| expat |
CVE-2023-52425 |
高危 |
2.5.0-1.amzn2023.0.4 |
2.6.3-1.amzn2023.0.1 |
expat: parsing large tokens can trigger a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-02-04 20:15 修改: 2025-11-04 19:16
|
| expat |
CVE-2024-45490 |
高危 |
2.5.0-1.amzn2023.0.4 |
2.6.3-1.amzn2023.0.1 |
libexpat: Negative Length Parsing Vulnerability in libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-08-30 03:15 修改: 2025-11-04 17:16
|
| expat |
CVE-2025-59375 |
高危 |
2.5.0-1.amzn2023.0.4 |
2.6.3-1.amzn2023.0.3 |
expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-59375
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-15 03:15 修改: 2025-11-04 22:16
|
| glib2 |
CVE-2025-13601 |
高危 |
2.74.7-689.amzn2023.0.2 |
2.82.2-767.amzn2023 |
glib: Integer overflow in in g_escape_uri_string()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13601
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-11-26 15:15 修改: 2025-12-01 15:39
|
| glib2 |
CVE-2025-14087 |
高危 |
2.74.7-689.amzn2023.0.2 |
2.82.2-769.amzn2023 |
glib: GLib: Buffer underflow in GVariant parser leads to heap corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14087
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-12-10 09:15 修改: 2025-12-12 15:18
|
| glib2 |
CVE-2025-3360 |
高危 |
2.74.7-689.amzn2023.0.2 |
2.82.2-766.amzn2023 |
glibc: GLib prior to 2.82.5 is vulnerable to integer overflow and buffer under-read when parsing a very long invalid ISO 8601 timestamp with g_date_time_new_from_iso8601().
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3360
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-04-07 13:15 修改: 2025-04-14 12:15
|
| glib2 |
CVE-2025-6052 |
高危 |
2.74.7-689.amzn2023.0.2 |
2.82.2-766.amzn2023 |
glib: Integer overflow in g_string_maybe_expand() leading to potential buffer overflow in GLib GString
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6052
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-13 16:15 修改: 2025-08-20 17:27
|
| glibc |
CVE-2025-4802 |
高危 |
2.34-52.amzn2023.0.11 |
2.34-196.amzn2023.0.1 |
glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4802
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-05-16 20:15 修改: 2025-11-03 20:19
|
| glibc-common |
CVE-2025-4802 |
高危 |
2.34-52.amzn2023.0.11 |
2.34-196.amzn2023.0.1 |
glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4802
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-05-16 20:15 修改: 2025-11-03 20:19
|
| glibc-minimal-langpack |
CVE-2025-4802 |
高危 |
2.34-52.amzn2023.0.11 |
2.34-196.amzn2023.0.1 |
glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4802
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-05-16 20:15 修改: 2025-11-03 20:19
|
| libarchive |
CVE-2024-48957 |
高危 |
3.7.4-2.amzn2023.0.1 |
3.7.4-2.amzn2023.0.2 |
libarchive: Out-of-bounds access in libarchive's archive file handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48957
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-10-10 02:15 修改: 2025-09-29 21:35
|
| libarchive |
CVE-2024-48958 |
高危 |
3.7.4-2.amzn2023.0.1 |
3.7.4-2.amzn2023.0.2 |
libarchive: Out-of-bounds access in libarchive's RAR file handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48958
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-10-10 02:15 修改: 2025-11-03 21:16
|
| libarchive |
CVE-2025-5914 |
高危 |
3.7.4-2.amzn2023.0.1 |
3.7.4-2.amzn2023.0.3 |
libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5914
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-09 20:15 修改: 2026-01-21 15:16
|
| libcap |
CVE-2025-1390 |
高危 |
2.48-2.amzn2023.0.3 |
2.48-2.amzn2023.0.4 |
libcap: pam_cap: Fix potential configuration parsing error
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1390
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-18 03:15 修改: 2025-02-18 03:15
|
| libcap |
CVE-2025-22874 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.3 |
crypto/x509: Usage of ExtKeyUsageAny disables policy validation in crypto/x509
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22874
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-11 17:15 修改: 2025-06-12 16:06
|
| libcap |
CVE-2025-4673 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.3 |
net/http: Sensitive headers not cleared on cross-origin redirect in net/http
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4673
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-11 17:15 修改: 2025-06-12 16:06
|
| libcap |
CVE-2025-47912 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
net/url: Insufficient validation of bracketed IPv6 hostnames in net/url
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47912
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-58183 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
golang: archive/tar: Unbounded allocation when parsing GNU sparse map
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58183
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-58185 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
encoding/asn1: Parsing DER payload can cause memory exhaustion in encoding/asn1
