apache2 |
CVE-2017-3167 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: ap_get_basic_auth_pw() authentication bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3167
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:44
|
apache2 |
CVE-2017-3169 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: mod_ssl NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3169
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:44
|
apache2 |
CVE-2017-7679 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: mod_mime buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7679
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:50
|
apache2 |
CVE-2017-9788 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u10 |
httpd: Uninitialized memory reflection in mod_auth_digest
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9788
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-07-13 16:29 修改: 2023-11-07 02:50
|
apache2 |
CVE-2018-1312 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Weak Digest auth nonce generation in mod_auth_digest
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1312
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
apache2-bin |
CVE-2017-3167 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: ap_get_basic_auth_pw() authentication bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3167
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:44
|
apache2-bin |
CVE-2017-3169 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: mod_ssl NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3169
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:44
|
apache2-bin |
CVE-2017-7679 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: mod_mime buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7679
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:50
|
apache2-bin |
CVE-2017-9788 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u10 |
httpd: Uninitialized memory reflection in mod_auth_digest
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9788
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-07-13 16:29 修改: 2023-11-07 02:50
|
apache2-bin |
CVE-2018-1312 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Weak Digest auth nonce generation in mod_auth_digest
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1312
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
apache2-data |
CVE-2017-3167 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: ap_get_basic_auth_pw() authentication bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3167
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:44
|
apache2-data |
CVE-2017-3169 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: mod_ssl NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3169
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:44
|
apache2-data |
CVE-2017-7679 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: mod_mime buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7679
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:50
|
apache2-data |
CVE-2017-9788 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u10 |
httpd: Uninitialized memory reflection in mod_auth_digest
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9788
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-07-13 16:29 修改: 2023-11-07 02:50
|
apache2-data |
CVE-2018-1312 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Weak Digest auth nonce generation in mod_auth_digest
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1312
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
apache2-utils |
CVE-2017-3167 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: ap_get_basic_auth_pw() authentication bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3167
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:44
|
apache2-utils |
CVE-2017-3169 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: mod_ssl NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3169
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:44
|
apache2-utils |
CVE-2017-7679 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: mod_mime buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7679
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:50
|
apache2-utils |
CVE-2017-9788 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u10 |
httpd: Uninitialized memory reflection in mod_auth_digest
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9788
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-07-13 16:29 修改: 2023-11-07 02:50
|
apache2-utils |
CVE-2018-1312 |
严重 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Weak Digest auth nonce generation in mod_auth_digest
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1312
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
binutils |
CVE-2014-9939 |
严重 |
2.25-5+deb8u1 |
|
binutils: buffer overflow in ihex.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9939
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-21 06:59 修改: 2023-11-07 02:23
|
binutils |
CVE-2017-6969 |
严重 |
2.25-5+deb8u1 |
|
binutils: Heap-based buffer over-read in readelf when processing corrupt RL78 binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6969
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-17 09:59 修改: 2019-10-03 00:03
|
binutils |
CVE-2017-7226 |
严重 |
2.25-5+deb8u1 |
|
binutils: Heap-based buffer over-read in pe_ILF_object_p function in libbfd
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7226
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-22 16:59 修改: 2019-10-03 00:03
|
bzip2 |
CVE-2019-12900 |
严重 |
1.0.6-7+b3 |
1.0.6-7+deb8u1 |
bzip2: out-of-bounds write in function BZ2_decompress
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12900
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-06-19 23:15 修改: 2023-11-07 03:03
|
curl |
CVE-2016-7167 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: escape and unescape integer overflows
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7167
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-10-07 14:59 修改: 2023-11-07 02:34
|
curl |
CVE-2017-1000257 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u7 |
curl: IMAP FETCH response out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000257
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-31 21:29 修改: 2018-11-13 11:29
|
curl |
CVE-2017-8816 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u8 |
curl: NTLM buffer overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8816
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-29 18:29 修改: 2018-11-13 11:29
|
curl |
CVE-2017-8817 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u8 |
curl: FTP wildcard out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8817
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-29 18:29 修改: 2018-11-13 11:29
|
curl |
CVE-2018-1000007 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u9 |
curl: HTTP authentication leak in redirects
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000007
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-24 22:29 修改: 2022-06-13 19:10
|
curl |
CVE-2018-1000120 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: FTP path trickery leads to NIL byte out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000120
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-14 18:29 修改: 2019-06-18 22:15
|
curl |
CVE-2018-1000122 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: RTSP RTP buffer over-read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000122
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-14 18:29 修改: 2019-10-03 00:03
|
curl |
CVE-2018-1000301 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u11 |
curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000301
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-05-24 13:29 修改: 2019-10-03 00:03
|
curl |
CVE-2018-14618 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u12 |
curl: NTLM password overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14618
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-09-05 19:29 修改: 2019-04-22 17:48
|
curl |
CVE-2018-16839 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16839
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-31 18:29 修改: 2023-11-07 02:53
|
curl |
CVE-2018-16842 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Heap-based buffer over-read in the curl tool warning formatting
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16842
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-31 19:29 修改: 2019-08-06 17:15
|
curl |
CVE-2019-3822 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: NTLMv2 type-3 header stack buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3822
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
curl |
CVE-2019-5482 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u16 |
curl: heap buffer overflow in function tftp_receive_packet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5482
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-16 19:15 修改: 2023-11-07 03:11
|
inetutils-ping |
CVE-2020-10188 |
严重 |
2:1.9.2.39.3a460-3 |
2:1.9.2.39.3a460-3+deb8u1 |
telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10188
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2020-03-06 15:15 修改: 2023-11-07 03:14
|
libbsd0 |
CVE-2016-2090 |
严重 |
0.7.0-2 |
0.7.0-2+deb8u1 |
Off-by-one vulnerability in the fgetwln function in libbsd before 0.8. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2090
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-01-13 16:59 修改: 2023-11-07 02:30
|
libbsd0 |
CVE-2019-20367 |
严重 |
0.7.0-2 |
|
nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a com ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20367
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-01-08 17:15 修改: 2023-11-07 03:09
|
libbz2-1.0 |
CVE-2019-12900 |
严重 |
1.0.6-7+b3 |
1.0.6-7+deb8u1 |
bzip2: out-of-bounds write in function BZ2_decompress
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12900
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-06-19 23:15 修改: 2023-11-07 03:03
|
libcurl3 |
CVE-2016-7167 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: escape and unescape integer overflows
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7167
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-10-07 14:59 修改: 2023-11-07 02:34
|
libcurl3 |
CVE-2017-1000257 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u7 |
curl: IMAP FETCH response out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000257
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-31 21:29 修改: 2018-11-13 11:29
|
libcurl3 |
CVE-2017-8816 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u8 |
curl: NTLM buffer overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8816
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-29 18:29 修改: 2018-11-13 11:29
|
libcurl3 |
CVE-2017-8817 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u8 |
curl: FTP wildcard out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8817
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-29 18:29 修改: 2018-11-13 11:29
|
libcurl3 |
CVE-2018-1000007 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u9 |
curl: HTTP authentication leak in redirects
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000007
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-24 22:29 修改: 2022-06-13 19:10
|
libcurl3 |
CVE-2018-1000120 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: FTP path trickery leads to NIL byte out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000120
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-14 18:29 修改: 2019-06-18 22:15
|
libcurl3 |
CVE-2018-1000122 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: RTSP RTP buffer over-read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000122
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-14 18:29 修改: 2019-10-03 00:03
|
libcurl3 |
CVE-2018-1000301 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u11 |
curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000301
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-05-24 13:29 修改: 2019-10-03 00:03
|
libcurl3 |
CVE-2018-14618 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u12 |
curl: NTLM password overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14618
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-09-05 19:29 修改: 2019-04-22 17:48
|
libcurl3 |
CVE-2018-16839 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16839
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-31 18:29 修改: 2023-11-07 02:53
|
libcurl3 |
CVE-2018-16842 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Heap-based buffer over-read in the curl tool warning formatting
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16842
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-31 19:29 修改: 2019-08-06 17:15
|
libcurl3 |
CVE-2019-3822 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: NTLMv2 type-3 header stack buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3822
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
libcurl3 |
CVE-2019-5482 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u16 |
curl: heap buffer overflow in function tftp_receive_packet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5482
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-16 19:15 修改: 2023-11-07 03:11
|
libexpat1 |
CVE-2016-9063 |
严重 |
2.1.0-6+deb8u3 |
2.1.0-6+deb8u4 |
firefox: Possible integer overflow to fix inside XML_Parse in Expat
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9063
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-06-11 21:29 修改: 2022-06-27 16:42
|
libglib2.0-0 |
CVE-2018-16428 |
严重 |
2.42.1-1+b1 |
2.42.1-1+deb8u2 |
glib2: NULL pointer dereference in g_markup_parse_context_end_parse() function in gmarkup.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16428
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-09-04 00:29 修改: 2019-07-31 21:15
|
libglib2.0-0 |
CVE-2019-12450 |
严重 |
2.42.1-1+b1 |
2.42.1-1+deb8u1 |
glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12450
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-29 17:29 修改: 2023-11-07 03:03
|
libidn11 |
CVE-2017-14062 |
严重 |
1.29-1+deb8u2 |
1.29-1+deb8u3 |
libidn2: Integer overflow in puny_decode.c/decode_digit
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14062
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-31 16:29 修改: 2020-12-07 20:17
|
libncurses5 |
CVE-2017-10684 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10684
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-29 23:29 修改: 2023-11-07 02:38
|
libncurses5 |
CVE-2017-10685 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10685
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-29 23:29 修改: 2019-10-03 00:03
|
libncursesw5 |
CVE-2017-10684 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10684
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-29 23:29 修改: 2023-11-07 02:38
|
libncursesw5 |
CVE-2017-10685 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10685
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-29 23:29 修改: 2019-10-03 00:03
|
libprocps3 |
CVE-2018-1126 |
严重 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1126
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-05-23 13:29 修改: 2019-07-30 13:15
|
librtmp1 |
CVE-2015-8271 |
严重 |
2.4+20150115.gita107cef-1 |
2.4+20150115.gita107cef-1+deb8u1 |
The AMF3CD_AddProp function in amf.c in RTMPDump 2.4 allows remote RTM ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8271
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-04-13 14:59 修改: 2017-11-04 01:29
|
libsqlite3-0 |
CVE-2017-10989 |
严重 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u4 |
sqlite: Heap-buffer overflow in the getNodeSize function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10989
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-07 12:29 修改: 2019-10-03 00:03
|
libsqlite3-0 |
CVE-2017-2518 |
严重 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u4 |
An issue was discovered in certain Apple products. iOS before 10.3.2 i ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2518
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-22 05:29 修改: 2019-10-03 00:03
|
libsqlite3-0 |
CVE-2017-2519 |
严重 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u4 |
An issue was discovered in certain Apple products. iOS before 10.3.2 i ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2519
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-22 05:29 修改: 2019-10-03 00:03
|
libsqlite3-0 |
CVE-2017-2520 |
严重 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u4 |
An issue was discovered in certain Apple products. iOS before 10.3.2 i ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2520
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-22 05:29 修改: 2019-10-03 00:03
|
libsqlite3-0 |
CVE-2019-8457 |
严重 |
3.8.7.1-1+deb8u2 |
|
sqlite: heap out-of-bound read in function rtreenode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8457
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-30 16:29 修改: 2023-11-07 03:13
|
libssh2-1 |
CVE-2019-3858 |
严重 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u2 |
libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3858
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-03-21 21:29 修改: 2023-11-07 03:10
|
libssh2-1 |
CVE-2019-3859 |
严重 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u4 |
libssh2: Unchecked use of _libssh2_packet_require and _libssh2_packet_requirev resulting in out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3859
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:10
|
libssh2-1 |
CVE-2019-3860 |
严重 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u5 |
libssh2: Out-of-bounds reads with specially crafted SFTP packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3860
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-03-25 19:29 修改: 2023-11-07 03:10
|
libssh2-1 |
CVE-2019-3861 |
严重 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u2 |
libssh2: Out-of-bounds reads with specially crafted SSH packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3861
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-03-25 19:29 修改: 2023-11-07 03:10
|
libssh2-1 |
CVE-2019-3862 |
严重 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u2 |
libssh2: Out-of-bounds memory comparison with specially crafted message channel request
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3862
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:10
|
libtinfo5 |
CVE-2017-10684 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10684
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-29 23:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-10685 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10685
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-29 23:29 修改: 2019-10-03 00:03
|
libxml2 |
CVE-2016-4448 |
严重 |
2.9.1+dfsg1-5+deb8u4 |
|
libxml2: Format string vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4448
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-06-09 16:59 修改: 2023-02-12 23:21
|
libxml2 |
CVE-2017-16931 |
严重 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Mishandling parameter-entity references
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16931
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-23 21:29 修改: 2021-07-20 23:15
|
libxml2 |
CVE-2017-7375 |
严重 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Missing validation for external entities in xmlParsePEReference
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7375
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-19 19:29 修改: 2018-03-18 14:17
|
libxml2 |
CVE-2017-7376 |
严重 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Incorrect limit used for port values
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7376
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-19 19:29 修改: 2019-05-17 15:15
|
libxml2 |
CVE-2017-8872 |
严重 |
2.9.1+dfsg1-5+deb8u4 |
|
libxml2: Out-of-bounds read in htmlParseTryOrFinish
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8872
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-10 05:29 修改: 2020-09-10 01:15
|
linux-libc-dev |
CVE-2017-18017 |
严重 |
