| bind-export-libs |
CVE-2024-11187 |
高危 |
32:9.11.36-14.el8_10 |
32:9.11.36-16.el8_10.4 |
bind: bind9: Many records in the additional section cause CPU exhaustion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11187
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-01-29 22:15 修改: 2025-02-11 19:15
|
| bind-export-libs |
CVE-2024-1737 |
高危 |
32:9.11.36-14.el8_10 |
32:9.11.36-16.el8_10.2 |
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1737
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-07-23 15:15 修改: 2024-11-21 08:51
|
| bind-export-libs |
CVE-2024-1975 |
高危 |
32:9.11.36-14.el8_10 |
32:9.11.36-16.el8_10.2 |
bind9: bind: SIG(0) can be used to exhaust CPU resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1975
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-07-23 15:15 修改: 2024-11-21 08:51
|
| bind-export-libs |
CVE-2025-40778 |
高危 |
32:9.11.36-14.el8_10 |
32:9.11.36-16.el8_10.6 |
bind: Cache poisoning attacks with unsolicited RRs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40778
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-10-22 16:15 修改: 2025-11-04 22:16
|
| compat-openssl10 |
CVE-2023-0286 |
高危 |
1:1.0.2o-4.el8_6 |
1:1.0.2o-4.el8_10.1 |
openssl: X.400 address type confusion in X.509 GeneralName
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-02-08 20:15 修改: 2025-11-04 20:16
|
| expat |
CVE-2025-59375 |
高危 |
2.2.5-13.0.1.el8_10 |
2.5.0-1.el8_10 |
expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-59375
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-09-15 03:15 修改: 2025-11-04 22:16
|
| gnupg2 |
CVE-2025-68973 |
高危 |
2.2.20-3.el8_6 |
2.2.20-4.el8_10 |
GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68973
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-12-28 17:16 修改: 2026-01-14 19:16
|
| krb5-devel |
CVE-2024-3596 |
高危 |
1.18.2-27.0.1.el8_10 |
1.18.2-30.0.1.el8_10 |
freeradius: forgery attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3596
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2024-07-09 12:15 修改: 2025-11-04 18:16
|
| krb5-devel |
CVE-2024-37371 |
高危 |
1.18.2-27.0.1.el8_10 |
1.18.2-29.0.1.el8_10 |
krb5: GSS message token handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2024-06-28 23:15 修改: 2025-11-03 21:16
|
| krb5-libs |
CVE-2024-3596 |
高危 |
1.18.2-27.0.1.el8_10 |
1.18.2-30.0.1.el8_10 |
freeradius: forgery attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3596
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-07-09 12:15 修改: 2025-11-04 18:16
|
| krb5-libs |
CVE-2024-37371 |
高危 |
1.18.2-27.0.1.el8_10 |
1.18.2-29.0.1.el8_10 |
krb5: GSS message token handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-06-28 23:15 修改: 2025-11-03 21:16
|
| libarchive |
CVE-2025-5914 |
高危 |
3.3.3-5.el8 |
3.3.3-6.el8_10 |
libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5914
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-09 20:15 修改: 2026-01-21 15:16
|
| libkadm5 |
CVE-2024-3596 |
高危 |
1.18.2-27.0.1.el8_10 |
1.18.2-30.0.1.el8_10 |
freeradius: forgery attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3596
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2024-07-09 12:15 修改: 2025-11-04 18:16
|
| libkadm5 |
CVE-2024-37371 |
高危 |
1.18.2-27.0.1.el8_10 |
1.18.2-29.0.1.el8_10 |
krb5: GSS message token handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2024-06-28 23:15 修改: 2025-11-03 21:16
|
| libxml2 |
CVE-2024-56171 |
高危 |
2.9.7-18.el8_10.1 |
2.9.7-19.el8_10 |
libxml2: Use-After-Free in libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56171
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-02-18 22:15 修改: 2025-11-03 21:17
|
| libxml2 |
CVE-2025-24928 |
高危 |
2.9.7-18.el8_10.1 |
2.9.7-19.el8_10 |
libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24928
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-02-18 23:15 修改: 2025-11-03 22:18
|
| libxml2 |
CVE-2025-49794 |
高危 |
2.9.7-18.el8_10.1 |
2.9.7-21.el8_10.1 |
libxml: Heap use after free (UAF) leads to Denial of service (DoS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-49794
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-16 16:15 修改: 2025-11-22 03:15
|
| libxml2 |
CVE-2025-49796 |
高危 |
2.9.7-18.el8_10.1 |
2.9.7-21.el8_10.1 |