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58185
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-58186 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
golang.org/net/http: Lack of limit when parsing cookies can cause memory exhaustion in net/http
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58186
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-58187 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
crypto/x509: Quadratic complexity when checking name constraints in crypto/x509
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58187
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-20 23:15
|
| libcap |
CVE-2025-58188 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
crypto/x509: golang: Panic when validating certificates with DSA public keys in crypto/x509
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58188
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-58189 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
crypto/tls: go crypto/tls ALPN negotiation error contains attacker controlled information
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58189
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-61723 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
encoding/pem: Quadratic complexity when parsing some invalid inputs in encoding/pem
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61723
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-61724 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
net/textproto: Excessive CPU consumption in Reader.ReadResponse in net/textproto
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61724
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| libcap |
CVE-2025-61725 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.4 |
net/mail: Excessive CPU consumption in ParseAddress in net/mail
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61725
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-29 23:16 修改: 2025-12-09 18:15
|
| libcap |
CVE-2025-61727 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.5 |
golang: crypto/x509: excluded subdomain constraint does not restrict wildcard SANs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61727
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-12-03 20:16 修改: 2025-12-18 20:15
|
| libcap |
CVE-2025-61729 |
高危 |
2.48-2.amzn2023.0.3 |
2.73-1.amzn2023.0.5 |
crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61729
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-12-02 19:15 修改: 2025-12-19 18:25
|
| libxml2 |
CVE-2022-49043 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.8 |
libxml: use-after-free in xmlXIncludeAddNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49043
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-01-26 06:15 修改: 2025-11-03 21:15
|
| libxml2 |
CVE-2024-56171 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.9 |
libxml2: Use-After-Free in libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56171
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-18 22:15 修改: 2025-11-03 21:17
|
| libxml2 |
CVE-2025-24928 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.9 |
libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24928
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-18 23:15 修改: 2025-11-03 22:18
|
| libxml2 |
CVE-2025-27113 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.9 |
libxml2: NULL Pointer Dereference in libxml2 xmlPatMatch
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-27113
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-18 23:15 修改: 2025-11-03 22:18
|
| libxml2 |
CVE-2025-49794 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.12 |
libxml: Heap use after free (UAF) leads to Denial of service (DoS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-49794
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-16 16:15 修改: 2025-11-22 03:15
|
| libxml2 |
CVE-2025-49795 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.12 |
libxml: Null pointer dereference leads to Denial of service (DoS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-49795
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-16 16:15 修改: 2025-10-27 18:15
|
| libxml2 |
CVE-2025-49796 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.12 |
libxml: Type confusion leads to Denial of service (DoS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-49796
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-16 16:15 修改: 2025-11-22 03:15
|
| libxml2 |
CVE-2025-6021 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.11 |
libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6021
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-12 13:15 修改: 2025-11-29 01:16
|
| libxml2 |
CVE-2025-7425 |
高危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.13 |
libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7425
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-07-10 14:15 修改: 2025-11-22 03:15
|
| python3 |