3.16.43-2 |
3.16.56-1 |
kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18017
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-03 06:29 修改: 2024-04-24 13:40
|
linux-libc-dev |
CVE-2017-7895 |
严重 |
3.16.43-2 |
3.16.43-2+deb8u1 |
kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7895
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-04-28 10:59 修改: 2023-01-19 16:13
|
linux-libc-dev |
CVE-2019-10126 |
严重 |
3.16.43-2 |
3.16.68-2 |
kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10126
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-06-14 14:29 修改: 2023-02-12 23:32
|
linux-libc-dev |
CVE-2019-14895 |
严重 |
3.16.43-2 |
3.16.81-1 |
kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14895
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-29 14:15 修改: 2023-02-12 23:36
|
linux-libc-dev |
CVE-2019-14896 |
严重 |
3.16.43-2 |
3.16.81-1 |
kernel: heap-based buffer overflow in lbs_ibss_join_existing function in drivers/net/wireless/marvell/libertas/cfg.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14896
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-27 09:15 修改: 2023-02-12 23:36
|
linux-libc-dev |
CVE-2019-14897 |
严重 |
3.16.43-2 |
3.16.81-1 |
kernel: stack-based buffer overflow in add_ie_rates function in drivers/net/wireless/marvell/libertas/cfg.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14897
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-29 15:15 修改: 2023-02-12 23:36
|
linux-libc-dev |
CVE-2019-14901 |
严重 |
3.16.43-2 |
3.16.81-1 |
kernel: heap overflow in marvell/mwifiex/tdls.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14901
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-29 15:15 修改: 2023-02-12 23:37
|
linux-libc-dev |
CVE-2019-15505 |
严重 |
3.16.43-2 |
3.16.81-1 |
kernel: out of bounds read in drivers/media/usb/dvb-usb/technisat-usb2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15505
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-23 06:15 修改: 2023-11-07 03:05
|
linux-libc-dev |
CVE-2019-15926 |
严重 |
3.16.43-2 |
3.16.74-1 |
kernel: out of bounds access in functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15926
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-04 21:15 修改: 2023-11-07 03:05
|
linux-libc-dev |
CVE-2019-16746 |
严重 |
3.16.43-2 |
3.16.81-1 |
kernel: buffer-overflow hardening in WiFi beacon validation code.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16746
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-24 06:15 修改: 2023-11-07 03:05
|
linux-libc-dev |
CVE-2019-17133 |
严重 |
3.16.43-2 |
3.16.81-1 |
kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17133
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-10-04 12:15 修改: 2022-11-03 02:41
|
login |
CVE-2017-12424 |
严重 |
1:4.2-3+deb8u3 |
|
shadow-utils: Buffer overflow via newusers tool
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12424
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-04 09:29 修改: 2021-03-23 20:02
|
ncurses-base |
CVE-2017-10684 |
严重 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10684
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-29 23:29 修改: 2023-11-07 02:38
|
ncurses-base |
CVE-2017-10685 |
严重 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10685
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-29 23:29 修改: 2019-10-03 00:03
|
ncurses-bin |
CVE-2017-10684 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10684
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-29 23:29 修改: 2023-11-07 02:38
|
ncurses-bin |
CVE-2017-10685 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10685
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-29 23:29 修改: 2019-10-03 00:03
|
passwd |
CVE-2017-12424 |
严重 |
1:4.2-3+deb8u3 |
|
shadow-utils: Buffer overflow via newusers tool
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12424
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-04 09:29 修改: 2021-03-23 20:02
|
perl |
CVE-2017-12883 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u9 |
perl: Buffer over-read in regular expression parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12883
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl |
CVE-2018-18311 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u12 |
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18311
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl |
CVE-2018-6797 |
严重 |
5.20.2-3+deb8u6 |
|
perl: heap write overflow in regcomp.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6797
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
perl |
CVE-2018-6913 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u10 |
perl: heap buffer overflow in pp_pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6913
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
perl-base |
CVE-2017-12883 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u9 |
perl: Buffer over-read in regular expression parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12883
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl-base |
CVE-2018-18311 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u12 |
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18311
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl-base |
CVE-2018-6797 |
严重 |
5.20.2-3+deb8u6 |
|
perl: heap write overflow in regcomp.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6797
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
perl-base |
CVE-2018-6913 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u10 |
perl: heap buffer overflow in pp_pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6913
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
perl-modules |
CVE-2017-12883 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u9 |
perl: Buffer over-read in regular expression parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12883
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl-modules |
CVE-2018-18311 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u12 |
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18311
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl-modules |
CVE-2018-6797 |
严重 |
5.20.2-3+deb8u6 |
|
perl: heap write overflow in regcomp.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6797
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
perl-modules |
CVE-2018-6913 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u10 |
perl: heap buffer overflow in pp_pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6913
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
procps |
CVE-2018-1126 |
严重 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1126
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-05-23 13:29 修改: 2019-07-30 13:15
|
zlib1g |
CVE-2016-9841 |
严重 |
1:1.2.8.dfsg-2+b1 |
1:1.2.8.dfsg-2+deb8u1 |
zlib: Out-of-bounds pointer arithmetic in inffast.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9841
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-05-23 04:29 修改: 2023-11-07 02:37
|
zlib1g |
CVE-2016-9843 |
严重 |
1:1.2.8.dfsg-2+b1 |
1:1.2.8.dfsg-2+deb8u1 |
zlib: Big-endian out-of-bounds pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9843
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-05-23 04:29 修改: 2023-11-07 02:37
|
file |
CVE-2019-8907 |
高危 |
1:5.22+15-2+deb8u3 |
1:5.22+15-2+deb8u5 |
file: do_core_note in readelf.c allows remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8907
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-02-18 17:29 修改: 2020-08-24 17:37
|
g++-4.9 |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
gcc-4.8-base |
CVE-2018-12886 |
高危 |
4.8.4-1 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
gcc-4.9 |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
gcc-4.9-base |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
gnupg |
CVE-2018-12020 |
高危 |
1.4.18-7+deb8u3 |
1.4.18-7+deb8u5 |
gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12020
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-06-08 21:29 修改: 2022-04-18 17:30
|
gpgv |
CVE-2018-12020 |
高危 |
1.4.18-7+deb8u3 |
1.4.18-7+deb8u5 |
gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12020
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-06-08 21:29 修改: 2022-04-18 17:30
|
apache2 |
CVE-2018-1303 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1303
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
libapt-pkg4.12 |
CVE-2019-3462 |
高危 |
1.0.9.8.4 |
1.0.9.8.5 |
Incorrect sanitation of the 302 redirect field in HTTP transport metho ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3462
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-28 21:29 修改: 2023-11-07 03:09
|
libasan1 |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libatomic1 |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libblkid1 |
CVE-2016-2779 |
高危 |
2.25.2-6 |
|
util-linux: runuser tty hijack via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2779
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-02-07 15:59 修改: 2019-01-04 14:14
|
apache2-bin |
CVE-2017-15710 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15710
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:40
|
apache2-bin |
CVE-2017-15715 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: <FilesMatch> bypass with a trailing newline in the file name
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15715
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:40
|
apache2-bin |
CVE-2017-7668 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: ap_find_token() buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7668
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:50
|
libc-bin |
CVE-2017-1000366 |
高危 |
2.19-18+deb8u9 |
2.19-18+deb8u10 |
glibc: heap/stack gap jumping via unbounded stack allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000366
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-19 16:29 修改: 2020-10-15 13:28
|
libc-dev-bin |
CVE-2017-1000366 |
高危 |
2.19-18+deb8u9 |
2.19-18+deb8u10 |
glibc: heap/stack gap jumping via unbounded stack allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000366
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 16:29 修改: 2020-10-15 13:28
|
libc6 |
CVE-2017-1000366 |
高危 |
2.19-18+deb8u9 |
2.19-18+deb8u10 |
glibc: heap/stack gap jumping via unbounded stack allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000366
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-19 16:29 修改: 2020-10-15 13:28
|
libc6-dev |
CVE-2017-1000366 |
高危 |
2.19-18+deb8u9 |
2.19-18+deb8u10 |
glibc: heap/stack gap jumping via unbounded stack allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000366
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 16:29 修改: 2020-10-15 13:28
|
libcilkrts5 |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
apache2-utils |
CVE-2017-15710 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15710
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:40
|
apache2-utils |
CVE-2017-15715 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: <FilesMatch> bypass with a trailing newline in the file name
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15715
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:40
|
apache2-utils |
CVE-2017-7668 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: ap_find_token() buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7668
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:50
|
apache2-utils |
CVE-2017-9798 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u11 |
httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9798
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-09-18 15:29 修改: 2023-11-07 02:50
|
apache2-utils |
CVE-2018-1303 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1303
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
apache2-utils |
CVE-2018-17199 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u13 |
httpd: mod_session_cookie does not respect expiry time
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17199
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-01-30 22:29 修改: 2023-11-07 02:54
|
apache2-utils |
CVE-2019-0217 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u14 |
httpd: mod_auth_digest: access control bypass due to race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0217
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-04-08 21:29 修改: 2023-11-07 03:01
|
apt |
CVE-2019-3462 |
高危 |
1.0.9.8.4 |
1.0.9.8.5 |
Incorrect sanitation of the 302 redirect field in HTTP transport metho ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3462
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-28 21:29 修改: 2023-11-07 03:09
|
bash |
CVE-2019-9924 |
高危 |
4.3-11+deb8u1 |
4.3-11+deb8u2 |
bash: BASH_CMD is writable in restricted bash shells
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9924
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-03-22 08:29 修改: 2022-04-05 20:11
|
apache2-bin |
CVE-2017-9798 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u11 |
httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9798
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-09-18 15:29 修改: 2023-11-07 02:50
|
apache2-bin |
CVE-2018-1303 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1303
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
apache2-bin |
CVE-2018-17199 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u13 |
httpd: mod_session_cookie does not respect expiry time
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17199
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-01-30 22:29 修改: 2023-11-07 02:54
|
binutils |
CVE-2017-12448 |
高危 |
2.25-5+deb8u1 |
|
binutils: heap use after free in bfd_cache_close function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12448
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-04 15:29 修改: 2017-08-07 18:40
|
libcurl3 |
CVE-2016-7141 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Incorrect reuse of client certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7141
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-10-03 21:59 修改: 2018-11-13 11:29
|
libcurl3 |
CVE-2016-8625 |
高危 |
7.38.0-4+deb8u5 |
|
curl: IDNA 2003 makes curl use wrong host
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8625
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-01 06:29 修改: 2023-11-07 02:36
|
libcurl3 |
CVE-2016-9586 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: printf floating point buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9586
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-23 18:29 修改: 2023-11-07 02:37
|
libcurl3 |
CVE-2017-1000254 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: FTP PWD response parser out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000254
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-06 13:29 修改: 2023-11-07 02:37
|
libcurl3 |
CVE-2018-1000121 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: LDAP NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000121
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-14 18:29 修改: 2019-07-23 23:15
|
libcurl3 |
CVE-2018-16890 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: NTLM type-2 heap out-of-bounds buffer read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16890
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-02-06 20:29 修改: 2023-11-07 02:53
|
libcurl3 |
CVE-2019-3823 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: SMTP end-of-response out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3823
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
libcurl3 |
CVE-2019-5436 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u15 |
curl: TFTP receive heap buffer overflow in tftp_receive_packet() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5436
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-28 19:29 修改: 2023-11-07 03:11
|
libdb5.3 |
CVE-2017-10140 |
高危 |
5.3.28-9 |
5.3.28-9+deb8u1 |
libdb: Reads DB_CONFIG from the current working directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10140
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-04-16 17:29 修改: 2020-07-15 18:15
|
binutils |
CVE-2017-12449 |
高危 |
2.25-5+deb8u1 |
|
binutils: out of bounds heap read in _bfd_vms_save_sized_string function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12449
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-04 15:29 修改: 2017-08-07 18:39
|
libexpat1 |
CVE-2017-9233 |
高危 |
2.1.0-6+deb8u3 |
2.1.0-6+deb8u4 |
expat: Inifinite loop due to invalid XML in external entity
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9233
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-07-25 20:29 修改: 2023-11-07 02:50
|
libexpat1 |
CVE-2018-20843 |
高危 |
2.1.0-6+deb8u3 |
2.1.0-6+deb8u5 |
expat: large number of colons in input makes parser consume high amount of resources, leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20843
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-06-24 17:15 修改: 2023-11-07 02:56
|
libexpat1 |
CVE-2019-15903 |
高危 |
2.1.0-6+deb8u3 |
2.1.0-6+deb8u6 |
expat: heap-based buffer over-read via crafted XML input
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15903
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-09-04 06:15 修改: 2023-11-07 03:05
|
libffi6 |
CVE-2017-1000376 |
高危 |
3.1-2+b2 |
3.1-2+deb8u1 |
libffi requests an executable stack allowing attackers to more easily ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000376
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 16:29 修改: 2023-09-22 18:25
|
libgcc-4.9-dev |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libgcc1 |
CVE-2018-12886 |
高危 |
1:4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
binutils |
CVE-2017-12450 |
高危 |
2.25-5+deb8u1 |
|
binutils: out of bounds heap write in alpha_vms_object_p function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12450
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-04 15:29 修改: 2017-08-07 18:38
|
binutils |
CVE-2017-12451 |
高危 |
2.25-5+deb8u1 |
|
binutils: out of bounds stack read in _bfd_xcoff_read_ar_hdr function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12451
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-04 15:29 修改: 2017-08-07 18:37
|
libglib2.0-0 |
CVE-2018-16429 |
高危 |
2.42.1-1+b1 |
2.42.1-1+deb8u2 |
glib2: Out-of-bounds read in g_markup_parse_context_parse() in gmarkup.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16429
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-09-04 00:29 修改: 2023-11-07 02:53
|
libglib2.0-0 |
CVE-2019-13012 |
高危 |
2.42.1-1+b1 |
2.42.1-1+deb8u3 |
glib2: insecure permissions for files and directories
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13012
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-06-28 15:15 修改: 2023-11-07 03:03
|
libgnutls-deb0-28 |
CVE-2017-7507 |
高危 |
3.3.8-6+deb8u5 |
3.3.8-6+deb8u6 |
gnutls: Crash upon receiving well-formed status_request extension
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7507
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-16 19:29 修改: 2018-01-05 02:31
|
libgomp1 |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
binutils |
CVE-2017-12452 |
高危 |
2.25-5+deb8u1 |
|
binutils: out of bounds heap read in bfd_mach_o_i386_canonicalize_one_reloc function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12452
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-04 15:29 修改: 2017-08-07 18:36
|
libitm1 |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libldap-2.4-2 |
CVE-2019-13565 |
高危 |
2.4.40+dfsg-1+deb8u2 |
2.4.40+dfsg-1+deb8u5 |
openldap: ACL restrictions bypass due to sasl_ssf value being set permanently
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13565
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-07-26 13:15 修改: 2023-11-07 03:03
|
libldap-2.4-2 |
CVE-2020-12243 |
高危 |
2.4.40+dfsg-1+deb8u2 |
2.4.40+dfsg-1+deb8u6 |
openldap: denial of service via nested boolean expressions in LDAP search filters
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12243
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-04-28 19:15 修改: 2022-04-29 13:24
|
liblsan0 |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libmagic1 |
CVE-2019-18218 |
高危 |
1:5.22+15-2+deb8u3 |
1:5.22+15-2+deb8u6 |
file: heap-based buffer overflow in cdf_read_property_info in cdf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18218