libxml: Type confusion leads to Denial of service (DoS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-49796
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-16 16:15 修改: 2025-11-22 03:15
|
| libxml2 |
CVE-2025-6021 |
高危 |
2.9.7-18.el8_10.1 |
2.9.7-21.el8_10.1 |
libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6021
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-12 13:15 修改: 2025-11-29 01:16
|
| libxml2 |
CVE-2025-7425 |
高危 |
2.9.7-18.el8_10.1 |
2.9.7-21.el8_10.2 |
libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7425
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-07-10 14:15 修改: 2025-11-22 03:15
|
| openssl |
CVE-2024-5535 |
高危 |
1:1.1.1k-12.el8_9 |
1:1.1.1k-14.el8_6 |
openssl: SSL_select_next_proto buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2024-06-27 11:15 修改: 2025-11-03 23:17
|
| openssl-devel |
CVE-2024-5535 |
高危 |
1:1.1.1k-12.el8_9 |
1:1.1.1k-14.el8_6 |
openssl: SSL_select_next_proto buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2024-06-27 11:15 修改: 2025-11-03 23:17
|
| openssl-libs |
CVE-2024-5535 |
高危 |
1:1.1.1k-12.el8_9 |
1:1.1.1k-14.el8_6 |
openssl: SSL_select_next_proto buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-06-27 11:15 修改: 2025-11-03 23:17
|
| pam |
CVE-2024-10963 |
高危 |
1.3.1-33.el8 |
1.3.1-36.0.1.el8_10 |
pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-11-07 16:15 修改: 2025-02-06 06:15
|
| pam |
CVE-2025-6020 |
高危 |
1.3.1-33.el8 |
1.3.1-38.0.1.el8_10 |
linux-pam: Linux-pam directory Traversal
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6020
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-17 13:15 修改: 2025-11-25 11:15
|
| platform-python |
CVE-2024-11168 |
高危 |
3.6.8-62.0.1.el8_10 |
3.6.8-69.0.1.el8_10 |
python: Improper validation of IPv6 and IPvFuture addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-11-12 22:15 修改: 2025-11-03 22:16
|
| platform-python |
CVE-2024-12718 |
高危 |
3.6.8-62.0.1.el8_10 |
3.6.8-70.0.1.el8_10 |
cpython: python: Bypass extraction filter to modify file metadata outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12718
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-03 13:15 修改: 2025-07-24 16:15
|
| platform-python |
CVE-2024-9287 |
高危 |
3.6.8-62.0.1.el8_10 |
3.6.8-69.0.1.el8_10 |
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-10-22 17:15 修改: 2025-11-03 23:17
|
| platform-python |
CVE-2025-4138 |
高危 |
3.6.8-62.0.1.el8_10 |
3.6.8-70.0.1.el8_10 |
cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4138
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| platform-python |
CVE-2025-4330 |
高危 |
3.6.8-62.0.1.el8_10 |
3.6.8-70.0.1.el8_10 |
cpython: python: Extraction filter bypass for linking outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4330
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| platform-python |
CVE-2025-4435 |
高危 |
3.6.8-62.0.1.el8_10 |
3.6.8-70.0.1.el8_10 |
cpython: Tarfile extracts filtered members when errorlevel=0
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4435
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-03 13:15 修改: 2025-06-04 14:54
|
| platform-python |
CVE-2025-4517 |
高危 |
3.6.8-62.0.1.el8_10 |
3.6.8-70.0.1.el8_10 |
python: cpython: Arbitrary writes via tarfile realpath overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4517
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| platform-python-setuptools |
CVE-2024-6345 |
高危 |
39.2.0-7.el8 |
39.2.0-8.el8_10 |
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-07-15 01:15 修改: 2025-11-04 17:16
|
| python3-libs |
CVE-2024-11168 |
高危 |
3.6.8-62.0.1.el8_10 |
3.6.8-69.0.1.el8_10 |
python: Improper validation of IPv6 and IPvFuture addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-11-12 22:15 修改: 2025-11-03 22:16
|
| python3-libs |
CVE-2024-12718 |
高危 |
3.6.8-62.0.1.el8_10 |
3.6.8-70.0.1.el8_10 |
cpython: python: Bypass extraction filter to modify file metadata outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12718
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-03 13:15 修改: 2025-07-24 16:15
|
| python3-libs |
CVE-2024-9287 |
高危 |
3.6.8-62.0.1.el8_10 |
3.6.8-69.0.1.el8_10 |
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-10-22 17:15 修改: 2025-11-03 23:17
|
| python3-libs |
CVE-2025-4138 |
高危 |
3.6.8-62.0.1.el8_10 |