CVE-2023-27043 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2023-04-19 00:15 修改: 2025-12-17 22:15
|
| python3 |
CVE-2024-12718 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: python: Bypass extraction filter to modify file metadata outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12718
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-07-24 16:15
|
| python3 |
CVE-2024-6232 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-09-03 13:15 修改: 2025-11-03 23:17
|
| python3 |
CVE-2024-8088 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-08-22 19:15 修改: 2025-11-03 23:17
|
| python3 |
CVE-2025-4138 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4138
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3 |
CVE-2025-4330 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: python: Extraction filter bypass for linking outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4330
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3 |
CVE-2025-4435 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: Tarfile extracts filtered members when errorlevel=0
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4435
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-04 14:54
|
| python3 |
CVE-2025-4516 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.22-1.amzn2023.0.2 |
cpython: python: CPython DecodeError Handling Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4516
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-05-15 14:15 修改: 2025-06-03 14:15
|
| python3 |
CVE-2025-4517 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
python: cpython: Arbitrary writes via tarfile realpath overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4517
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3 |
CVE-2025-8194 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.3 |
cpython: Cpython infinite loop when parsing a tarfile
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8194
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-07-28 19:15 修改: 2025-11-04 22:16
|
| python3-libs |
CVE-2023-27043 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2023-04-19 00:15 修改: 2025-12-17 22:15
|
| python3-libs |
CVE-2024-12718 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: python: Bypass extraction filter to modify file metadata outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12718
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-07-24 16:15
|
| python3-libs |
CVE-2024-6232 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-09-03 13:15 修改: 2025-11-03 23:17
|
| python3-libs |
CVE-2024-8088 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-08-22 19:15 修改: 2025-11-03 23:17
|
| python3-libs |
CVE-2025-4138 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4138
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3-libs |
CVE-2025-4330 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: python: Extraction filter bypass for linking outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4330
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3-libs |
CVE-2025-4435 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
cpython: Tarfile extracts filtered members when errorlevel=0
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4435
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-04 14:54
|
| python3-libs |
CVE-2025-4516 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.22-1.amzn2023.0.2 |
cpython: python: CPython DecodeError Handling Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4516
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-05-15 14:15 修改: 2025-06-03 14:15
|
| python3-libs |
CVE-2025-4517 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.1 |
python: cpython: Arbitrary writes via tarfile realpath overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4517
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3-libs |
CVE-2025-8194 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.3 |
cpython: Cpython infinite loop when parsing a tarfile
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8194
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-07-28 19:15 修改: 2025-11-04 22:16
|
| python3-setuptools-wheel |
CVE-2025-47273 |
高危 |
59.6.0-2.amzn2023.0.5 |
59.6.0-2.amzn2023.0.6 |
setuptools: Path Traversal Vulnerability in setuptools PackageIndex
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47273
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-05-17 16:15 修改: 2025-06-12 16:29
|
| sqlite-libs |
CVE-2022-46908 |
高危 |
3.40.0-1.amzn2023.0.4 |
3.40.0-1.amzn2023.0.5 |
sqlite: safe mode authorizer callback allows disallowed UDFs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46908
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2022-12-12 06:15 修改: 2025-05-05 16:15
|
| curl-minimal |
CVE-2025-10148 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: predictable WebSocket mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10148
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:55
|
| curl-minimal |