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-10-21 05:15 修改: 2023-11-07 03:06
|
libmagic1 |
CVE-2019-8907 |
高危 |
1:5.22+15-2+deb8u3 |
1:5.22+15-2+deb8u5 |
file: do_core_note in readelf.c allows remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8907
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-02-18 17:29 修改: 2020-08-24 17:37
|
libmount1 |
CVE-2016-2779 |
高危 |
2.25.2-6 |
|
util-linux: runuser tty hijack via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2779
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-02-07 15:59 修改: 2019-01-04 14:14
|
binutils |
CVE-2017-12453 |
高危 |
2.25-5+deb8u1 |
|
binutils: out of bounds heap read in __bfd_vms_slurp_eeom function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12453
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-04 15:29 修改: 2017-08-07 18:35
|
binutils |
CVE-2017-12454 |
高危 |
2.25-5+deb8u1 |
|
binutils: Arbitrary memory read in _bfd_vms_slurp_egs function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12454
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-04 15:29 修改: 2017-08-07 13:05
|
libncurses5 |
CVE-2017-11112 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in append_acs function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11112
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-07-08 17:29 修改: 2018-10-21 10:29
|
libncurses5 |
CVE-2017-11113 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference vulnerability in _nc_parse_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11113
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-07-08 17:29 修改: 2019-05-06 15:00
|
libncurses5 |
CVE-2017-13728 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Infinite loop in the next_char function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13728
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncurses5 |
CVE-2017-16879 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u3 |
ncurses: Stack-based buffer overflow in the _nc_write_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16879
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-11-22 22:29 修改: 2023-11-07 02:40
|
binutils |
CVE-2017-12455 |
高危 |
2.25-5+deb8u1 |
|
binutils: out of bounds heap read in evax_bfd_print_emh function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12455
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-04 15:29 修改: 2017-08-07 13:05
|
binutils |
CVE-2017-12456 |
高危 |
2.25-5+deb8u1 |
|
binutils: out of bounds heap read in read_symbol_stabs_debugging_inf function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12456
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-04 15:29 修改: 2018-01-09 02:29
|
libncursesw5 |
CVE-2017-11112 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in append_acs function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11112
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-07-08 17:29 修改: 2018-10-21 10:29
|
libncursesw5 |
CVE-2017-11113 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference vulnerability in _nc_parse_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11113
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-07-08 17:29 修改: 2019-05-06 15:00
|
libncursesw5 |
CVE-2017-13728 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Infinite loop in the next_char function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13728
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncursesw5 |
CVE-2017-16879 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u3 |
ncurses: Stack-based buffer overflow in the _nc_write_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16879
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-11-22 22:29 修改: 2023-11-07 02:40
|
libpcre3 |
CVE-2015-3217 |
高危 |
2:8.35-3.3+deb8u4 |
|
pcre: stack overflow caused by mishandled group empty match (8.38/11)
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-3217
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2016-12-13 16:59 修改: 2018-05-18 01:29
|
libpcre3 |
CVE-2017-7186 |
高危 |
2:8.35-3.3+deb8u4 |
|
pcre: Invalid Unicode property lookup (8.41/7, 10.24/2)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7186
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-03-20 00:59 修改: 2018-08-17 10:29
|
binutils |
CVE-2017-12457 |
高危 |
2.25-5+deb8u1 |
|
binutils: NULL pointer dereference in bfd_make_section_with_flags function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12457
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-04 15:29 修改: 2017-08-07 13:20
|
libprocps3 |
CVE-2018-1122 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: Local privilege escalation in top
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1122
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-05-23 14:29 修改: 2019-10-03 00:03
|
libprocps3 |
CVE-2018-1123 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: denial of service in ps via mmap buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1123
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-05-23 14:29 修改: 2023-11-07 02:55
|
libprocps3 |
CVE-2018-1124 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: Integer overflows leading to heap overflow in file2strvec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1124
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-05-23 13:29 修改: 2020-09-09 14:58
|
libprocps3 |
CVE-2018-1125 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: stack buffer overflow in pgrep
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1125
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-05-23 14:29 修改: 2020-09-09 14:59
|
libquadmath0 |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
binutils |
CVE-2017-12458 |
高危 |
2.25-5+deb8u1 |
|
binutils: out of bounds heap read in nlm_swap_auxiliary_headers_in function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12458
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-04 15:29 修改: 2017-08-07 14:23
|
librtmp1 |
CVE-2015-8270 |
高危 |
2.4+20150115.gita107cef-1 |
2.4+20150115.gita107cef-1+deb8u1 |
The AMF3ReadString function in amf.c in RTMPDump 2.4 allows remote RTM ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8270
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-04-13 14:59 修改: 2017-11-04 01:29
|
libsasl2-2 |
CVE-2019-19906 |
高危 |
2.1.26.dfsg1-13+deb8u1 |
2.1.26.dfsg1-13+deb8u2 |
cyrus-sasl: denial of service in _sasl_add_string function
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19906
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-19 18:15 修改: 2023-11-07 03:07
|
libsasl2-modules-db |
CVE-2019-19906 |
高危 |
2.1.26.dfsg1-13+deb8u1 |
2.1.26.dfsg1-13+deb8u2 |
cyrus-sasl: denial of service in _sasl_add_string function
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19906
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-19 18:15 修改: 2023-11-07 03:07
|
libsmartcols1 |
CVE-2016-2779 |
高危 |
2.25.2-6 |
|
util-linux: runuser tty hijack via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2779
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-02-07 15:59 修改: 2019-01-04 14:14
|
binutils |
CVE-2017-12459 |
高危 |
2.25-5+deb8u1 |
|
binutils: out of bounds heap write in bfd_mach_o_read_symtab_strtab function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12459
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-04 15:29 修改: 2017-08-07 14:29
|
binutils |
CVE-2017-12799 |
高危 |
2.25-5+deb8u1 |
|
binutils: Heap-based 1 byte buffer over-write in elf_read_notes function in bfd/elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12799
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-10 18:29 修改: 2018-01-09 02:29
|
binutils |
CVE-2017-13710 |
高危 |
2.25-5+deb8u1 |
|
binutils: NULL pointer dereference in the setup_group function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13710
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-27 16:29 修改: 2023-11-07 02:38
|
binutils |
CVE-2017-14333 |
高危 |
2.25-5+deb8u1 |
|
binutils: Insuficient input validation in process_version_sections function in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14333
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-12 08:29 修改: 2018-01-09 02:29
|
binutils |
CVE-2017-14729 |
高危 |
2.25-5+deb8u1 |
|
binutils: Heap buffer overflow in the *_get_synthetic_symtab functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14729
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-25 16:29 修改: 2023-11-07 02:39
|
libsqlite3-0 |
CVE-2018-20346 |
高危 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u3 |
sqlite: Multiple flaws in sqlite which can be triggered via corrupted internal databases (Magellan)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20346
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-21 21:29 修改: 2023-11-07 02:56
|
libsqlite3-0 |
CVE-2018-20506 |
高危 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u3 |
sqlite: Multiple flaws in sqlite which can be triggered via corrupted internal databases (Magellan)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20506
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-04-03 18:29 修改: 2021-07-31 08:15
|
libsqlite3-0 |
CVE-2018-8740 |
高危 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u4 |
sqlite: NULL pointer dereference with databases with schema corrupted with CREATE TABLE AS allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8740
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-17 00:29 修改: 2023-11-07 03:01
|
libsqlite3-0 |
CVE-2019-20218 |
高危 |
3.8.7.1-1+deb8u2 |
|
sqlite: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20218
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-01-02 14:16 修改: 2022-10-07 17:56
|
libsqlite3-0 |
CVE-2019-5827 |
高危 |
3.8.7.1-1+deb8u2 |
|
sqlite: out-of-bounds access due to the use of 32-bit memory allocator interfaces
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5827
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-06-27 17:15 修改: 2023-11-07 03:12
|
libsqlite3-0 |
CVE-2020-11655 |
高危 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u5 |
sqlite: malformed window-function query leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11655
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-04-09 03:15 修改: 2022-04-08 10:34
|
binutils |
CVE-2017-14745 |
高危 |
2.25-5+deb8u1 |
|
binutils: Integer overflow in the *_get_synthetic_symtab functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14745
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-26 16:29 修改: 2017-09-29 18:37
|
binutils |
CVE-2017-7223 |
高危 |
2.25-5+deb8u1 |
|
binutils: Global buffer overflow when attempting to unget EOF character
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7223
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-22 16:59 修改: 2018-01-09 02:29
|
binutils |
CVE-2017-7225 |
高危 |
2.25-5+deb8u1 |
|
binutils: Null pointer dereference and invalid write in find_nearest_line function in addr2line
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7225
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-22 16:59 修改: 2018-01-09 02:29
|
binutils |
CVE-2017-7227 |
高危 |
2.25-5+deb8u1 |
|
binutils: Heap-based buffer overflow in ld due to missing null termination
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7227
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-22 16:59 修改: 2018-01-09 02:29
|
binutils |
CVE-2017-7300 |
高危 |
2.25-5+deb8u1 |
|
binutils: Heap-buffer overflow in aout_link_add_symbols function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7300
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-29 15:59 修改: 2017-03-31 17:00
|
libssh2-1 |
CVE-2019-13115 |
高危 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u4 |
libssh2: integer overflow in kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c leads to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13115
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-07-16 18:15 修改: 2023-11-07 03:03
|
libssh2-1 |
CVE-2019-17498 |
高危 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u6 |
libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17498
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-10-21 22:15 修改: 2023-11-07 03:06
|
libssh2-1 |
CVE-2019-3855 |
高危 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u2 |
libssh2: Integer overflow in transport read resulting in out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3855
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-03-21 21:29 修改: 2023-11-07 03:10
|
libssh2-1 |
CVE-2019-3856 |
高危 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u2 |
libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3856
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-03-25 19:29 修改: 2023-11-07 03:10
|
libssh2-1 |
CVE-2019-3857 |
高危 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u2 |
libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3857
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-03-25 19:29 修改: 2023-11-07 03:10
|
libssh2-1 |
CVE-2019-3863 |
高危 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u2 |
libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3863
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-03-25 18:29 修改: 2023-11-07 03:10
|
libssl1.0.0 |
CVE-2018-0732 |
高危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u9 |
openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0732
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-12 13:29 修改: 2023-11-07 02:51
|
libstdc++-4.9-dev |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libstdc++6 |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libsystemd0 |
CVE-2017-18078 |
高危 |
215-17+deb8u7 |
215-17+deb8u12 |
systemd: Unsafe handling of hard links allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18078
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-01-29 05:29 修改: 2023-11-07 02:41
|
libsystemd0 |
CVE-2018-15686 |
高危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: line splitting via fgets() allows for state injection during daemon-reexec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15686
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-10-26 14:29 修改: 2023-11-07 02:53
|
libsystemd0 |
CVE-2018-15688 |
高危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15688
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-10-26 14:29 修改: 2022-01-31 18:30
|
libsystemd0 |
CVE-2018-16864 |
高危 |
215-17+deb8u7 |
215-17+deb8u9 |
systemd: stack overflow when calling syslog from a command with long cmdline
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16864
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-11 20:29 修改: 2023-02-13 04:51
|
libsystemd0 |
CVE-2018-16865 |
高危 |
215-17+deb8u7 |
215-17+deb8u9 |
systemd: stack overflow when receiving many journald entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16865
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-11 21:29 修改: 2023-02-13 04:52
|
libsystemd0 |
CVE-2019-3842 |
高危 |
215-17+deb8u7 |
215-17+deb8u12 |
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3842
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-04-09 21:29 修改: 2023-11-07 03:10
|
libtasn1-6 |
CVE-2017-10790 |
高危 |
4.2-3+deb8u2 |
4.2-3+deb8u4 |
libtasn1: NULL pointer dereference in the _asn1_check_identifier function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10790
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-02 03:29 修改: 2023-11-07 02:38
|
libtasn1-6 |
CVE-2017-6891 |
高危 |
4.2-3+deb8u2 |
4.2-3+deb8u3 |
libtasn1: Stack-based buffer overflow in asn1_find_node()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6891
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-22 19:29 修改: 2023-11-07 02:49
|
binutils |
CVE-2017-7301 |
高危 |
2.25-5+deb8u1 |
|
binutils: Off-by-one error in aout_link_add_symbols function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7301
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-29 15:59 修改: 2017-03-31 17:02
|
binutils |
CVE-2017-7302 |
高危 |
2.25-5+deb8u1 |
|
binutils: Out-of-bounds read in wap_std_reloc_out function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7302
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-29 15:59 修改: 2017-03-31 16:28
|
libtinfo5 |
CVE-2017-11112 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in append_acs function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11112
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-07-08 17:29 修改: 2018-10-21 10:29
|
libtinfo5 |
CVE-2017-11113 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference vulnerability in _nc_parse_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11113
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-07-08 17:29 修改: 2019-05-06 15:00
|
libtinfo5 |
CVE-2017-13728 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Infinite loop in the next_char function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13728
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-16879 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u3 |
ncurses: Stack-based buffer overflow in the _nc_write_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16879
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-11-22 22:29 修改: 2023-11-07 02:40
|
libtsan0 |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libubsan0 |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libudev1 |
CVE-2017-18078 |
高危 |
215-17+deb8u7 |
215-17+deb8u12 |
systemd: Unsafe handling of hard links allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18078
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-01-29 05:29 修改: 2023-11-07 02:41
|
libudev1 |
CVE-2018-15686 |
高危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: line splitting via fgets() allows for state injection during daemon-reexec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15686
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-10-26 14:29 修改: 2023-11-07 02:53
|
libudev1 |
CVE-2018-15688 |
高危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15688
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-10-26 14:29 修改: 2022-01-31 18:30
|
libudev1 |
CVE-2018-16864 |
高危 |
215-17+deb8u7 |
215-17+deb8u9 |
systemd: stack overflow when calling syslog from a command with long cmdline
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16864
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-11 20:29 修改: 2023-02-13 04:51
|
libudev1 |
CVE-2018-16865 |
高危 |
215-17+deb8u7 |
215-17+deb8u9 |
systemd: stack overflow when receiving many journald entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16865
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-11 21:29 修改: 2023-02-13 04:52
|
libudev1 |
CVE-2019-3842 |
高危 |
215-17+deb8u7 |
215-17+deb8u12 |
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3842
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-04-09 21:29 修改: 2023-11-07 03:10
|
libuuid1 |
CVE-2016-2779 |
高危 |
2.25.2-6 |
|
util-linux: runuser tty hijack via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2779
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-02-07 15:59 修改: 2019-01-04 14:14
|
binutils |
CVE-2017-7303 |
高危 |
2.25-5+deb8u1 |
|
binutils: Out-of-bounds read in find_link function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7303
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-29 15:59 修改: 2017-03-31 17:00
|
binutils |
CVE-2017-7304 |
高危 |
2.25-5+deb8u1 |
|
binutils: Out-of-bounds read in copy_special_section_fields function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7304
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-29 15:59 修改: 2017-03-31 17:06
|
binutils |
CVE-2017-8393 |
高危 |
2.25-5+deb8u1 |
|
binutils: Out-of-bounds read due to wrong assumption for objcopy and strip
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8393
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-01 18:59 修改: 2019-10-03 00:03
|
binutils |
CVE-2017-8394 |
高危 |
2.25-5+deb8u1 |
|
binutils: NULL pointer dereference in the _bfd_elf_large_com_section
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8394
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-01 18:59 修改: 2017-09-19 01:36
|
binutils |
CVE-2017-8395 |
高危 |
2.25-5+deb8u1 |
|
binutils: Out-of-bounds write in the _bfd_generic_get_section_contents function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8395