3.6.8-70.0.1.el8_10 |
cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4138
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3-libs |
CVE-2025-4330 |
高危 |
3.6.8-62.0.1.el8_10 |
3.6.8-70.0.1.el8_10 |
cpython: python: Extraction filter bypass for linking outside extraction directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4330
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3-libs |
CVE-2025-4435 |
高危 |
3.6.8-62.0.1.el8_10 |
3.6.8-70.0.1.el8_10 |
cpython: Tarfile extracts filtered members when errorlevel=0
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4435
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-03 13:15 修改: 2025-06-04 14:54
|
| python3-libs |
CVE-2025-4517 |
高危 |
3.6.8-62.0.1.el8_10 |
3.6.8-70.0.1.el8_10 |
python: cpython: Arbitrary writes via tarfile realpath overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4517
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15
|
| python3-setuptools-wheel |
CVE-2024-6345 |
高危 |
39.2.0-7.el8 |
39.2.0-8.el8_10 |
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-07-15 01:15 修改: 2025-11-04 17:16
|
| sqlite-libs |
CVE-2025-6965 |
高危 |
3.26.0-19.0.1.el8_9 |
3.26.0-20.el8_10 |
sqlite: Integer Truncation in SQLite
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6965
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-07-15 14:15 修改: 2025-11-04 22:16
|
| libcurl |
CVE-2024-2398 |
中危 |
7.61.1-34.el8 |
7.61.1-34.el8_10.2 |
curl: HTTP/2 push headers memory-leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-03-27 08:15 修改: 2025-07-30 19:42
|
| libcurl |
CVE-2025-9086 |
中危 |
7.61.1-34.el8 |
7.61.1-34.el8_10.9 |
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| libgcc |
CVE-2020-11023 |
中危 |
8.5.0-22.0.1.el8_10 |
8.5.0-23.0.1.el8_10 |
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11023
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2020-04-29 21:15 修改: 2025-11-07 19:32
|
| expat |
CVE-2024-50602 |
中危 |
2.2.5-13.0.1.el8_10 |
2.2.5-16.0.1.el8_10 |
libexpat: expat: DoS via XML_ResumeParser
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-10-27 05:15 修改: 2025-10-15 17:54
|
| expat |
CVE-2024-8176 |
中危 |
2.2.5-13.0.1.el8_10 |
2.2.5-17.0.1.el8_10 |
libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8176
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-03-14 09:15 修改: 2025-12-09 16:17
|
| libkadm5 |
CVE-2024-37370 |
中危 |
1.18.2-27.0.1.el8_10 |
1.18.2-29.0.1.el8_10 |
krb5: GSS message token handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2024-06-28 22:15 修改: 2025-03-13 19:15
|
| libkadm5 |
CVE-2025-24528 |
中危 |
1.18.2-27.0.1.el8_10 |
1.18.2-31.0.1.el8_10 |
krb5: overflow when calculating ulog block size
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24528
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2026-01-16 18:16 修改: 2026-01-16 19:16
|
| libkadm5 |
CVE-2025-3576 |
中危 |
1.18.2-27.0.1.el8_10 |
1.18.2-32.0.1.el8_10 |
krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3576
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2025-04-15 06:15 修改: 2025-09-02 10:15
|
| libnghttp2 |
CVE-2024-28182 |
中危 |
1.33.0-5.el8_9 |
1.33.0-6.el8_10.1 |
nghttp2: CONTINUATION frames DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28182
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-04-04 15:15 修改: 2025-11-04 19:17
|
| libssh |
CVE-2025-5318 |
中危 |
0.9.6-14.el8 |
0.9.6-15.el8_10 |
libssh: out-of-bounds read in sftp_handle()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5318
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-24 14:15 修改: 2026-01-21 14:16
|
| libssh |
CVE-2025-5372 |
中危 |
0.9.6-14.el8 |
0.9.6-16.el8_10 |
libssh: Incorrect Return Code Handling in ssh_kdf() in libssh
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5372
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-07-04 06:15 修改: 2025-12-10 19:16
|
| libssh-config |
CVE-2025-5318 |
中危 |
0.9.6-14.el8 |
0.9.6-15.el8_10 |
libssh: out-of-bounds read in sftp_handle()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5318
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-06-24 14:15 修改: 2026-01-21 14:16
|
| libssh-config |
CVE-2025-5372 |
中危 |
0.9.6-14.el8 |
0.9.6-16.el8_10 |
libssh: Incorrect Return Code Handling in ssh_kdf() in libssh