CVE-2025-10966 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: Curl missing SFTP host verification with wolfSSH backend
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10966
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-11-07 08:15 修改: 2026-01-20 14:57
|
| curl-minimal |
CVE-2025-11563 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.11.1-4.amzn2023.0.3 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11563
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| curl-minimal |
CVE-2025-9086 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| glibc |
CVE-2021-43396 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43396
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2021-11-04 20:15 修改: 2024-11-21 06:29
|
| glibc |
CVE-2024-33599 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:56
|
| glibc |
CVE-2024-33600 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:50
|
| glibc |
CVE-2024-33601 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-08-01 01:56
|
| glibc |
CVE-2024-33602 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:40
|
| libcurl-minimal |
CVE-2024-11053 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: curl netrc password leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-12-11 08:15 修改: 2025-11-03 21:16
|
| libcurl-minimal |
CVE-2024-9681 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.11.1-4.amzn2023.0.1 |
curl: HSTS subdomain overwrites parent cache entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-11-06 08:15 修改: 2025-11-03 21:18
|
| libcurl-minimal |
CVE-2025-0167 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
When asked to use a `.netrc` file for credentials **and** to follow HT ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0167
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-05 10:15 修改: 2025-07-30 19:41
|
| libcurl-minimal |
CVE-2025-10148 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: predictable WebSocket mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10148
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:55
|
| libcurl-minimal |
CVE-2025-10966 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: Curl missing SFTP host verification with wolfSSH backend
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10966
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-11-07 08:15 修改: 2026-01-20 14:57
|
| libcurl-minimal |
CVE-2025-11563 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.11.1-4.amzn2023.0.3 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11563
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| libcurl-minimal |
CVE-2025-9086 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| libtasn1 |
CVE-2024-12133 |
中危 |
4.19.0-1.amzn2023.0.4 |
4.19.0-1.amzn2023.0.5 |
libtasn1: Inefficient DER Decoding in libtasn1 Leading to Potential Remote DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12133
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-10 16:15 修改: 2025-10-06 02:15
|
| glibc |
CVE-2025-0395 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: buffer overflow in the GNU C Library's assert()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0395
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-01-22 13:15 修改: 2025-04-30 05:15
|
| glibc |
CVE-2025-8058 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-231.amzn2023.0.1 |
glibc: Double free in glibc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8058
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-07-23 20:15 修改: 2025-11-04 22:16
|
| elfutils-default-yama-scope |
CVE-2025-1352 |
中危 |
0.188-3.amzn2023.0.2 |
0.188-3.amzn2023.0.3 |
elfutils: GNU elfutils eu-readelf libdw_alloc.c __libdw_thread_tail memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1352
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-16 15:15 修改: 2025-11-03 20:34
|
| glibc-common |
CVE-2021-43396 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43396
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2021-11-04 20:15 修改: 2024-11-21 06:29
|
| glibc-common |
CVE-2024-33599 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:56
|
| glibc-common |
CVE-2024-33600 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:50
|
| glibc-common |
CVE-2024-33601 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-08-01 01:56
|
| glibc-common |
CVE-2024-33602 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:40
|
| glibc-common |
CVE-2025-0395 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: buffer overflow in the GNU C Library's assert()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0395
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-01-22 13:15 修改: 2025-04-30 05:15
|
| libxml2 |
CVE-2024-34459 |
中危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.7 |
libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-14 15:39 修改: 2025-11-04 22:16
|
| libxml2 |
CVE-2025-32414 |
中危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.10 |
libxml2: Out-of-Bounds Read in libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32414