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-01 18:59 修改: 2017-09-19 01:36
|
libxml2 |
CVE-2017-0663 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Heap buffer overflow in xmlAddID
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-0663
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-14 13:29 修改: 2023-11-07 02:37
|
libxml2 |
CVE-2017-15412 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u6 |
libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15412
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-28 19:29 修改: 2023-11-07 02:39
|
libxml2 |
CVE-2017-16932 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
|
libxml2: Infinite recursion in parameter entities
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16932
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-23 21:29 修改: 2023-11-07 02:40
|
libxml2 |
CVE-2017-5130 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
|
chromium-browser: heap overflow in libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5130
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-07 23:29 修改: 2022-04-08 23:15
|
libxml2 |
CVE-2017-9047 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Buffer overflow in function xmlSnprintfElementContent
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9047
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-18 06:29 修改: 2023-11-07 02:50
|
libxml2 |
CVE-2017-9048 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Stack-based buffer overflow in function xmlSnprintfElementContent
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9048
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-18 06:29 修改: 2023-11-07 02:50
|
libxml2 |
CVE-2017-9049 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Heap-based buffer over-read in function xmlDictComputeFastKey
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9049
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-18 06:29 修改: 2023-11-07 02:50
|
libxml2 |
CVE-2017-9050 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Heap-based buffer over-read in function xmlDictAddString
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9050
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-18 06:29 修改: 2023-11-07 02:50
|
libxml2 |
CVE-2018-14404 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u7 |
libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14404
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-19 13:29 修改: 2020-09-10 01:15
|
libxml2 |
CVE-2019-19956 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u8 |
libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19956
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-24 16:15 修改: 2023-11-07 03:07
|
libxml2 |
CVE-2019-20388 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
|
libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20388
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-01-21 23:15 修改: 2023-11-09 14:44
|
libxml2 |
CVE-2020-7595 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
|
libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-7595
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-01-21 23:15 修改: 2023-11-07 03:26
|
binutils |
CVE-2017-8396 |
高危 |
2.25-5+deb8u1 |
|
binutils: Out-of-bounds read in the existing reloc offset range tests
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8396
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-01 18:59 修改: 2017-09-19 01:36
|
binutils |
CVE-2017-8397 |
高危 |
2.25-5+deb8u1 |
|
binutils: Out-of-bounds read and write while processing binary containing reloc(s) with negative addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8397
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-01 18:59 修改: 2017-09-19 01:36
|
binutils |
CVE-2017-8398 |
高危 |
2.25-5+deb8u1 |
|
binutils: Out-of-bounds read while dumping the debug information from a corrupt binary
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8398
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-01 18:59 修改: 2017-09-19 01:36
|
binutils |
CVE-2018-6323 |
高危 |
2.25-5+deb8u1 |
|
binutils: Integer overflow in elf_object_p function in elfcode.h
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6323
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-26 08:29 修改: 2019-10-31 01:15
|
binutils |
CVE-2018-6543 |
高危 |
2.25-5+deb8u1 |
|
binutils: integer overflow in load_specific_debug_section function in objdump.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6543
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-02 09:29 修改: 2019-10-31 01:15
|
binutils |
CVE-2018-7208 |
高危 |
2.25-5+deb8u1 |
|
binutils: Improper bounds check in coffgen.c:coff_pointerize_aux() allows for denial of service when parsing a crafted COFF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7208
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-18 04:29 修改: 2019-10-31 01:15
|
binutils |
CVE-2018-7643 |
高危 |
2.25-5+deb8u1 |
|
binutils: Integer overflow in the display_debug_ranges function resulting in crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7643
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-02 15:29 修改: 2019-10-31 01:15
|
bsdutils |
CVE-2016-2779 |
高危 |
1:2.25.2-6 |
|
util-linux: runuser tty hijack via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2779
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-02-07 15:59 修改: 2019-01-04 14:14
|
apache2-bin |
CVE-2019-0217 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u14 |
httpd: mod_auth_digest: access control bypass due to race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0217
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-04-08 21:29 修改: 2023-11-07 03:01
|
cpp-4.9 |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
apache2 |
CVE-2018-17199 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u13 |
httpd: mod_session_cookie does not respect expiry time
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17199
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-01-30 22:29 修改: 2023-11-07 02:54
|
linux-libc-dev |
CVE-2013-7445 |
高危 |
3.16.43-2 |
|
kernel: memory exhaustion via crafted Graphics Execution Manager (GEM) objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-7445
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-10-16 01:59 修改: 2015-10-16 16:22
|
linux-libc-dev |
CVE-2014-9940 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u3 |
kernel: Use-after-free in the regulator_ena_gpio_free function
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9940
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-02 21:59 修改: 2023-12-28 18:11
|
linux-libc-dev |
CVE-2015-9016 |
高危 |
3.16.43-2 |
3.16.56-1 |
kernel: Race condition in block/blk-mq.c:blk_mq_tag_to_rq() can lead to kernel oops
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-9016
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-05 18:29 修改: 2018-05-03 01:29
|
linux-libc-dev |
CVE-2016-10905 |
高危 |
3.16.43-2 |
3.16.74-1 |
kernel: use-after-free in fs/gfs2/rgrp.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10905
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-19 02:15 修改: 2023-11-07 02:29
|
linux-libc-dev |
CVE-2016-2853 |
高危 |
3.16.43-2 |
|
kernel: aufs module does not properly restrict the mount namespace
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2853
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-05-02 10:59 修改: 2022-04-18 17:59
|
linux-libc-dev |
CVE-2016-2854 |
高危 |
3.16.43-2 |
|
kernel: aufs module does not properly maintain POSIX ACL xattr data
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2854
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-05-02 10:59 修改: 2020-08-07 19:53
|
linux-libc-dev |
CVE-2017-0786 |
高危 |
3.16.43-2 |
3.16.51-1 |
A elevation of privilege vulnerability in the Broadcom wi-fi driver. P ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-0786
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-08 20:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2017-0861 |
高危 |
3.16.43-2 |
3.16.56-1 |
kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-0861
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-16 23:29 修改: 2020-07-15 03:15
|
linux-libc-dev |
CVE-2017-1000111 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: Heap out-of-bounds read in AF_PACKET sockets
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000111
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-05 01:29 修改: 2023-01-17 21:04
|
linux-libc-dev |
CVE-2017-1000112 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: Exploitable memory corruption due to UFO to non-UFO path switch
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000112
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-05 01:29 修改: 2023-06-07 12:46
|
linux-libc-dev |
CVE-2017-1000251 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: stack buffer overflow in the native Bluetooth stack
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000251
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-12 17:29 修改: 2023-01-19 15:53
|
linux-libc-dev |
CVE-2017-1000363 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u3 |
kernel: Out-of-bounds write in lp_setup in drivers/char/lp.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000363
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-17 13:18 修改: 2023-01-17 21:03
|
linux-libc-dev |
CVE-2017-1000364 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u1 |
kernel: heap/stack gap jumping via unbounded stack allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000364
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 16:29 修改: 2018-10-18 10:29
|
linux-libc-dev |
CVE-2017-1000365 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u3 |
kernel: RLIMIT_STACK/RLIMIT_INFINITY string size limitation bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000365
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 16:29 修改: 2023-01-17 21:03
|
linux-libc-dev |
CVE-2017-1000370 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: offset2lib patch protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000370
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 16:29 修改: 2023-01-17 21:03
|
linux-libc-dev |
CVE-2017-1000371 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: offset2lib allows for the stack guard page to be jumped over
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000371
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 16:29 修改: 2023-01-17 21:03
|
linux-libc-dev |
CVE-2017-1000379 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u1 |
kernel: Incorrectly mapped contents of PIE executable
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000379
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 16:29 修改: 2023-01-17 21:03
|
linux-libc-dev |
CVE-2017-1000405 |
高危 |
3.16.43-2 |
3.16.51-1 |
kernel: pmd can become dirty without going through a COW cycle
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000405
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-30 22:29 修改: 2023-06-26 16:55
|
linux-libc-dev |
CVE-2017-1000407 |
高危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
Kernel: KVM: DoS via write flood to I/O port 0x80
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000407
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-11 21:29 修改: 2019-05-14 22:29
|
linux-libc-dev |
CVE-2017-1000410 |
高危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
kernel: Stack information leak in the EFS element
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000410
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-07 19:29 修改: 2019-04-08 20:29
|
linux-libc-dev |
CVE-2017-10661 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: Handling of might_cancel queueing is not properly pretected against race
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10661
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-19 18:29 修改: 2024-03-14 19:59
|
linux-libc-dev |
CVE-2017-10662 |
高危 |
3.16.43-2 |
|
kernel: Missing sanity check for segment count in f2fs
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10662
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-19 18:29 修改: 2023-01-17 21:02
|
linux-libc-dev |
CVE-2017-10663 |
高危 |
3.16.43-2 |
|
kernel: Missing sanity check for segno and blkoff read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10663
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-19 18:29 修改: 2023-01-17 21:02
|
linux-libc-dev |
CVE-2017-11089 |
高危 |
3.16.43-2 |
3.16.51-1 |
kernel: Out-of-bounds read in nl80211_set_station allows privileged local attacker to cause system crash or possibly code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11089
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-16 22:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2017-11176 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u3 |
kernel: Use-after-free in sys_mq_notify()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11176
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-11 23:29 修改: 2023-01-17 21:01
|
linux-libc-dev |
CVE-2017-11600 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11600
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-24 07:29 修改: 2023-06-26 16:55
|
linux-libc-dev |
CVE-2017-12134 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
xen: linux: Fix Xen block IO merge-ability calculation (XSA-229)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12134
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-24 14:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2017-12154 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12154
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-26 05:29 修改: 2023-02-12 23:27
|
linux-libc-dev |
CVE-2017-13166 |
高危 |
3.16.43-2 |
3.16.56-1 |
kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13166
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-06 14:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2017-13220 |
高危 |
3.16.43-2 |
3.16.56-1 |
kernel: Possible out-of-bound access in Bluetooth subsystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13220
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-12 23:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2017-13305 |
高危 |
3.16.43-2 |
3.16.64-1 |
kernel: Buffer over-read in keyring subsystem allows exposing potentially sensitive information to local attacker
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13305
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-04 16:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2017-15115 |
高危 |
3.16.43-2 |
3.16.51-1 |
kernel: use-after-free in sctp_cmp_addr_exact
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15115
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-15 21:29 修改: 2023-01-19 15:46
|
linux-libc-dev |
CVE-2017-15265 |
高危 |
3.16.43-2 |
3.16.51-1 |
kernel: Use-after-free in snd_seq_ioctl_create_port()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15265
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-16 18:29 修改: 2023-06-21 20:59
|
linux-libc-dev |
CVE-2017-15649 |
高危 |
3.16.43-2 |
3.16.51-1 |
kernel: Use-after-free in the af_packet.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15649
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-19 22:29 修改: 2018-08-24 10:29
|
linux-libc-dev |
CVE-2017-15868 |
高危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
kernel: bnep_add_connection does not check if l2cap socket is available allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15868
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-05 23:29 修改: 2023-01-19 15:46
|
linux-libc-dev |
CVE-2017-16526 |
高危 |
3.16.43-2 |
3.16.56-1 |
kernel: General protection fault in drivers/uwb/uwbd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16526
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-04 01:29 修改: 2023-01-19 15:46
|
linux-libc-dev |
CVE-2017-16939 |
高危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16939
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-24 10:29 修改: 2023-01-19 15:46
|
linux-libc-dev |
CVE-2017-17448 |
高危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17448
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-07 00:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2017-17450 |
高危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
kernel: Unchecked capabilities in net/netfilter/xt_osf.c allows for unprivileged modification to systemwide fingerprint list
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17450
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-07 00:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2017-17805 |
高危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17805
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-20 23:29 修改: 2023-01-19 15:45
|
linux-libc-dev |
CVE-2017-17806 |
高危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
kernel: HMAC implementation does not validate that the underlying cryptographic hash algorithm is unkeyed allowing local attackers to cause denial-of-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17806
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-20 23:29 修改: 2023-01-19 16:26
|
linux-libc-dev |
CVE-2017-18079 |
高危 |
3.16.43-2 |
3.16.51-1 |
kernel: Null pointer dereference in drivers/input/serio/i8042.c leading to denial-of-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18079
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-29 05:29 修改: 2023-02-07 22:17
|
linux-libc-dev |
CVE-2017-18249 |
高危 |
3.16.43-2 |
|
kernel: Race condition in fs/f2fs/node.c:add_free_nid() function allows local users to cause denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18249
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-26 20:29 修改: 2019-04-03 01:29
|
linux-libc-dev |
CVE-2017-18270 |
高危 |
3.16.43-2 |
3.16.56-1 |
kernel: improper keyrings creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18270
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-05-18 16:29 修改: 2020-08-14 20:15
|
linux-libc-dev |
CVE-2017-18509 |
高危 |
3.16.43-2 |
3.16.72-1 |
kernel: not checking sk_type and protocol in net/ipv6/ip6mr.c leads to general protection fault, or arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18509
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-13 14:15 修改: 2023-11-07 02:41
|
linux-libc-dev |
CVE-2017-18595 |
高危 |
3.16.43-2 |
3.16.56-1 |
kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18595
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-04 21:15 修改: 2024-03-07 17:45
|
linux-libc-dev |
CVE-2017-5972 |
高危 |
3.16.43-2 |
|
kernel: SYN cookie protection mechanism not properly implemented
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5972
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-02-14 06:59 修改: 2020-07-31 20:35
|
linux-libc-dev |
CVE-2017-7482 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u3 |
kernel: net/rxrpc: overflow in decoding of krb5 principal
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7482
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-30 14:29 修改: 2023-02-14 21:37
|
linux-libc-dev |
CVE-2017-7487 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u1 |
kernel: Reference counter leak in ipxitf_ioctl resulting into use after free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7487
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-14 22:29 修改: 2023-02-14 21:37
|
linux-libc-dev |
CVE-2017-7518 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
Kernel: KVM: debug exception via syscall emulation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7518
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-30 15:29 修改: 2023-11-07 02:50
|
linux-libc-dev |
CVE-2017-7533 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u3 |
kernel: a race between inotify_handle_event() and sys_rename()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7533
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-05 16:29 修改: 2023-06-21 15:57
|
linux-libc-dev |
CVE-2017-7541 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u3 |
kernel: Possible heap buffer overflow in brcmf_cfg80211_mgmt_tx()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7541
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-25 04:29 修改: 2023-02-14 21:37
|
linux-libc-dev |
CVE-2017-7645 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u1 |