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5372
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-07-04 06:15 修改: 2025-12-10 19:16
|
| libstdc++ |
CVE-2020-11023 |
中危 |
8.5.0-22.0.1.el8_10 |
8.5.0-23.0.1.el8_10 |
jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11023
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2020-04-29 21:15 修改: 2025-11-07 19:32
|
| libtasn1 |
CVE-2024-12133 |
中危 |
4.13-4.el8_7 |
4.13-5.el8_10 |
libtasn1: Inefficient DER Decoding in libtasn1 Leading to Potential Remote DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12133
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-02-10 16:15 修改: 2025-10-06 02:15
|
| glib2 |
CVE-2024-34397 |
中危 |
2.56.4-162.el8 |
2.56.4-166.el8_10 |
glib2: Signal subscription vulnerabilities
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34397
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-05-07 18:15 修改: 2025-11-04 22:16
|
| glib2 |
CVE-2024-52533 |
中危 |
2.56.4-162.el8 |
2.56.4-166.el8_10 |
glib: buffer overflow in set_connect_msg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52533
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-11-11 23:15 修改: 2025-06-17 01:23
|
| glib2 |
CVE-2025-4373 |
中危 |
2.56.4-162.el8 |
2.56.4-166.el8_10 |
glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4373
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-05-06 15:16 修改: 2025-09-02 03:15
|
| glibc |
CVE-2025-0395 |
中危 |
2.28-251.0.2.el8_10.2 |
2.28-251.0.3.el8_10.16 |
glibc: buffer overflow in the GNU C Library's assert()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0395
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-01-22 13:15 修改: 2025-04-30 05:15
|
| glibc |
CVE-2025-4802 |
中危 |
2.28-251.0.2.el8_10.2 |
2.28-251.0.3.el8_10.22 |
glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4802
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-05-16 20:15 修改: 2025-11-03 20:19
|
| glibc |
CVE-2025-8058 |
中危 |
2.28-251.0.2.el8_10.2 |
2.28-251.0.3.el8_10.25 |
glibc: Double free in glibc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8058
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-07-23 20:15 修改: 2025-11-04 22:16
|
| libxml2 |
CVE-2022-49043 |
中危 |
2.9.7-18.el8_10.1 |
2.9.7-18.el8_10.2 |
libxml: use-after-free in xmlXIncludeAddNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49043
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-01-26 06:15 修改: 2025-11-03 21:15
|
| libxml2 |
CVE-2025-32414 |
中危 |
2.9.7-18.el8_10.1 |
2.9.7-20.el8_10 |
libxml2: Out-of-Bounds Read in libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32414
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-04-08 03:15 修改: 2025-11-03 20:18
|
| libxml2 |
CVE-2025-32415 |
中危 |
2.9.7-18.el8_10.1 |
2.9.7-21.el8_10.3 |
libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32415
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-04-17 17:15 修改: 2025-11-03 20:18
|
| lz4-libs |
CVE-2019-17543 |
中危 |
1.8.3-3.el8_4 |
1.8.3-5.el8_10 |
lz4: heap-based buffer overflow in LZ4_write32
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17543
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2019-10-14 02:15 修改: 2024-11-21 04:32
|
| openssh |
CVE-2025-26465 |
中危 |
8.0p1-24.0.1.el8 |
8.0p1-26.0.1.el8_10 |
openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-26465
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-02-18 19:15 修改: 2025-11-03 22:18
|
| openssh |
CVE-2025-61984 |
中危 |
8.0p1-24.0.1.el8 |
8.0p1-27.0.1.el8_10 |
openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61984
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-10-06 19:15 修改: 2025-11-11 15:15
|
| openssh |
CVE-2025-61985 |
中危 |
8.0p1-24.0.1.el8 |
8.0p1-27.0.1.el8_10 |
openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61985
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-10-06 19:15 修改: 2025-10-08 19:38
|
| openssh-clients |
CVE-2025-26465 |
中危 |
8.0p1-24.0.1.el8 |
8.0p1-26.0.1.el8_10 |
openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-26465
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-02-18 19:15 修改: 2025-11-03 22:18
|
| openssh-clients |
CVE-2025-61984 |
中危 |
8.0p1-24.0.1.el8 |
8.0p1-27.0.1.el8_10 |
openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61984