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-04-08 03:15 修改: 2025-11-03 20:18
|
| libxml2 |
CVE-2025-32415 |
中危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.10 |
libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32415
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-04-17 17:15 修改: 2025-11-03 20:18
|
| openssl-libs |
CVE-2024-13176 |
中危 |
1:3.0.8-1.amzn2023.0.16 |
1:3.0.8-1.amzn2023.0.19 |
openssl: Timing side-channel in ECDSA signature computation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-13176
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-01-20 14:15 修改: 2025-11-03 20:16
|
| openssl-libs |
CVE-2025-9230 |
中危 |
1:3.0.8-1.amzn2023.0.16 |
1:3.2.2-1.amzn2023.0.2 |
openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9230
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-30 14:15 修改: 2025-11-04 22:16
|
| openssl-libs |
CVE-2025-9231 |
中危 |
1:3.0.8-1.amzn2023.0.16 |
1:3.2.2-1.amzn2023.0.2 |
openssl: Timing side-channel in SM2 algorithm on 64 bit ARM
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9231
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-30 14:15 修改: 2025-11-04 22:16
|
| glibc-common |
CVE-2025-8058 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-231.amzn2023.0.1 |
glibc: Double free in glibc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8058
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-07-23 20:15 修改: 2025-11-04 22:16
|
| elfutils-default-yama-scope |
CVE-2025-1372 |
中危 |
0.188-3.amzn2023.0.2 |
0.188-3.amzn2023.0.3 |
elfutils: GNU elfutils eu-readelf readelf.c print_string_section buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1372
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-17 03:15 修改: 2025-11-04 20:19
|
| glibc-minimal-langpack |
CVE-2021-43396 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43396
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2021-11-04 20:15 修改: 2024-11-21 06:29
|
| glibc-minimal-langpack |
CVE-2024-33599 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:56
|
| glibc-minimal-langpack |
CVE-2024-33600 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:50
|
| glibc-minimal-langpack |
CVE-2024-33601 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-08-01 01:56
|
| glibc-minimal-langpack |
CVE-2024-33602 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:40
|
| glibc-minimal-langpack |
CVE-2025-0395 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-181.amzn2023.0.1 |
glibc: buffer overflow in the GNU C Library's assert()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0395
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-01-22 13:15 修改: 2025-04-30 05:15
|
| glibc-minimal-langpack |
CVE-2025-8058 |
中危 |
2.34-52.amzn2023.0.11 |
2.34-231.amzn2023.0.1 |
glibc: Double free in glibc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8058
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-07-23 20:15 修改: 2025-11-04 22:16
|
| krb5-libs |
CVE-2025-24528 |
中危 |
1.21.3-1.amzn2023.0.1 |
1.21.3-6.amzn2023.0.1 |
krb5: overflow when calculating ulog block size
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24528
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2026-01-16 18:16 修改: 2026-01-16 19:16
|
| python3 |
CVE-2007-4559 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: tarfile module directory traversal
漏洞详情: https://avd.aquasec.com/nvd/cve-2007-4559
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2007-08-28 01:17 修改: 2025-04-09 00:30
|
| python3 |
CVE-2024-11168 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.1 |
python: Improper validation of IPv6 and IPvFuture addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-11-12 22:15 修改: 2025-11-03 22:16
|
| python3 |
CVE-2024-4032 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: incorrect IPv4 and IPv6 private ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-06-17 15:15 修改: 2025-11-03 22:18
|
| python3 |
CVE-2024-6923 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-08-01 14:15 修改: 2025-11-03 23:17
|
| python3 |
CVE-2024-7592 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
cpython: python: Uncontrolled CPU resource consumption when in http.cookies module
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-08-19 19:15 修改: 2025-11-03 23:17
|
| python3 |
CVE-2024-9287 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.1 |
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-10-22 17:15 修改: 2025-11-03 23:17
|
| python3 |
CVE-2025-0938 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.2 |
python: cpython: URL parser allowed square brackets in domain names
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0938
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-01-31 18:15 修改: 2025-11-03 21:18
|
| python3 |
CVE-2025-12084 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.25-1.amzn2023.0.2 |
cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-12084