kernel: nfsd: Incorrect handling of long RPC replies
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7645
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-04-18 14:59 修改: 2023-01-17 21:34
|
linux-libc-dev |
CVE-2017-7889 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u3 |
kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7889
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-04-17 00:59 修改: 2023-02-14 21:12
|
linux-libc-dev |
CVE-2017-8064 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u1 |
kernel: dvb_usb_core.c interacts incorrectly with the CONFIG_VMAP_STACK option
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8064
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-04-23 05:59 修改: 2023-02-14 19:25
|
linux-libc-dev |
CVE-2017-8824 |
高危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
kernel: Use-after-free vulnerability in DCCP socket
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8824
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-05 09:29 修改: 2023-02-24 18:32
|
linux-libc-dev |
CVE-2017-8890 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u1 |
kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8890
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-10 16:29 修改: 2023-02-24 18:32
|
linux-libc-dev |
CVE-2017-9074 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u1 |
kernel: net: IPv6 fragmentation implementation of nexthdr field may be associated with an invalid option
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9074
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-19 07:29 修改: 2023-02-24 18:40
|
linux-libc-dev |
CVE-2017-9075 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u1 |
kernel: net: sctp_v6_create_accept_sk function mishandles inheritance
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9075
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-19 07:29 修改: 2023-02-24 18:39
|
linux-libc-dev |
CVE-2017-9076 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u1 |
kernel: net: IPv6 DCCP implementation mishandles inheritance
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9076
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-19 07:29 修改: 2023-02-24 18:39
|
linux-libc-dev |
CVE-2017-9077 |
高危 |
3.16.43-2 |
3.16.43-2+deb8u1 |
kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9077
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-19 14:29 修改: 2023-02-24 18:38
|
linux-libc-dev |
CVE-2018-1000026 |
高危 |
3.16.43-2 |
|
kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000026
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-09 23:29 修改: 2023-10-03 15:39
|
linux-libc-dev |
CVE-2018-10675 |
高危 |
3.16.43-2 |
3.16.51-1 |
kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10675
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-05-02 18:29 修改: 2023-02-24 18:43
|
linux-libc-dev |
CVE-2018-10853 |
高危 |
3.16.43-2 |
3.16.57-1 |
kernel: kvm: guest userspace to guest kernel write
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10853
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-09-11 14:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2018-1087 |
高危 |
3.16.43-2 |
3.16.56-1+deb8u1 |
Kernel: KVM: error in exception handling leads to wrong debug stack value
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1087
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-05-15 16:29 修改: 2019-10-09 23:38
|
linux-libc-dev |
CVE-2018-10878 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10878
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-26 18:29 修改: 2023-10-05 14:15
|
linux-libc-dev |
CVE-2018-10879 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10879
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-26 18:29 修改: 2023-02-13 04:51
|
linux-libc-dev |
CVE-2018-10902 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: MIDI driver race condition leads to a double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10902
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-21 19:29 修改: 2023-02-12 23:31
|
linux-libc-dev |
CVE-2018-1128 |
高危 |
3.16.43-2 |
|
ceph: cephx protocol is vulnerable to replay attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1128
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-10 14:29 修改: 2020-11-17 19:15
|
linux-libc-dev |
CVE-2018-11506 |
高危 |
3.16.43-2 |
3.16.57-1 |
kernel: Stack-based buffer overflow in drivers/scsi/sr_ioctl.c allows denial of service or other unspecified impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11506
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-05-28 04:29 修改: 2023-02-24 18:37
|
linux-libc-dev |
CVE-2018-12233 |
高危 |
3.16.43-2 |
3.16.57-1 |
kernel: Memory corruption in JFS setattr
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12233
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-12 12:29 修改: 2024-02-09 19:12
|
linux-libc-dev |
CVE-2018-12930 |
高危 |
3.16.43-2 |
|
kernel: stack-based out-of-bounds write in ntfs_end_buffer_async_read in the ntfs.ko
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12930
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-28 14:29 修改: 2019-03-26 13:35
|
linux-libc-dev |
CVE-2018-12931 |
高危 |
3.16.43-2 |
|
kernel: stack-based out-of-bounds write in ntfs_attr_find in the ntfs.ko
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12931
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-28 14:29 修改: 2019-03-26 13:35
|
linux-libc-dev |
CVE-2018-13405 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13405
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-06 14:29 修改: 2023-11-07 02:52
|
linux-libc-dev |
CVE-2018-13406 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: Integer overflow in drivers/video/fbdev/uvesafb.c:uvesafb_setcmap() allows for potential denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13406
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-06 14:29 修改: 2023-02-24 18:37
|
linux-libc-dev |
CVE-2018-14633 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: stack-based buffer overflow in chap_server_compute_md5() in iscsi target
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14633
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-09-25 00:29 修改: 2023-02-14 21:13
|
linux-libc-dev |
CVE-2018-14634 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: Integer overflow in Linux's create_elf_tables function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14634
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-09-25 21:29 修改: 2023-02-13 04:51
|
linux-libc-dev |
CVE-2018-14678 |
高危 |
3.16.43-2 |
3.16.59-1 |
xen: Uninitialized state in x86 PV failsafe callback path (XSA-274)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14678
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-28 18:29 修改: 2023-02-24 18:35
|
linux-libc-dev |
CVE-2018-14734 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14734
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-29 23:29 修改: 2019-04-23 17:29
|
linux-libc-dev |
CVE-2018-16276 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: incorrect bounds checking in yurex_read in drivers/usb/misc/yurex.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-31 16:29 修改: 2023-02-24 18:34
|
linux-libc-dev |
CVE-2018-16884 |
高危 |
3.16.43-2 |
3.16.64-1 |
kernel: nfs: use-after-free in svc_process_common()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16884
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-18 22:29 修改: 2023-08-11 19:12
|
linux-libc-dev |
CVE-2018-17182 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: Use-after-free in the vmacache_flush_all function resulting in a possible privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17182
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-09-19 09:29 修改: 2023-02-24 18:33
|
linux-libc-dev |
CVE-2018-18021 |
高危 |
3.16.43-2 |
|
kernel: Privilege escalation on arm64 via KVM hypervisor
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18021
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-07 06:29 修改: 2019-04-03 01:29
|
linux-libc-dev |
CVE-2018-18281 |
高危 |
3.16.43-2 |
3.16.64-1 |
kernel: TLB flush happens too late on mremap
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18281
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-30 18:29 修改: 2020-08-24 17:37
|
linux-libc-dev |
CVE-2018-18559 |
高危 |
3.16.43-2 |
3.16.56-1 |
kernel: Use-after-free due to race condition in AF_PACKET implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18559
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-22 16:29 修改: 2023-05-16 11:14
|
linux-libc-dev |
CVE-2018-19824 |
高危 |
3.16.43-2 |
3.16.64-1 |
kernel: Use-after-free in sound/usb/card.c:usb_audio_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19824
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-03 17:29 修改: 2019-09-10 22:15
|
linux-libc-dev |
CVE-2018-20836 |
高危 |
3.16.43-2 |
3.16.72-1 |
kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20836
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-07 14:29 修改: 2022-11-03 02:22
|
linux-libc-dev |
CVE-2018-20976 |
高危 |
3.16.43-2 |
3.16.74-1 |
kernel: use-after-free in fs/xfs/xfs_super.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20976
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-19 02:15 修改: 2023-11-07 02:56
|
linux-libc-dev |
CVE-2018-5332 |
高危 |
3.16.43-2 |
3.16.56-1 |
kernel: rds_message_alloc_sgs() function doesn't validate value used during DMA page allocation causes heap out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5332
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-11 07:29 修改: 2023-02-24 18:43
|
linux-libc-dev |
CVE-2018-5391 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5391
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-09-06 21:29 修改: 2023-11-07 02:58
|
linux-libc-dev |
CVE-2018-5814 |
高危 |
3.16.43-2 |
3.16.57-1 |
kernel: Race condition errors in USB over IP functionality can cause denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5814
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-12 16:29 修改: 2019-05-20 15:29
|
linux-libc-dev |
CVE-2018-5848 |
高危 |
3.16.43-2 |
3.16.64-1 |
kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5848
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-12 20:29 修改: 2019-05-02 15:54
|
linux-libc-dev |
CVE-2018-6555 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: irda: use-after-free vulnerability in the hashbin list
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6555
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-09-04 18:29 修改: 2019-10-09 23:41
|
linux-libc-dev |
CVE-2018-6927 |
高危 |
3.16.43-2 |
3.16.56-1 |
kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6927
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-12 19:29 修改: 2019-03-06 21:38
|
linux-libc-dev |
CVE-2018-7566 |
高危 |
3.16.43-2 |
3.16.56-1 |
kernel: race condition in snd_seq_write() may lead to UAF or OOB-access
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7566
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-30 21:29 修改: 2020-08-24 17:37
|
linux-libc-dev |
CVE-2018-8781 |
高危 |
3.16.43-2 |
3.16.56-1 |
kernel: Integer overflow in drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() can allow attackers to execute code in kernel space
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8781
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-23 19:29 修改: 2023-03-03 19:22
|
linux-libc-dev |
CVE-2018-8822 |
高危 |
3.16.43-2 |
3.16.56-1 |
kernel: Memory corruption in ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8822
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-20 17:29 修改: 2024-03-28 16:08
|
linux-libc-dev |
CVE-2018-8897 |
高危 |
3.16.43-2 |
3.16.56-1+deb8u1 |
Kernel: error in exception handling leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8897
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-05-08 18:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2018-9363 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: Buffer overflow in hidp_process_report
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9363
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-11-06 17:29 修改: 2023-01-19 16:01
|
linux-libc-dev |
CVE-2018-9422 |
高危 |
3.16.43-2 |
3.16.57-1 |
kernel: Elevation of Privilege in futex
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9422
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-11-06 17:29 修改: 2019-08-19 20:15
|
linux-libc-dev |
CVE-2018-9516 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: HID: debug: Buffer overflow in hid_debug_events_read() in drivers/hid/hid-debug.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9516
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-11-06 17:29 修改: 2019-08-06 17:15
|
linux-libc-dev |
CVE-2018-9518 |
高危 |
3.16.43-2 |
3.16.57-1 |
kernel: NFC: llcp: Out of bounds write in nfc_llcp_sdp_tlv struct in nfc/llcp_commands.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9518
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-07 23:29 修改: 2019-01-02 14:56
|
linux-libc-dev |
CVE-2018-9568 |
高危 |
3.16.43-2 |
3.16.59-1 |
kernel: Memory corruption due to incorrect socket cloning
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9568
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-06 14:29 修改: 2023-02-24 18:43
|
linux-libc-dev |
CVE-2019-0136 |
高危 |
3.16.43-2 |
3.16.74-1 |
kernel: insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver may allow an unauthenticated user to potentially enable DoS via adjacent access
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0136
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-06-13 16:29 修改: 2020-08-24 17:37
|
linux-libc-dev |
CVE-2019-10220 |
高危 |
3.16.43-2 |
3.16.81-1 |
kernel: CIFS: Relative paths injection in directory entry lists
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10220
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-27 16:15 修改: 2022-11-03 02:41
|
linux-libc-dev |
CVE-2019-10639 |
高危 |
3.16.43-2 |
3.16.70-1 |
Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10639
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-07-05 23:15 修改: 2023-11-07 03:02
|
linux-libc-dev |
CVE-2019-11477 |
高危 |
3.16.43-2 |
3.16.68-2 |
Kernel: tcp: integer overflow while processing SACK blocks allows remote denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11477
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-06-19 00:15 修改: 2024-02-27 21:04
|
linux-libc-dev |
CVE-2019-11478 |
高危 |
3.16.43-2 |
3.16.68-2 |
Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11478
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-06-19 00:15 修改: 2024-02-27 21:04
|
linux-libc-dev |
CVE-2019-11479 |
高危 |
3.16.43-2 |
3.16.68-2 |
kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11479
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-06-19 00:15 修改: 2023-11-07 03:03
|
linux-libc-dev |
CVE-2019-11486 |
高危 |
3.16.43-2 |
3.16.68-1 |
kernel: multiple race conditions in Siemens R3964 line discipline driver in drivers/tty/n_r3964.c leading to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11486
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-04-23 22:29 修改: 2023-10-05 14:22
|
linux-libc-dev |
CVE-2019-11487 |
高危 |
3.16.43-2 |
|
kernel: Count overflow in FUSE request leading to use-after-free issues.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11487
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-04-23 22:29 修改: 2023-02-24 18:43
|
linux-libc-dev |
CVE-2019-11599 |
高危 |
3.16.43-2 |
3.16.68-1 |
kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11599
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-04-29 18:29 修改: 2024-02-15 15:56
|
linux-libc-dev |
CVE-2019-11810 |
高危 |
3.16.43-2 |
3.16.68-2 |
kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11810
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-07 14:29 修改: 2022-12-02 19:46
|
linux-libc-dev |
CVE-2019-12818 |
高危 |
3.16.43-2 |
3.16.68-1 |
kernel: null-pointer dereference in function nfc_llcp_build_tlv in net/nfc/llcp_commands.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12818
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-06-14 02:29 修改: 2019-06-18 15:15
|
linux-libc-dev |
CVE-2019-13272 |
高危 |
3.16.43-2 |
3.16.70-1 |
kernel: broken permission and object lifetime handling for PTRACE_TRACEME
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13272
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-07-17 13:15 修改: 2024-07-24 16:51
|
linux-libc-dev |
CVE-2019-14814 |
高危 |
3.16.43-2 |
3.16.74-1 |
kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14814
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-20 19:15 修改: 2023-09-28 19:09
|
linux-libc-dev |
CVE-2019-14815 |
高危 |
3.16.43-2 |
3.16.74-1 |
kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14815
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-25 11:15 修改: 2023-07-13 13:33
|
linux-libc-dev |
CVE-2019-14816 |
高危 |
3.16.43-2 |
3.16.74-1 |
kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14816
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-20 19:15 修改: 2023-07-12 19:27
|
linux-libc-dev |
CVE-2019-14821 |
高危 |
3.16.43-2 |
3.16.74-1 |
Kernel: KVM: OOB memory access via mmio ring buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14821
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-19 18:15 修改: 2024-02-16 18:44
|
linux-libc-dev |
CVE-2019-14835 |
高危 |
3.16.43-2 |
3.16.74-1 |
kernel: vhost-net: guest to host kernel escape during migration
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14835
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-17 16:15 修改: 2023-12-15 15:29
|
linux-libc-dev |
CVE-2019-15117 |
高危 |
3.16.43-2 |
3.16.74-1 |
kernel: out of bounds memory access in parse_audio_mixer_unit in sound/usb/mixer.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15117
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-16 14:15 修改: 2023-11-07 03:05
|
linux-libc-dev |
CVE-2019-15239 |
高危 |
3.16.43-2 |
3.16.72-1 |
kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15239
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-20 08:15 修改: 2023-11-07 03:05
|
linux-libc-dev |
CVE-2019-15916 |
高危 |
3.16.43-2 |
3.16.70-1 |
kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15916
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-04 15:15 修改: 2023-11-07 03:05
|
linux-libc-dev |
CVE-2019-15917 |
高危 |
3.16.43-2 |
3.16.74-1 |
kernel: use-after-free in drivers/bluetooth/hci_ldisc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15917
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-04 19:15 修改: 2023-08-11 19:54
|
linux-libc-dev |
CVE-2019-15927 |
高危 |
3.16.43-2 |
3.16.68-1 |
kernel: out-of-bounds in function build_audio_procunit in sound/usb/mixer.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15927
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-04 21:15 修改: 2023-02-24 18:43
|
linux-libc-dev |
CVE-2019-16413 |
高危 |
3.16.43-2 |
3.16.70-1 |
kernel: i_size_read() infinite loop leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16413
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-19 00:15 修改: 2023-11-07 03:05
|
linux-libc-dev |
CVE-2019-17075 |
高危 |
3.16.43-2 |
|
kernel: denial of service in write_tpt_entry in drivers/infiniband/hw/cxgb4/mem.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17075
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-10-01 21:15 修改: 2023-11-07 03:06
|
linux-libc-dev |
CVE-2019-17666 |
高危 |
3.16.43-2 |
3.16.81-1 |
kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17666
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-10-17 02:15 修改: 2023-11-07 03:06
|
linux-libc-dev |
CVE-2019-18675 |
高危 |
3.16.43-2 |
3.16.64-1 |
kernel: integer overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18675
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-25 14:15 修改: 2023-02-24 18:42
|
linux-libc-dev |
CVE-2019-19052 |
高危 |
3.16.43-2 |
3.16.81-1 |
kernel: dos in gs_can_open() function in drivers/net/can/usb/gs_usb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19052
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-18 06:15 修改: 2023-01-19 16:48
|
linux-libc-dev |
CVE-2019-19447 |
高危 |
3.16.43-2 |
3.16.84-1 |
kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19447
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-08 01:15 修改: 2023-10-03 15:38