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-10-06 19:15 修改: 2025-11-11 15:15
|
| openssh-clients |
CVE-2025-61985 |
中危 |
8.0p1-24.0.1.el8 |
8.0p1-27.0.1.el8_10 |
openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61985
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-10-06 19:15 修改: 2025-10-08 19:38
|
| openssh-server |
CVE-2025-26465 |
中危 |
8.0p1-24.0.1.el8 |
8.0p1-26.0.1.el8_10 |
openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-26465
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-02-18 19:15 修改: 2025-11-03 22:18
|
| openssh-server |
CVE-2025-61984 |
中危 |
8.0p1-24.0.1.el8 |
8.0p1-27.0.1.el8_10 |
openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61984
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-10-06 19:15 修改: 2025-11-11 15:15
|
| openssh-server |
CVE-2025-61985 |
中危 |
8.0p1-24.0.1.el8 |
8.0p1-27.0.1.el8_10 |
openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61985
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-10-06 19:15 修改: 2025-10-08 19:38
|
| glibc-common |
CVE-2025-0395 |
中危 |
2.28-251.0.2.el8_10.2 |
2.28-251.0.3.el8_10.16 |
glibc: buffer overflow in the GNU C Library's assert()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0395
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-01-22 13:15 修改: 2025-04-30 05:15
|
| openssl |
CVE-2025-9230 |
中危 |
1:1.1.1k-12.el8_9 |
1:1.1.1k-14.el8_10 |
openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9230
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2025-09-30 14:15 修改: 2025-11-04 22:16
|
| glibc-common |
CVE-2025-4802 |
中危 |
2.28-251.0.2.el8_10.2 |
2.28-251.0.3.el8_10.22 |
glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4802
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-05-16 20:15 修改: 2025-11-03 20:19
|
| openssl-devel |
CVE-2025-9230 |
中危 |
1:1.1.1k-12.el8_9 |
1:1.1.1k-14.el8_10 |
openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9230
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2025-09-30 14:15 修改: 2025-11-04 22:16
|
| glibc-common |
CVE-2025-8058 |
中危 |
2.28-251.0.2.el8_10.2 |
2.28-251.0.3.el8_10.25 |
glibc: Double free in glibc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8058
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-07-23 20:15 修改: 2025-11-04 22:16
|
| openssl-libs |
CVE-2025-9230 |
中危 |
1:1.1.1k-12.el8_9 |
1:1.1.1k-14.el8_10 |
openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9230
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-09-30 14:15 修改: 2025-11-04 22:16
|
| glibc-langpack-en |
CVE-2025-0395 |
中危 |
2.28-251.0.2.el8_10.2 |
2.28-251.0.3.el8_10.16 |
glibc: buffer overflow in the GNU C Library's assert()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0395
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-01-22 13:15 修改: 2025-04-30 05:15
|
| glibc-langpack-en |
CVE-2025-4802 |
中危 |
2.28-251.0.2.el8_10.2 |
2.28-251.0.3.el8_10.22 |
glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4802
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-05-16 20:15 修改: 2025-11-03 20:19
|
| pam |
CVE-2024-10041 |
中危 |
1.3.1-33.el8 |
1.3.1-36.0.1.el8_10 |
pam: libpam: Libpam vulnerable to read hashed password
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15
|
| perl-Carp |
CVE-2023-47038 |
中危 |
1.42-396.el8 |
1.50-439.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Data-Dumper |
CVE-2023-47038 |
中危 |
2.167-399.el8 |
2.174-440.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Digest |
CVE-2023-47038 |
中危 |
1.17-395.el8 |
1.20-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Digest-MD5 |
CVE-2023-47038 |
中危 |
2.55-396.el8 |
2.58-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Encode |
CVE-2023-47038 |
中危 |
4:2.97-3.el8 |
4:3.08-461.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Errno |
CVE-2023-47038 |
中危 |
1.28-422.el8 |
1.30-473.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Errno |
CVE-2025-40909 |
中危 |
1.28-422.el8 |
1.28-423.el8_10 |
perl: Perl threads have a working directory race condition where file operations may target unintended paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40909
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2025-05-30 13:15 修改: 2025-11-03 19:15
|
| perl-Exporter |
CVE-2023-47038 |
中危 |
5.72-396.el8 |