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-12-03 19:15 修改: 2026-01-14 19:16
|
| python3 |
CVE-2025-13837 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.25-1.amzn2023.0.2 |
cpython: Out-of-memory when loading Plist
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13837
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-12-01 18:16 修改: 2026-01-15 19:08
|
| python3 |
CVE-2025-6069 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.2 |
cpython: Python HTMLParser quadratic complexity
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6069
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-17 14:15 修改: 2025-07-07 18:15
|
| python3 |
CVE-2025-8291 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.24-1.amzn2023.0.3 |
cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8291
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-07 18:16 修改: 2025-10-29 16:15
|
| krb5-libs |
CVE-2025-3576 |
中危 |
1.21.3-1.amzn2023.0.1 |
1.21.3-6.amzn2023.0.1 |
krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3576
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-04-15 06:15 修改: 2025-09-02 10:15
|
| elfutils-libelf |
CVE-2025-1352 |
中危 |
0.188-3.amzn2023.0.2 |
0.188-3.amzn2023.0.3 |
elfutils: GNU elfutils eu-readelf libdw_alloc.c __libdw_thread_tail memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1352
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-16 15:15 修改: 2025-11-03 20:34
|
| elfutils-libelf |
CVE-2025-1372 |
中危 |
0.188-3.amzn2023.0.2 |
0.188-3.amzn2023.0.3 |
elfutils: GNU elfutils eu-readelf readelf.c print_string_section buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1372
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-17 03:15 修改: 2025-11-04 20:19
|
| elfutils-libs |
CVE-2025-1352 |
中危 |
0.188-3.amzn2023.0.2 |
0.188-3.amzn2023.0.3 |
elfutils: GNU elfutils eu-readelf libdw_alloc.c __libdw_thread_tail memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1352
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-16 15:15 修改: 2025-11-03 20:34
|
| libarchive |
CVE-2025-5915 |
中危 |
3.7.4-2.amzn2023.0.1 |
3.7.4-2.amzn2023.0.4 |
libarchive: Heap buffer over read in copy_from_lzss_window() at archive_read_support_format_rar.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5915
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-09 20:15 修改: 2026-01-08 04:15
|
| libarchive |
CVE-2025-5917 |
中危 |
3.7.4-2.amzn2023.0.1 |
3.7.4-2.amzn2023.0.4 |
libarchive: Off by one error in build_ustar_entry_name() at archive_write_set_format_pax.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5917
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-09 20:15 修改: 2025-12-12 01:15
|
| elfutils-libs |
CVE-2025-1372 |
中危 |
0.188-3.amzn2023.0.2 |
0.188-3.amzn2023.0.3 |
elfutils: GNU elfutils eu-readelf readelf.c print_string_section buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1372
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-17 03:15 修改: 2025-11-04 20:19
|
| coreutils-single |
CVE-2025-5278 |
中危 |
8.32-30.amzn2023.0.3 |
8.32-30.amzn2023.0.4 |
coreutils: Heap Buffer Under-Read in GNU Coreutils sort via Key Specification
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5278
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-05-27 21:15 修改: 2025-10-22 20:15
|
| curl-minimal |
CVE-2024-11053 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
curl: curl netrc password leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-12-11 08:15 修改: 2025-11-03 21:16
|
| curl-minimal |
CVE-2024-9681 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.11.1-4.amzn2023.0.1 |
curl: HSTS subdomain overwrites parent cache entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-11-06 08:15 修改: 2025-11-03 21:18
|
| python3-libs |
CVE-2007-4559 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: tarfile module directory traversal
漏洞详情: https://avd.aquasec.com/nvd/cve-2007-4559
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2007-08-28 01:17 修改: 2025-04-09 00:30
|
| python3-libs |
CVE-2024-11168 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.1 |
python: Improper validation of IPv6 and IPvFuture addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-11-12 22:15 修改: 2025-11-03 22:16
|
| python3-libs |
CVE-2024-4032 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: incorrect IPv4 and IPv6 private ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-06-17 15:15 修改: 2025-11-03 22:18
|
| python3-libs |
CVE-2024-6923 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-08-01 14:15 修改: 2025-11-03 23:17
|
| python3-libs |
CVE-2024-7592 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
cpython: python: Uncontrolled CPU resource consumption when in http.cookies module
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-08-19 19:15 修改: 2025-11-03 23:17
|
| python3-libs |
CVE-2024-9287 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.1 |
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-10-22 17:15 修改: 2025-11-03 23:17
|
| python3-libs |
CVE-2025-0938 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.2 |