|
linux-libc-dev |
CVE-2019-19768 |
高危 |
3.16.43-2 |
3.16.84-1 |
kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19768
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-12 20:15 修改: 2020-06-10 20:15
|
linux-libc-dev |
CVE-2019-2024 |
高危 |
3.16.43-2 |
3.16.68-1 |
kernel: media: em28xx: Use-after-free in em28xx/em28xx-dvb.c when disconnecting
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-2024
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-06-19 21:15 修改: 2019-08-13 19:15
|
linux-libc-dev |
CVE-2019-2054 |
高危 |
3.16.43-2 |
|
kernel: seccompass mechanism bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-2054
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-08 17:29 修改: 2023-02-28 20:47
|
linux-libc-dev |
CVE-2019-2213 |
高危 |
3.16.43-2 |
|
In binder_free_transaction of binder.c, there is a possible use-after- ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-2213
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-13 18:15 修改: 2021-07-21 11:39
|
linux-libc-dev |
CVE-2019-2215 |
高危 |
3.16.43-2 |
3.16.81-1 |
kernel: Use-after-free in binder.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-2215
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-10-11 19:15 修改: 2024-07-25 14:10
|
linux-libc-dev |
CVE-2019-3846 |
高危 |
3.16.43-2 |
3.16.68-2 |
kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3846
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-06-03 19:29 修改: 2023-02-12 23:38
|
linux-libc-dev |
CVE-2019-3900 |
高危 |
3.16.43-2 |
3.16.72-1 |
Kernel: vhost_net: infinite loop while receiving packets leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3900
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-04-25 15:29 修改: 2024-04-26 16:08
|
linux-libc-dev |
CVE-2019-6974 |
高危 |
3.16.43-2 |
3.16.64-1 |
Kernel: KVM: potential use-after-free via kvm_ioctl_create_device()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6974
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-02-15 15:29 修改: 2023-11-07 03:13
|
linux-libc-dev |
CVE-2019-7221 |
高危 |
3.16.43-2 |
3.16.64-1 |
Kernel: KVM: nVMX: use-after-free of the hrtimer for emulation of the preemption timer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7221
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:13
|
linux-libc-dev |
CVE-2019-9458 |
高危 |
3.16.43-2 |
3.16.64-1 |
kernel: use after free due to race condition in the video driver leads to local privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9458
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-06 22:15 修改: 2022-04-18 16:13
|
linux-libc-dev |
CVE-2019-9503 |
高危 |
3.16.43-2 |
3.16.68-1 |
kernel: brcmfmac frame validation bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9503
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-01-16 21:15 修改: 2022-04-18 18:09
|
linux-libc-dev |
CVE-2019-9506 |
高危 |
3.16.43-2 |
3.16.74-1 |
hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9506
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-14 17:15 修改: 2021-11-04 15:58
|
linux-libc-dev |
CVE-2020-11668 |
高危 |
3.16.43-2 |
3.16.84-1 |
kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11668
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-04-09 21:15 修改: 2020-06-10 20:15
|
linux-libc-dev |
CVE-2020-12653 |
高危 |
3.16.43-2 |
3.16.84-1 |
kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12653
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-05-05 06:15 修改: 2022-04-26 17:37
|
linux-libc-dev |
CVE-2020-12654 |
高危 |
3.16.43-2 |
3.16.84-1 |
kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12654
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-05-05 05:15 修改: 2020-06-16 20:15
|
linux-libc-dev |
CVE-2020-1749 |
高危 |
3.16.43-2 |
3.16.84-1 |
kernel: some ipv6 protocols not encrypted over ipsec tunnel
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1749
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-09-09 15:15 修改: 2023-11-07 03:19
|
linux-libc-dev |
CVE-2020-8648 |
高危 |
3.16.43-2 |
3.16.84-1 |
kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8648
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-02-06 01:15 修改: 2022-07-28 00:08
|
linux-libc-dev |
CVE-2020-9383 |
高危 |
3.16.43-2 |
3.16.84-1 |
kernel: out-of-bounds read in set_fdc in drivers/block/floppy.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9383
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-02-25 16:15 修改: 2022-10-29 02:34
|
apache2 |
CVE-2019-0217 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u14 |
httpd: mod_auth_digest: access control bypass due to race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0217
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-04-08 21:29 修改: 2023-11-07 03:01
|
mount |
CVE-2016-2779 |
高危 |
2.25.2-6 |
|
util-linux: runuser tty hijack via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2779
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-02-07 15:59 修改: 2019-01-04 14:14
|
multiarch-support |
CVE-2017-1000366 |
高危 |
2.19-18+deb8u9 |
2.19-18+deb8u10 |
glibc: heap/stack gap jumping via unbounded stack allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000366
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-19 16:29 修改: 2020-10-15 13:28
|
apache2 |
CVE-2017-15710 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15710
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:40
|
apache2 |
CVE-2017-15715 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: <FilesMatch> bypass with a trailing newline in the file name
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15715
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:40
|
ncurses-base |
CVE-2017-11112 |
高危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in append_acs function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11112
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-07-08 17:29 修改: 2018-10-21 10:29
|
ncurses-base |
CVE-2017-11113 |
高危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference vulnerability in _nc_parse_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11113
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-07-08 17:29 修改: 2019-05-06 15:00
|
ncurses-base |
CVE-2017-13728 |
高危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Infinite loop in the next_char function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13728
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-base |
CVE-2017-16879 |
高危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u3 |
ncurses: Stack-based buffer overflow in the _nc_write_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16879
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-11-22 22:29 修改: 2023-11-07 02:40
|
apache2 |
CVE-2017-7668 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: ap_find_token() buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7668
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:50
|
apache2-data |
CVE-2017-15710 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15710
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:40
|
ncurses-bin |
CVE-2017-11112 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in append_acs function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11112
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-07-08 17:29 修改: 2018-10-21 10:29
|
ncurses-bin |
CVE-2017-11113 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference vulnerability in _nc_parse_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11113
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-07-08 17:29 修改: 2019-05-06 15:00
|
ncurses-bin |
CVE-2017-13728 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Infinite loop in the next_char function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13728
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-bin |
CVE-2017-16879 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u3 |
ncurses: Stack-based buffer overflow in the _nc_write_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16879
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-11-22 22:29 修改: 2023-11-07 02:40
|
openssl |
CVE-2018-0732 |
高危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u9 |
openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0732
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-12 13:29 修改: 2023-11-07 02:51
|
apache2-data |
CVE-2017-15715 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: <FilesMatch> bypass with a trailing newline in the file name
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15715
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:40
|
patch |
CVE-2018-1000156 |
高危 |
2.7.5-1 |
2.7.5-1+deb8u1 |
patch: Malicious patch files cause ed to execute arbitrary commands
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000156
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-06 13:29 修改: 2019-07-30 10:15
|
patch |
CVE-2018-20969 |
高危 |
2.7.5-1 |
2.7.5-1+deb8u3 |
patch: do_ed_script in pch.c does not block strings beginning with a ! character
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20969
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-16 04:15 修改: 2019-09-05 16:15
|
patch |
CVE-2019-13638 |
高危 |
2.7.5-1 |
2.7.5-1+deb8u3 |
patch: OS shell command injection when processing crafted patch files
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13638
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-07-26 13:15 修改: 2023-11-07 03:03
|
apache2-data |
CVE-2017-7668 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u9 |
httpd: ap_find_token() buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7668
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-06-20 01:29 修改: 2023-11-07 02:50
|
apache2-data |
CVE-2017-9798 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u11 |
httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9798
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-09-18 15:29 修改: 2023-11-07 02:50
|
apache2-data |
CVE-2018-1303 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1303
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
apache2-data |
CVE-2018-17199 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u13 |
httpd: mod_session_cookie does not respect expiry time
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17199
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-01-30 22:29 修改: 2023-11-07 02:54
|
perl |
CVE-2017-12837 |
高危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u9 |
perl: Heap buffer overflow in regular expression compiler
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12837
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl |
CVE-2018-12015 |
高危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u11 |
perl: Directory traversal in Archive::Tar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12015
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-07 13:29 修改: 2020-08-24 17:37
|
apache2-data |
CVE-2019-0217 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u14 |
httpd: mod_auth_digest: access control bypass due to race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0217
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-04-08 21:29 修改: 2023-11-07 03:01
|
apache2 |
CVE-2017-9798 |
高危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u11 |
httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9798
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-09-18 15:29 修改: 2023-11-07 02:50
|
curl |
CVE-2016-7141 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Incorrect reuse of client certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7141
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-10-03 21:59 修改: 2018-11-13 11:29
|
curl |
CVE-2016-8625 |
高危 |
7.38.0-4+deb8u5 |
|
curl: IDNA 2003 makes curl use wrong host
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8625
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-01 06:29 修改: 2023-11-07 02:36
|
perl-base |
CVE-2017-12837 |
高危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u9 |
perl: Heap buffer overflow in regular expression compiler
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12837
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl-base |
CVE-2018-12015 |
高危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u11 |
perl: Directory traversal in Archive::Tar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12015
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-06-07 13:29 修改: 2020-08-24 17:37
|
curl |
CVE-2016-9586 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: printf floating point buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9586
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-23 18:29 修改: 2023-11-07 02:37
|
curl |
CVE-2017-1000254 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: FTP PWD response parser out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000254
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-06 13:29 修改: 2023-11-07 02:37
|
curl |
CVE-2018-1000121 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: LDAP NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000121
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-14 18:29 修改: 2019-07-23 23:15
|
curl |
CVE-2018-16890 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: NTLM type-2 heap out-of-bounds buffer read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16890
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-02-06 20:29 修改: 2023-11-07 02:53
|
perl-modules |
CVE-2017-12837 |
高危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u9 |
perl: Heap buffer overflow in regular expression compiler
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12837
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl-modules |
CVE-2018-12015 |
高危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u11 |
perl: Directory traversal in Archive::Tar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12015
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-07 13:29 修改: 2020-08-24 17:37
|
curl |
CVE-2019-3823 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: SMTP end-of-response out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3823
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
procps |
CVE-2018-1122 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: Local privilege escalation in top
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1122
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-05-23 14:29 修改: 2019-10-03 00:03
|
procps |
CVE-2018-1123 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: denial of service in ps via mmap buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1123
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-05-23 14:29 修改: 2023-11-07 02:55
|
procps |
CVE-2018-1124 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: Integer overflows leading to heap overflow in file2strvec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1124
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-05-23 13:29 修改: 2020-09-09 14:58
|
procps |
CVE-2018-1125 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: stack buffer overflow in pgrep
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1125
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-05-23 14:29 修改: 2020-09-09 14:59
|
sensible-utils |
CVE-2017-17512 |
高危 |
0.0.9 |
0.0.9+deb8u1 |
sensible-browser in sensible-utils before 0.0.11 does not validate str ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17512
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-12-11 06:29 修改: 2018-03-16 01:29
|
systemd |
CVE-2017-18078 |
高危 |
215-17+deb8u7 |
215-17+deb8u12 |
systemd: Unsafe handling of hard links allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18078
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-01-29 05:29 修改: 2023-11-07 02:41
|
systemd |
CVE-2018-15686 |
高危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: line splitting via fgets() allows for state injection during daemon-reexec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15686
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-10-26 14:29 修改: 2023-11-07 02:53
|
systemd |
CVE-2018-15688 |
高危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15688
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-10-26 14:29 修改: 2022-01-31 18:30
|
systemd |
CVE-2018-16864 |
高危 |
215-17+deb8u7 |
215-17+deb8u9 |
systemd: stack overflow when calling syslog from a command with long cmdline
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16864
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-11 20:29 修改: 2023-02-13 04:51
|
systemd |
CVE-2018-16865 |
高危 |
215-17+deb8u7 |
215-17+deb8u9 |
systemd: stack overflow when receiving many journald entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16865
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-11 21:29 修改: 2023-02-13 04:52
|
systemd |
CVE-2019-3842 |
高危 |
215-17+deb8u7 |
215-17+deb8u12 |
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3842
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-04-09 21:29 修改: 2023-11-07 03:10
|
systemd-sysv |
CVE-2017-18078 |
高危 |
215-17+deb8u7 |
215-17+deb8u12 |
systemd: Unsafe handling of hard links allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18078
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-01-29 05:29 修改: 2023-11-07 02:41
|
systemd-sysv |
CVE-2018-15686 |
高危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: line splitting via fgets() allows for state injection during daemon-reexec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15686
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-10-26 14:29 修改: 2023-11-07 02:53
|
systemd-sysv |
CVE-2018-15688 |
高危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15688
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-10-26 14:29 修改: 2022-01-31 18:30
|
systemd-sysv |
CVE-2018-16864 |
高危 |
215-17+deb8u7 |
215-17+deb8u9 |
systemd: stack overflow when calling syslog from a command with long cmdline
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16864
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-11 20:29 修改: 2023-02-13 04:51
|
systemd-sysv |
CVE-2018-16865 |
高危 |
215-17+deb8u7 |
215-17+deb8u9 |
systemd: stack overflow when receiving many journald entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16865
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-11 21:29 修改: 2023-02-13 04:52
|
systemd-sysv |
CVE-2019-3842 |
高危 |
215-17+deb8u7 |
215-17+deb8u12 |
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3842
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-04-09 21:29 修改: 2023-11-07 03:10
|
udev |
CVE-2017-18078 |
高危 |
215-17+deb8u7 |
215-17+deb8u12 |
systemd: Unsafe handling of hard links allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18078
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-01-29 05:29 修改: 2023-11-07 02:41
|
udev |
CVE-2018-15686 |
高危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: line splitting via fgets() allows for state injection during daemon-reexec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15686
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-10-26 14:29 修改: 2023-11-07 02:53
|
udev |
CVE-2018-15688 |
高危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15688
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-10-26 14:29 修改: 2022-01-31 18:30
|
udev |
CVE-2018-16864 |
高危 |
215-17+deb8u7 |
215-17+deb8u9 |
systemd: stack overflow when calling syslog from a command with long cmdline
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16864
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-11 20:29 修改: 2023-02-13 04:51
|
udev |
CVE-2018-16865 |
高危 |
215-17+deb8u7 |
215-17+deb8u9 |
systemd: stack overflow when receiving many journald entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16865
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-11 21:29 修改: 2023-02-13 04:52
|
udev |
CVE-2019-3842 |
高危 |
215-17+deb8u7 |
215-17+deb8u12 |
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3842
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-04-09 21:29 修改: 2023-11-07 03:10
|
util-linux |
CVE-2016-2779 |
高危 |
2.25.2-6 |
|
util-linux: runuser tty hijack via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2779
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-02-07 15:59 修改: 2019-01-04 14:14
|
curl |