5.74-458.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-File-Path |
CVE-2023-47038 |
中危 |
2.15-2.el8 |
2.16-439.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-File-Temp |
CVE-2023-47038 |
中危 |
0.230.600-1.el8 |
1:0.231.100-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Getopt-Long |
CVE-2023-47038 |
中危 |
1:2.50-4.el8 |
1:2.52-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-HTTP-Tiny |
CVE-2023-47038 |
中危 |
0.074-3.el8 |
0.078-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-IO |
CVE-2023-47038 |
中危 |
1.38-422.el8 |
1.43-473.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-IO |
CVE-2025-40909 |
中危 |
1.38-422.el8 |
1.38-423.el8_10 |
perl: Perl threads have a working directory race condition where file operations may target unintended paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40909
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2025-05-30 13:15 修改: 2025-11-03 19:15
|
| perl-IO-Socket-IP |
CVE-2023-47038 |
中危 |
0.39-5.el8 |
0.41-2.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-MIME-Base64 |
CVE-2023-47038 |
中危 |
3.15-396.el8 |
3.15-1001.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-PathTools |
CVE-2023-47038 |
中危 |
3.74-1.el8 |
3.78-439.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Pod-Escapes |
CVE-2023-47038 |
中危 |
1:1.07-395.el8 |
1:1.07-396.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Pod-Perldoc |
CVE-2023-47038 |
中危 |
3.28-396.el8 |
3.28.01-443.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Pod-Simple |
CVE-2023-47038 |
中危 |
1:3.35-395.el8 |
1:3.42-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Pod-Usage |
CVE-2023-47038 |
中危 |
4:1.69-395.el8 |
4:2.01-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Scalar-List-Utils |
CVE-2023-47038 |
中危 |
3:1.49-2.el8 |
4:1.55-457.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Socket |
CVE-2023-47038 |
中危 |
4:2.027-3.el8 |
4:2.031-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Storable |
CVE-2023-47038 |
中危 |
1:3.11-3.el8 |
1:3.21-457.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Term-ANSIColor |
CVE-2023-47038 |
中危 |
4.06-396.el8 |
5.01-458.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Term-Cap |
CVE-2023-47038 |
中危 |
1.17-395.el8 |
1.17-396.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Text-ParseWords |
CVE-2023-47038 |
中危 |
3.30-395.el8 |
3.30-396.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Text-Tabs+Wrap |
CVE-2023-47038 |
中危 |
2013.0523-395.el8 |
2013.0523-396.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Time-Local |
CVE-2023-47038 |
中危 |
1:1.280-1.el8 |
2:1.300-4.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-URI |
CVE-2023-47038 |
中危 |
1.73-3.el8 |
1.76-5.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-Unicode-Normalize |
CVE-2023-47038 |
中危 |
1.25-396.el8 |
1.27-458.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-constant |
CVE-2023-47038 |
中危 |
1.33-396.el8 |
1.33-1001.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-interpreter |
CVE-2023-47038 |
中危 |
4:5.26.3-422.el8 |
4:5.32.1-473.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-interpreter |
CVE-2025-40909 |
中危 |
4:5.26.3-422.el8 |
4:5.26.3-423.el8_10 |
perl: Perl threads have a working directory race condition where file operations may target unintended paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40909
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2025-05-30 13:15 修改: 2025-11-03 19:15
|
| perl-libnet |
CVE-2023-47038 |
中危 |
3.11-3.el8 |
3.13-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-libs |
CVE-2023-47038 |
中危 |
4:5.26.3-422.el8 |
4:5.32.1-473.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-libs |
CVE-2025-40909 |
中危 |
4:5.26.3-422.el8 |
4:5.26.3-423.el8_10 |
perl: Perl threads have a working directory race condition where file operations may target unintended paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40909
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2025-05-30 13:15 修改: 2025-11-03 19:15
|
| perl-macros |
CVE-2023-47038 |
中危 |
4:5.26.3-422.el8 |
4:5.32.1-473.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-macros |
CVE-2025-40909 |
中危 |
4:5.26.3-422.el8 |
4:5.26.3-423.el8_10 |