python: cpython: URL parser allowed square brackets in domain names
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0938
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-01-31 18:15 修改: 2025-11-03 21:18
|
| python3-libs |
CVE-2025-12084 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.25-1.amzn2023.0.2 |
cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-12084
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-12-03 19:15 修改: 2026-01-14 19:16
|
| python3-libs |
CVE-2025-13837 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.25-1.amzn2023.0.2 |
cpython: Out-of-memory when loading Plist
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13837
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-12-01 18:16 修改: 2026-01-15 19:08
|
| python3-libs |
CVE-2025-6069 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.23-1.amzn2023.0.2 |
cpython: Python HTMLParser quadratic complexity
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6069
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-17 14:15 修改: 2025-07-07 18:15
|
| python3-libs |
CVE-2025-8291 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.24-1.amzn2023.0.3 |
cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8291
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-07 18:16 修改: 2025-10-29 16:15
|
| python3-pip-wheel |
CVE-2007-4559 |
中危 |
21.3.1-2.amzn2023.0.8 |
21.3.1-2.amzn2023.0.11 |
python: tarfile module directory traversal
漏洞详情: https://avd.aquasec.com/nvd/cve-2007-4559
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2007-08-28 01:17 修改: 2025-04-09 00:30
|
| python3-pip-wheel |
CVE-2024-35195 |
中危 |
21.3.1-2.amzn2023.0.8 |
21.3.1-2.amzn2023.0.10 |
requests: subsequent requests to the same host ignore cert verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35195
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-05-20 21:15 修改: 2024-11-21 09:19
|
| python3-pip-wheel |
CVE-2024-3651 |
中危 |
21.3.1-2.amzn2023.0.8 |
21.3.1-2.amzn2023.0.9 |
python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-07-07 18:15 修改: 2025-11-04 22:16
|
| python3-pip-wheel |
CVE-2025-50181 |
中危 |
21.3.1-2.amzn2023.0.8 |
21.3.1-2.amzn2023.0.13 |
urllib3: urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-50181
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-06-19 01:15 修改: 2025-12-22 19:15
|
| python3-pip-wheel |
CVE-2025-8869 |
中危 |
21.3.1-2.amzn2023.0.8 |
21.3.1-2.amzn2023.0.14 |
pip: pip missing checks on symbolic link extraction
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8869
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-09-24 15:15 修改: 2025-11-03 18:17
|
| expat |
CVE-2024-50602 |
中危 |
2.5.0-1.amzn2023.0.4 |
2.6.3-1.amzn2023.0.2 |
libexpat: expat: DoS via XML_ResumeParser
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2024-10-27 05:15 修改: 2025-10-15 17:54
|
| curl-minimal |
CVE-2025-0167 |
中危 |
8.5.0-1.amzn2023.0.4 |
8.15.0-4.amzn2023.0.1 |
When asked to use a `.netrc` file for credentials **and** to follow HT ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0167
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-05 10:15 修改: 2025-07-30 19:41
|
| sqlite-libs |
CVE-2025-6965 |
中危 |
3.40.0-1.amzn2023.0.4 |
3.40.0-1.amzn2023.0.6 |
sqlite: Integer Truncation in SQLite
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6965
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-07-15 14:15 修改: 2025-11-04 22:16
|
| python3-libs |
CVE-2025-1795 |
低危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.3 |
python: Mishandling of comma during folding and unicode-encoding of email headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1795
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-28 19:15 修改: 2025-11-03 21:18
|
| python3-libs |
CVE-2025-6075 |
低危 |
3.9.16-1.amzn2023.0.9 |
3.9.25-1.amzn2023.0.1 |
python: Quadratic complexity in os.path.expandvars() with user-controlled template
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6075
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-31 17:15 修改: 2025-12-01 19:15
|
| gnupg2-minimal |
CVE-2025-30258 |
低危 |
2.3.7-1.amzn2023.0.4 |
2.3.7-1.amzn2023.0.5 |
gnupg: verification DoS due to a malicious subkey in the keyring
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-30258
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-03-19 20:15 修改: 2025-10-16 16:53
|
| python3 |
CVE-2025-1795 |
低危 |
3.9.16-1.amzn2023.0.9 |
3.9.21-1.amzn2023.0.3 |
python: Mishandling of comma during folding and unicode-encoding of email headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1795
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-02-28 19:15 修改: 2025-11-03 21:18
|
| python3 |
CVE-2025-6075 |
低危 |
3.9.16-1.amzn2023.0.9 |
3.9.25-1.amzn2023.0.1 |
python: Quadratic complexity in os.path.expandvars() with user-controlled template
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6075
镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057
发布日期: 2025-10-31 17:15 修改: 2025-12-01 19:15
|