CVE-2019-5436 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u15 |
curl: TFTP receive heap buffer overflow in tftp_receive_packet() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5436
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-28 19:29 修改: 2023-11-07 03:11
|
file |
CVE-2019-18218 |
高危 |
1:5.22+15-2+deb8u3 |
1:5.22+15-2+deb8u6 |
file: heap-based buffer overflow in cdf_read_property_info in cdf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18218
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-10-21 05:15 修改: 2023-11-07 03:06
|
zlib1g |
CVE-2016-9840 |
高危 |
1:1.2.8.dfsg-2+b1 |
1:1.2.8.dfsg-2+deb8u1 |
zlib: Out-of-bounds pointer arithmetic in inftrees.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9840
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-05-23 04:29 修改: 2023-11-07 02:37
|
zlib1g |
CVE-2016-9842 |
高危 |
1:1.2.8.dfsg-2+b1 |
1:1.2.8.dfsg-2+deb8u1 |
zlib: Undefined left shift of negative number
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9842
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-05-23 04:29 修改: 2024-08-28 16:07
|
gcc-4.9 |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
binutils |
CVE-2017-7299 |
中危 |
2.25-5+deb8u1 |
|
binutils: Out-of-bounds read in bfd_elf_final_link function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7299
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-29 15:59 修改: 2017-03-31 16:28
|
gcc-4.9-base |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
gcc-4.9-base |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
binutils |
CVE-2017-8421 |
中危 |
2.25-5+deb8u1 |
|
binutils: Memory exhaustion in objdump via a crafted PE file
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8421
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-02 17:59 修改: 2019-10-03 00:03
|
gnupg |
CVE-2017-7526 |
中危 |
1.4.18-7+deb8u3 |
1.4.18-7+deb8u4 |
libgcrypt: Use of left-to-right sliding window method allows full RSA key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7526
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-07-26 13:29 修改: 2023-11-07 02:50
|
libncurses5 |
CVE-2017-13729 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the _nc_save_str function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13729
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncurses5 |
CVE-2017-13730 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_read_entry_source()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13730
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncurses5 |
CVE-2017-13731 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function postprocess_termcap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13731
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncurses5 |
CVE-2017-13732 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function dump_uses()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13732
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncurses5 |
CVE-2017-13733 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function fmt_entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13733
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncurses5 |
CVE-2017-13734 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_safe_strcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13734
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2018-10-21 10:29
|
libncurses5 |
CVE-2018-19217 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference at function _nc_name_match
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19217
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-11-12 19:29 修改: 2024-08-05 12:15
|
binutils |
CVE-2017-9954 |
中危 |
2.25-5+deb8u1 |
|
binutils: stack-based buffer over-read in getvalue function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9954
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-26 23:29 修改: 2019-10-03 00:03
|
gpgv |
CVE-2017-7526 |
中危 |
1.4.18-7+deb8u3 |
1.4.18-7+deb8u4 |
libgcrypt: Use of left-to-right sliding window method allows full RSA key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7526
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-07-26 13:29 修改: 2023-11-07 02:50
|
binutils |
CVE-2017-9955 |
中危 |
2.25-5+deb8u1 |
|
binutils: heap buffer over-read in get_build_id function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9955
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-26 23:29 修改: 2019-10-03 00:03
|
binutils |
CVE-2018-10372 |
中危 |
2.25-5+deb8u1 |
|
binutils: Heap-base buffer over-read in dwarf.c:process_cu_tu_index() allows for denial of service via crafted file
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10372
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-25 09:29 修改: 2019-08-03 13:15
|
libapt-pkg4.12 |
CVE-2020-3810 |
中危 |
1.0.9.8.4 |
1.0.9.8.6 |
Missing input validation in the ar/tar implementations of APT before v ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-3810
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2020-05-15 14:15 修改: 2023-11-07 03:23
|
binutils |
CVE-2018-10373 |
中危 |
2.25-5+deb8u1 |
|
binutils: NULL pointer dereference in dwarf2.c:concat_filename() allows for denial of service via crafted file
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10373
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-25 09:29 修改: 2019-08-03 13:15
|
libncursesw5 |
CVE-2017-13729 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the _nc_save_str function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13729
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncursesw5 |
CVE-2017-13730 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_read_entry_source()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13730
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncursesw5 |
CVE-2017-13731 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function postprocess_termcap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13731
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncursesw5 |
CVE-2017-13732 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function dump_uses()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13732
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncursesw5 |
CVE-2017-13733 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function fmt_entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13733
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncursesw5 |
CVE-2017-13734 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_safe_strcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13734
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2018-10-21 10:29
|
libncursesw5 |
CVE-2018-19217 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference at function _nc_name_match
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19217
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-11-12 19:29 修改: 2024-08-05 12:15
|
libnettle4 |
CVE-2018-16869 |
中危 |
2.7.1-5+deb8u2 |
|
nettle: Leaky data conversion exposing a manager oracle
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16869
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-03 14:29 修改: 2023-02-03 14:25
|
libasan1 |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
libasan1 |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
libpcre3 |
CVE-2017-7244 |
中危 |
2:8.35-3.3+deb8u4 |
|
pcre: invalid memory read in _pcre32_xclass (pcre_xclass.c)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7244
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
libpcre3 |
CVE-2020-14155 |
中危 |
2:8.35-3.3+deb8u4 |
|
pcre: Integer overflow when parsing callout numeric arguments
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14155
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:04
|
binutils |
CVE-2018-10534 |
中危 |
2.25-5+deb8u1 |
|
binutils: out of bounds memory write in peXXigen.c files
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10534
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-29 15:29 修改: 2019-08-03 13:15
|
libatomic1 |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
libatomic1 |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
binutils |
CVE-2018-10535 |
中危 |
2.25-5+deb8u1 |
|
binutils: NULL pointer dereference in elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10535
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-29 15:29 修改: 2019-08-03 13:15
|
libblkid1 |
CVE-2016-5011 |
中危 |
2.25.2-6 |
|
util-linux: Extended partition loop in MBR partition table leads to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5011
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-04-11 15:59 修改: 2020-09-11 15:22
|
binutils |
CVE-2018-6759 |
中危 |
2.25-5+deb8u1 |
|
binutils: Unchecked strnlen in opncls.c:bfd_get_debug_link_info_1() can allow lead to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6759
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-06 21:29 修改: 2019-10-31 01:15
|
libquadmath0 |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
libquadmath0 |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
binutils |
CVE-2018-6872 |
中危 |
2.25-5+deb8u1 |
|
binutils: out of bounds read in elf_parse_notes function in elf.c file in libbfd library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6872
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-09 06:29 修改: 2023-11-07 03:00
|
binutils |
CVE-2018-7568 |
中危 |
2.25-5+deb8u1 |
|
binutils: integer overflow via an ELF file with corrupt dwarf1 debug information in libbfd library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7568
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-28 21:29 修改: 2019-10-31 01:15
|
librtmp1 |
CVE-2015-8272 |
中危 |
2.4+20150115.gita107cef-1 |
2.4+20150115.gita107cef-1+deb8u1 |
RTMPDump 2.4 allows remote attackers to trigger a denial of service (N ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8272
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-04-13 14:59 修改: 2017-11-04 01:29
|
libbz2-1.0 |
CVE-2016-3189 |
中危 |
1.0.6-7+b3 |
1.0.6-7+deb8u1 |
bzip2: heap use after free in bzip2recover
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3189
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2016-06-30 17:59 修改: 2023-11-07 02:32
|
binutils |
CVE-2018-7569 |
中危 |
2.25-5+deb8u1 |
|
binutils: integer underflow or overflow via an ELF file with a corrupt DWARF FORM block in libbfd library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7569
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-28 21:29 修改: 2019-10-31 01:15
|
binutils |
CVE-2018-7570 |
中危 |
2.25-5+deb8u1 |
|
binutils: NULL pointer dereference the assign_file_positions_for_non_load_sections function in libbfd library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7570
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-28 21:29 修改: 2023-11-07 03:01
|
libsmartcols1 |
CVE-2016-5011 |
中危 |
2.25.2-6 |
|
util-linux: Extended partition loop in MBR partition table leads to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5011
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-04-11 15:59 修改: 2020-09-11 15:22
|
binutils |
CVE-2018-7642 |
中危 |
2.25-5+deb8u1 |
|
binutils: NULL pointer dereference in swap_std_reloc_in function in aoutx.h resulting in crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7642
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-02 15:29 修改: 2023-11-07 03:01
|
apache2-utils |
CVE-2019-10092 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u15 |
httpd: limited cross-site scripting in mod_proxy error page
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10092
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:02
|
bsdutils |
CVE-2016-5011 |
中危 |
1:2.25.2-6 |
|
util-linux: Extended partition loop in MBR partition table leads to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5011
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-04-11 15:59 修改: 2020-09-11 15:22
|
libcilkrts5 |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
libcilkrts5 |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
libcomerr2 |
CVE-2019-5094 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u1 |
e2fsprogs: Crafted ext4 partition leads to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5094
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-09-24 22:15 修改: 2023-11-07 03:11
|
libcomerr2 |
CVE-2019-5188 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u2 |
e2fsprogs: Out-of-bounds write in e2fsck/rehash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5188
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2020-01-08 16:15 修改: 2023-11-07 03:11
|
apache2-utils |
CVE-2019-10098 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u15 |
httpd: mod_rewrite potential open redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10098
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-09-25 17:15 修改: 2023-11-07 03:02
|
bzip2 |
CVE-2016-3189 |
中危 |
1.0.6-7+b3 |
1.0.6-7+deb8u1 |
bzip2: heap use after free in bzip2recover
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3189
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-06-30 17:59 修改: 2023-11-07 02:32
|
apache2-data |
CVE-2019-0220 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u14 |
httpd: URL normalization inconsistency
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0220
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-06-11 21:29 修改: 2023-11-07 03:01
|
cpp-4.9 |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
libsqlite3-0 |
CVE-2019-16168 |
中危 |
3.8.7.1-1+deb8u2 |
|
sqlite: Division by zero in whereLoopAddBtreeIndex in sqlite3.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16168
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-09 17:15 修改: 2023-11-07 03:05
|
libsqlite3-0 |
CVE-2019-19645 |
中危 |
3.8.7.1-1+deb8u2 |
|
sqlite: infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19645
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-09 16:15 修改: 2022-04-15 16:14
|
libsqlite3-0 |
CVE-2020-13434 |
中危 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u6 |
sqlite: integer overflow in sqlite3_str_vappendf function in printf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13434
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-05-24 22:15 修改: 2023-11-07 03:16
|
libsqlite3-0 |
CVE-2020-13631 |
中危 |
3.8.7.1-1+deb8u2 |
|
sqlite: Virtual table can be renamed into the name of one of its shadow tables
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13631
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-05-27 15:15 修改: 2023-11-07 03:16
|
libss2 |
CVE-2019-5094 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u1 |
e2fsprogs: Crafted ext4 partition leads to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5094
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-09-24 22:15 修改: 2023-11-07 03:11
|
libss2 |
CVE-2019-5188 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u2 |
e2fsprogs: Out-of-bounds write in e2fsck/rehash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5188
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2020-01-08 16:15 修改: 2023-11-07 03:11
|
cpp-4.9 |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
apt |
CVE-2020-3810 |
中危 |
1.0.9.8.4 |
1.0.9.8.6 |
Missing input validation in the ar/tar implementations of APT before v ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-3810
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2020-05-15 14:15 修改: 2023-11-07 03:23
|
apache2-data |
CVE-2019-10092 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u15 |
httpd: limited cross-site scripting in mod_proxy error page
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10092
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:02
|
bash |
CVE-2016-9401 |
中危 |
4.3-11+deb8u1 |
4.3-11+deb8u2 |
bash: popd controlled free
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9401
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-01-23 21:59 修改: 2020-09-14 18:32
|
apache2-data |
CVE-2019-10098 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u15 |
httpd: mod_rewrite potential open redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10098
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-09-25 17:15 修改: 2023-11-07 03:02
|
apache2 |
CVE-2019-10098 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u15 |
httpd: mod_rewrite potential open redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10098
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-09-25 17:15 修改: 2023-11-07 03:02
|
apache2 |
CVE-2018-1283 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1283
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
apache2 |
CVE-2018-1301 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Out of bounds access after failure in reading the HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1301
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
apache2-bin |
CVE-2018-1283 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1283
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
apache2-bin |
CVE-2018-1301 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Out of bounds access after failure in reading the HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1301
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
apache2-bin |
CVE-2019-0220 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u14 |
httpd: URL normalization inconsistency
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0220
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-06-11 21:29 修改: 2023-11-07 03:01
|
apache2-bin |
CVE-2019-10092 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u15 |
httpd: limited cross-site scripting in mod_proxy error page
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10092
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:02
|
libssl1.0.0 |
CVE-2017-3735 |
中危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u7 |
openssl: Malformed X.509 IPAdressFamily could cause OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3735
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-28 19:29 修改: 2022-12-13 12:15
|
libssl1.0.0 |
CVE-2018-0734 |
中危 |
1.0.1t-1+deb8u6 |
|
openssl: timing side channel attack in the DSA signature algorithm
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0734
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-30 12:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-0735 |
中危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u10 |
openssl: timing side channel attack in the ECDSA signature generation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0735
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-29 13:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-0737 |
中危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u9 |
openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0737
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-16 18:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-0739 |
中危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u8 |
openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0739
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-27 21:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-5407 |
中危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u10 |
openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5407
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-11-15 21:29 修改: 2023-11-07 02:58
|
libssl1.0.0 |
CVE-2019-1547 |
中危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u12 |
openssl: side-channel weak encryption vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1547
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-10 17:15 修改: 2024-06-21 19:15
|
libssl1.0.0 |
CVE-2019-1559 |
中危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u11 |
openssl: 0-byte record padding oracle
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1559
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-02-27 23:29 修改: 2023-11-07 03:08
|
apache2-bin |
CVE-2019-10098 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u15 |
httpd: mod_rewrite potential open redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10098
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-09-25 17:15 修改: 2023-11-07 03:02
|
libstdc++-4.9-dev |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
libstdc++-4.9-dev |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
