzn2023.0.3 |
cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8291
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-07 18:16 修改: 2025-10-29 16:15
|
| python3-pip-wheel |
CVE-2007-4559 |
中危 |
21.3.1-2.amzn2023.0.8 |
21.3.1-2.amzn2023.0.11 |
python: tarfile module directory traversal
漏洞详情: https://avd.aquasec.com/nvd/cve-2007-4559
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2007-08-28 01:17 修改: 2025-04-09 00:30
|
| python3-pip-wheel |
CVE-2024-35195 |
中危 |
21.3.1-2.amzn2023.0.8 |
21.3.1-2.amzn2023.0.10 |
requests: subsequent requests to the same host ignore cert verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35195
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-20 21:15 修改: 2024-11-21 09:19
|
| python3-pip-wheel |
CVE-2024-3651 |
中危 |
21.3.1-2.amzn2023.0.8 |
21.3.1-2.amzn2023.0.9 |
python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-07-07 18:15 修改: 2025-11-04 22:16
|
| python3-pip-wheel |
CVE-2025-50181 |
中危 |
21.3.1-2.amzn2023.0.8 |
21.3.1-2.amzn2023.0.13 |
urllib3: urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-50181
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-19 01:15 修改: 2025-12-22 19:15
|
| python3-pip-wheel |
CVE-2025-8869 |
中危 |
21.3.1-2.amzn2023.0.8 |
21.3.1-2.amzn2023.0.14 |
pip: pip missing checks on symbolic link extraction
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8869
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-24 15:15 修改: 2025-11-03 18:17
|
| grub2-common |
CVE-2025-0684 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: reiserfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0684
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 18:15 修改: 2025-07-28 17:22
|
| grub2-common |
CVE-2025-0685 |
中危 |
1:2.06-61.amzn2023.0.12 |
1:2.06-61.amzn2023.0.16 |
grub2: jfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0685
镜像层: sha256:4ee62d87183e5ac19d7eda70a8acd4fb9d39f1b2e41890c68f722ce6e03f0262
发布日期: 2025-03-03 18:15 修改: 2025-07-28 17:23
|
| sqlite-libs |
CVE-2025-6965 |
中危 |
3.40.0-1.amzn2023.0.4 |
3.40.0-1.amzn2023.0.6 |
sqlite: Integer Truncation in SQLite
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6965
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-07-15 14:15 修改: 2025-11-04 22:16
|
| python3-libs |
CVE-2025-1795 |
低危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.3 |
python: Mishandling of comma during folding and unicode-encoding of email headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1795
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-28 19:15 修改: 2025-11-03 21:18
|
| python3-libs |
CVE-2025-6075 |
低危 |
3.9.16-1.amzn2023.0.9 |
3.9.25-1.amzn2023.0.1 |
python: Quadratic complexity in os.path.expandvars() with user-controlled template
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6075
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-31 17:15 修改: 2025-12-01 19:15
|
| gnupg2-minimal |
CVE-2025-30258 |
低危 |
2.3.7-1.amzn2023.0.4 |
2.3.7-1.amzn2023.0.5 |
gnupg: verification DoS due to a malicious subkey in the keyring
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-30258
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-03-19 20:15 修改: 2025-10-16 16:53
|
| python3 |
CVE-2025-1795 |
低危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.3 |
python: Mishandling of comma during folding and unicode-encoding of email headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1795
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-28 19:15 修改: 2025-11-03 21:18
|
| python3 |
CVE-2025-6075 |
低危 |
3.9.16-1.amzn2023.0.9 |
3.9.25-1.amzn2023.0.1 |
python: Quadratic complexity in os.path.expandvars() with user-controlled template
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6075
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-31 17:15 修改: 2025-12-01 19:15
|