perl: Perl threads have a working directory race condition where file operations may target unintended paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40909
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2025-05-30 13:15 修改: 2025-11-03 19:15
|
| perl-parent |
CVE-2023-47038 |
中危 |
1:0.237-1.el8 |
1:0.238-457.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-podlators |
CVE-2023-47038 |
中危 |
4.11-1.el8 |
1:4.14-457.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-threads |
CVE-2023-47038 |
中危 |
1:2.21-2.el8 |
1:2.25-457.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| perl-threads-shared |
CVE-2023-47038 |
中危 |
1.58-2.el8 |
1.61-457.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2023-12-18 14:15 修改: 2025-11-04 19:16
|
| glibc-langpack-en |
CVE-2025-8058 |
中危 |
2.28-251.0.2.el8_10.2 |
2.28-251.0.3.el8_10.25 |
glibc: Double free in glibc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8058
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-07-23 20:15 修改: 2025-11-04 22:16
|
| curl |
CVE-2024-2398 |
中危 |
7.61.1-34.el8 |
7.61.1-34.el8_10.2 |
curl: HTTP/2 push headers memory-leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-03-27 08:15 修改: 2025-07-30 19:42
|
| gnutls |
CVE-2024-12243 |
中危 |
3.6.16-8.el8_9.3 |
3.6.16-8.el8_10.3 |
gnutls: GnuTLS Impacted by Inefficient DER Decoding in libtasn1 Leading to Remote DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12243
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-02-10 16:15 修改: 2025-10-06 12:15
|
| gnutls |
CVE-2025-32988 |
中危 |
3.6.16-8.el8_9.3 |
3.6.16-8.el8_10.4 |
gnutls: Vulnerability in GnuTLS otherName SAN export
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32988
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-07-10 08:15 修改: 2025-12-01 22:15
|
| gnutls |
CVE-2025-32990 |
中危 |
3.6.16-8.el8_9.3 |
3.6.16-8.el8_10.4 |
gnutls: Vulnerability in GnuTLS certtool template parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32990
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-07-10 10:15 修改: 2025-12-01 22:15
|
| gnutls |
CVE-2025-6395 |
中危 |
3.6.16-8.el8_9.3 |
3.6.16-8.el8_10.4 |
gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6395
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-07-10 16:15 修改: 2025-12-01 22:15
|
| curl |
CVE-2025-9086 |
中危 |
7.61.1-34.el8 |
7.61.1-34.el8_10.9 |
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| platform-python |
CVE-2024-4032 |
中危 |
3.6.8-62.0.1.el8_10 |
3.6.8-67.0.1.el8_10 |
python: incorrect IPv4 and IPv6 private ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-06-17 15:15 修改: 2025-11-03 22:18
|
| platform-python |
CVE-2024-6232 |
中危 |
3.6.8-62.0.1.el8_10 |
3.6.8-67.0.1.el8_10 |
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-09-03 13:15 修改: 2025-11-03 23:17
|
| platform-python |
CVE-2024-6923 |
中危 |
3.6.8-62.0.1.el8_10 |
3.6.8-67.0.1.el8_10 |
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-08-01 14:15 修改: 2025-11-03 23:17
|
| platform-python |
CVE-2025-8194 |
中危 |
3.6.8-62.0.1.el8_10 |
3.6.8-71.0.1.el8_10 |
cpython: Cpython infinite loop when parsing a tarfile
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8194
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-07-28 19:15 修改: 2025-11-04 22:16
|
| bzip2-libs |
CVE-2019-12900 |
中危 |
1.0.6-26.el8 |
1.0.6-28.el8_10 |
bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail).
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12900
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2019-06-19 23:15 修改: 2025-06-09 16:15
|
| platform-python-setuptools |
CVE-2025-47273 |
中危 |
39.2.0-7.el8 |
39.2.0-9.el8_10 |
setuptools: Path Traversal Vulnerability in setuptools PackageIndex
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47273
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-05-17 16:15 修改: 2025-06-12 16:29
|
| krb5-devel |
CVE-2024-37370 |
中危 |
1.18.2-27.0.1.el8_10 |
1.18.2-29.0.1.el8_10 |
krb5: GSS message token handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2024-06-28 22:15 修改: 2025-03-13 19:15
|
| krb5-devel |
CVE-2025-24528 |
中危 |
1.18.2-27.0.1.el8_10 |
1.18.2-31.0.1.el8_10 |
krb5: overflow when calculating ulog block size
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24528
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2026-01-16 18:16 修改: 2026-01-16 19:16
|
| krb5-devel |
CVE-2025-3576 |
中危 |
1.18.2-27.0.1.el8_10 |
1.18.2-32.0.1.el8_10 |
krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3576
镜像层: sha256:0e0fd3886d14c578347e27fbc761e31dd7cddfac2d0b0344e8360bc81f77e441
发布日期: 2025-04-15 06:15 修改: 2025-09-02 10:15
|
| expat |
CVE-2024-45490 |
中危 |
2.2.5-13.0.1.el8_10 |
2.2.5-15.0.1.el8_10 |
libexpat: Negative Length Parsing Vulnerability in libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-08-30 03:15 修改: 2025-11-04 17:16
|
| expat |
CVE-2024-45491 |
中危 |
2.2.5-13.0.1.el8_10 |
2.2.5-15.0.1.el8_10 |
libexpat: Integer Overflow or Wraparound
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-08-30 03:15 修改: 2025-11-04 17:16
|
| krb5-libs |
CVE-2024-37370 |
中危 |
1.18.2-27.0.1.el8_10 |
1.18.2-29.0.1.el8_10 |
krb5: GSS message token handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-06-28 22:15 修改: 2025-03-13 19:15
|
| krb5-libs |
CVE-2025-24528 |
中危 |
1.18.2-27.0.1.el8_10 |
1.18.2-31.0.1.el8_10 |
krb5: overflow when calculating ulog block size
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24528
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2026-01-16 18:16 修改: 2026-01-16 19:16
|
| python3-libs |
CVE-2024-4032 |
中危 |
3.6.8-62.0.1.el8_10 |
3.6.8-67.0.1.el8_10 |
python: incorrect IPv4 and IPv6 private ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-06-17 15:15 修改: 2025-11-03 22:18
|
| python3-libs |
CVE-2024-6232 |
中危 |
3.6.8-62.0.1.el8_10 |
3.6.8-67.0.1.el8_10 |
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-09-03 13:15 修改: 2025-11-03 23:17
|
| python3-libs |
CVE-2024-6923 |
中危 |
3.6.8-62.0.1.el8_10 |
3.6.8-67.0.1.el8_10 |
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-08-01 14:15 修改: 2025-11-03 23:17
|
| python3-libs |
CVE-2025-8194 |
中危 |
3.6.8-62.0.1.el8_10 |
3.6.8-71.0.1.el8_10 |
cpython: Cpython infinite loop when parsing a tarfile
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8194
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-07-28 19:15 修改: 2025-11-04 22:16
|
| krb5-libs |
CVE-2025-3576 |
中危 |
1.18.2-27.0.1.el8_10 |
1.18.2-32.0.1.el8_10 |
krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3576
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-04-15 06:15 修改: 2025-09-02 10:15
|
| python3-setuptools-wheel |
CVE-2025-47273 |
中危 |
39.2.0-7.el8 |
39.2.0-9.el8_10 |
setuptools: Path Traversal Vulnerability in setuptools PackageIndex
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47273
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-05-17 16:15 修改: 2025-06-12 16:29
|
| expat |
CVE-2024-45492 |
中危 |
2.2.5-13.0.1.el8_10 |
2.2.5-15.0.1.el8_10 |
libexpat: integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2024-08-30 03:15 修改: 2025-11-04 17:16
|
| systemd |
CVE-2025-4598 |
中危 |
239-82.0.1.el8 |
239-82.0.4.el8_10.5 |
systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4598
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-05-30 14:15 修改: 2026-01-13 23:16
|
| systemd-libs |
CVE-2025-4598 |
中危 |
239-82.0.1.el8 |
239-82.0.4.el8_10.5 |
systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4598
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-05-30 14:15 修改: 2026-01-13 23:16
|
| systemd-pam |
CVE-2025-4598 |
中危 |
239-82.0.1.el8 |
239-82.0.4.el8_10.5 |
systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4598
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-05-30 14:15 修改: 2026-01-13 23:16
|
| vim-minimal |
CVE-2025-53905 |
中危 |
2:8.0.1763-19.0.1.el8_6.4 |
2:8.0.1763-21.0.1.el8_10 |
vim: Vim path traversial
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-53905
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-07-15 21:15 修改: 2025-11-04 22:16
|
| vim-minimal |
CVE-2025-53906 |
中危 |
2:8.0.1763-19.0.1.el8_6.4 |
2:8.0.1763-21.0.1.el8_10 |
vim: Vim path traversal
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-53906
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2025-07-15 21:15 修改: 2025-11-04 22:16
|
| openldap |
CVE-2023-2953 |
低危 |
2.4.46-18.el8 |
2.4.46-19.el8_10 |
openldap: null pointer dereference in ber_memalloc_x function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2953
镜像层: sha256:8e2fd143b5b86e076f942285111707725d0826c19b03f1ee6c75e276af3ae0fe
发布日期: 2023-05-30 22:15 修改: 2025-01-10 22:15
|