apache2 |
CVE-2019-0220 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u14 |
httpd: URL normalization inconsistency
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0220
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-06-11 21:29 修改: 2023-11-07 03:01
|
libstdc++6 |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
libstdc++6 |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
apache2 |
CVE-2019-10092 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u15 |
httpd: limited cross-site scripting in mod_proxy error page
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10092
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:02
|
apache2-data |
CVE-2018-1283 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1283
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
apache2-data |
CVE-2018-1301 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Out of bounds access after failure in reading the HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1301
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
libcurl3 |
CVE-2017-1000100 |
中危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: TFTP sends more than buffer size
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000100
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-05 01:29 修改: 2018-11-13 11:29
|
libcurl3 |
CVE-2017-1000101 |
中危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: URL globbing out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000101
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-05 01:29 修改: 2018-11-13 11:29
|
apache2-utils |
CVE-2018-1283 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1283
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
libsystemd0 |
CVE-2018-1049 |
中危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: automount: access to automounted volumes can lock up
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1049
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-02-16 21:29 修改: 2022-01-31 18:26
|
libsystemd0 |
CVE-2019-6454 |
中危 |
215-17+deb8u7 |
215-17+deb8u10 |
systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6454
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:13
|
apache2-utils |
CVE-2018-1301 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u12 |
httpd: Out of bounds access after failure in reading the HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1301
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2018-03-26 15:29 修改: 2023-11-07 02:55
|
apache2-utils |
CVE-2019-0220 |
中危 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u14 |
httpd: URL normalization inconsistency
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0220
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2019-06-11 21:29 修改: 2023-11-07 03:01
|
binutils |
CVE-2017-12967 |
中危 |
2.25-5+deb8u1 |
|
binutils: Stack-based buffer over-read in getsym function in tekhex.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12967
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-19 16:29 修改: 2019-10-03 00:03
|
binutils |
CVE-2017-13757 |
中危 |
2.25-5+deb8u1 |
|
binutils: heap-based buffer over-read in elf_i386_get_synthetic_symtab in elf32-i386.c and elf_x86_64_get_synthetic_symtab in elf64-x86-64.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13757
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-29 23:29 修改: 2023-11-07 02:38
|
curl |
CVE-2017-1000100 |
中危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: TFTP sends more than buffer size
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000100
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-05 01:29 修改: 2018-11-13 11:29
|
curl |
CVE-2017-1000101 |
中危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: URL globbing out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000101
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-05 01:29 修改: 2018-11-13 11:29
|
libgcc-4.9-dev |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
libgcc-4.9-dev |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
libtinfo5 |
CVE-2017-13729 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the _nc_save_str function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13729
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-13730 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_read_entry_source()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13730
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-13731 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function postprocess_termcap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13731
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-13732 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function dump_uses()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13732
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-13733 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function fmt_entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13733
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-13734 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_safe_strcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13734
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2018-10-21 10:29
|
libtinfo5 |
CVE-2018-19217 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference at function _nc_name_match
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19217
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-11-12 19:29 修改: 2024-08-05 12:15
|
e2fslibs |
CVE-2019-5094 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u1 |
e2fsprogs: Crafted ext4 partition leads to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5094
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-09-24 22:15 修改: 2023-11-07 03:11
|
libtsan0 |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
libtsan0 |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
libgcc1 |
CVE-2015-5276 |
中危 |
1:4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
libubsan0 |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
libubsan0 |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
libgcc1 |
CVE-2017-11671 |
中危 |
1:4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
libgcrypt20 |
CVE-2017-7526 |
中危 |
1.6.3-2+deb8u2 |
1.6.3-2+deb8u4 |
libgcrypt: Use of left-to-right sliding window method allows full RSA key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7526
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-07-26 13:29 修改: 2023-11-07 02:50
|
libgcrypt20 |
CVE-2017-9526 |
中危 |
1.6.3-2+deb8u2 |
1.6.3-2+deb8u3 |
libgcrypt: Possible timing attack on EdDSA session key
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9526
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-11 02:29 修改: 2023-11-07 02:50
|
linux-libc-dev |
CVE-2015-8553 |
中危 |
3.16.43-2 |
|
xen: non-maskable interrupts triggerable by guests (xsa120)
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8553
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-04-13 15:59 修改: 2019-08-13 23:15
|
linux-libc-dev |
CVE-2015-8839 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: ext4 filesystem page fault race condition with fallocate call.
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8839
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-05-02 10:59 修改: 2020-10-02 14:56
|
linux-libc-dev |
CVE-2016-10741 |
中危 |
3.16.43-2 |
3.16.64-1 |
kernel: race condition between direct and memory-mapped I/O in fs/xfs/xfs_aops.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10741
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-02-01 16:29 修改: 2019-04-18 15:20
|
linux-libc-dev |
CVE-2017-1000380 |
中危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: information leak due to a data race in ALSA timer
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000380
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-17 18:29 修改: 2017-12-06 02:29
|
linux-libc-dev |
CVE-2017-10911 |
中危 |
3.16.43-2 |
3.16.43-2+deb8u3 |
xen: blkif responses leak backend stack data (XSA-216)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10911
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-05 01:29 修改: 2018-09-07 10:29
|
linux-libc-dev |
CVE-2017-12153 |
中危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: null pointer dereference in nl80211_set_rekey_data()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12153
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-21 15:29 修改: 2019-10-09 23:22
|
linux-libc-dev |
CVE-2017-12190 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: memory leak when merging buffers in SCSI IO vectors
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12190
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-22 18:29 修改: 2023-02-12 23:27
|
linux-libc-dev |
CVE-2017-12192 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: NULL pointer dereference due to KEYCTL_READ on negative key
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12192
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-12 00:29 修改: 2023-02-12 23:28
|
linux-libc-dev |
CVE-2017-12193 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: Null pointer dereference due to incorrect node-splitting in assoc_array implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12193
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-22 18:29 修改: 2023-02-12 23:28
|
linux-libc-dev |
CVE-2017-13080 |
中危 |
3.16.43-2 |
3.16.51-1 |
wpa_supplicant: Reinstallation of the group key in the group key handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13080
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-17 13:29 修改: 2020-11-10 21:15
|
linux-libc-dev |
CVE-2017-14106 |
中危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: Divide-by-zero in __tcp_select_window
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14106
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-01 16:29 修改: 2023-11-07 02:38
|
linux-libc-dev |
CVE-2017-14140 |
中危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: Missing permission check in move_pages system call
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14140
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-05 06:29 修改: 2018-04-12 01:29
|
linux-libc-dev |
CVE-2017-14156 |
中危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: driver/video/fbdev/aty/atyfb_base.c: atyfb_ioctl() stack infoleak
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14156
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-05 17:29 修改: 2018-03-16 01:29
|
linux-libc-dev |
CVE-2017-14340 |
中危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: xfs: unprivileged user kernel oops
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14340
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-15 11:29 修改: 2017-12-07 02:29
|
linux-libc-dev |
CVE-2017-14489 |
中危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: scsi: nlmsg is not properly parsed in iscsi_if_rx function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14489
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-15 10:29 修改: 2018-03-16 01:29
|
linux-libc-dev |
CVE-2017-15274 |
中危 |
3.16.43-2 |
3.16.48-1 |
kernel: dereferencing NULL payload with nonzero length
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15274
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-12 00:29 修改: 2018-03-16 01:29
|
linux-libc-dev |
CVE-2017-15299 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: Incorrect updates of uninstantiated keys crash the kernel
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15299
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-14 23:29 修改: 2023-11-07 02:39
|
linux-libc-dev |
CVE-2017-16525 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: Use-after-free in usb_serial_console_disconnect()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16525
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-04 01:29 修改: 2024-04-01 15:43
|
linux-libc-dev |
CVE-2017-16527 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: Use-after-free in snd_usb_mixer_interrupt
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16527
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-04 01:29 修改: 2024-03-14 19:58
|
linux-libc-dev |
CVE-2017-16529 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: out-of-bounds read in snd_usb_create_streams
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16529
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-04 01:29 修改: 2024-03-14 19:58
|
linux-libc-dev |
CVE-2017-16530 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: out-of-bounds read in drivers/usb/storage/uas-detect{.h,.c}
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16530
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-04 01:29 修改: 2024-03-14 19:57
|
linux-libc-dev |
CVE-2017-16531 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: out-of-bounds read in drivers/usb/core/config.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16531
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-04 01:29 修改: 2024-07-17 15:31
|
linux-libc-dev |
CVE-2017-16532 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: Null pointer dereference in get_endpoints function in drivers/usb/misc/usbtest.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16532
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-04 01:29 修改: 2024-07-17 15:30
|
linux-libc-dev |
CVE-2017-16533 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: out-of-bounds read in usbhid_parse function in drivers/hid/usbhid/hid-core.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16533
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-04 01:29 修改: 2024-03-12 17:38
|
linux-libc-dev |
CVE-2017-16535 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: out-of-bounds read in usb_get_bos_descriptor function in drivers/usb/core/config.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16535
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-04 01:29 修改: 2018-08-24 10:29
|
linux-libc-dev |
CVE-2017-16536 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: Null pointer dereference in cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16536
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-04 01:29 修改: 2018-08-24 10:29
|
linux-libc-dev |
CVE-2017-16537 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: NULL pointer dereference in imon_probe function in drivers/media/rc/imon.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16537
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-04 01:29 修改: 2018-08-24 10:29
|
linux-libc-dev |
CVE-2017-16538 |
中危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
kernel: general protection fault in drivers/media/usb/dvb-usb-v2/lmedm04.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16538
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-04 01:29 修改: 2018-08-24 10:29
|
linux-libc-dev |
CVE-2017-16643 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: Out-of-bounds read in drivers/input/tablet/gtco.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16643
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-07 23:29 修改: 2018-08-24 10:29
|
linux-libc-dev |
CVE-2017-16649 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: Divide-by-zero in drivers/net/usb/cdc_ether.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16649
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-07 23:29 修改: 2018-11-28 11:29
|
linux-libc-dev |
CVE-2017-16650 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: Divide-by-zero in drivers/net/usb/qmi_wwan.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16650
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-07 23:29 修改: 2018-08-24 10:29
|
linux-libc-dev |
CVE-2017-16911 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: vhci_cd driver in usbip/vhci_sysfs.c:port_show_vhci() discloses kernel memory addresses to local attackers
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16911
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-31 22:29 修改: 2018-08-24 10:29
|
linux-libc-dev |
CVE-2017-16912 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Out-of-bounds read in usbip/stub_rx.c:get_pipe() allows attackers to cause a denial of service via crafted USB over IP packet
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16912
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-31 22:29 修改: 2018-08-24 10:29
|
linux-libc-dev |
CVE-2017-16913 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Improper validation in usbip/stub_rx.c:stub_recv_cmd_submit() allows for denial of service via crafted USB over IP CMD_SUBMIT packet
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16913
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-31 22:29 修改: 2018-08-24 10:29
|
linux-libc-dev |
CVE-2017-16914 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: NULL pointer dereference in usb/usbip/stub_tx.c:stub_send_ret_submit() can lead to denial of service via crafted USB over IP packet
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16914
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-31 22:29 修改: 2018-08-24 10:29
|
linux-libc-dev |
CVE-2017-17449 |
中危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17449
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-07 00:29 修改: 2018-05-31 01:29
|
linux-libc-dev |
CVE-2017-17558 |
中危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17558
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-12 15:29 修改: 2019-05-14 23:29
|
linux-libc-dev |
CVE-2017-17741 |
中危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
kernel: kvm: stack-based out-of-bounds read via vmcall instruction
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17741
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-18 08:29 修改: 2018-04-25 01:29
|
linux-libc-dev |
CVE-2017-18203 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18203
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-27 20:29 修改: 2018-06-20 01:29
|
linux-libc-dev |
CVE-2017-18208 |
中危 |
3.16.43-2 |
3.16.57-1 |
kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18208
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-01 05:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2017-18216 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Null pointer dereference in fs/ocfs2/cluster/nodemanager.c allows local users to cause denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18216
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-05 18:29 修改: 2018-10-30 10:29
|
linux-libc-dev |
CVE-2017-18221 |
中危 |
3.16.43-2 |
3.16.48-1 |
kernel: Race condition in __munlock_pagevec function in mm/mlock.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18221
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-07 08:29 修改: 2018-05-31 01:29
|
linux-libc-dev |
CVE-2017-18232 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Mishandling mutex within libsas allowing local Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18232
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-15 04:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2017-18241 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Null pointer dereference in fs/f2fs/segment.c via mounting fs with noflush_merge option allows local denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18241
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-21 16:29 修改: 2019-03-18 15:20
|
linux-libc-dev |
CVE-2017-18344 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18344
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-26 19:29 修改: 2020-10-15 13:28
|
linux-libc-dev |
CVE-2017-18360 |
中危 |
3.16.43-2 |
3.16.48-1 |
kernel: Division by zero in change_port_settings in drivers/usb/serial/io_ti.c resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18360
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-01-31 09:29 修改: 2019-04-17 17:41
|
linux-libc-dev |
CVE-2017-18551 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18551
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-19 02:15 修改: 2023-11-07 02:41
|
linux-libc-dev |
CVE-2017-5715 |
中危 |
3.16.43-2 |
3.16.57-1 |
hw: cpu: speculative execution branch target injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5715
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-04 13:29 修改: 2021-08-16 09:15
|
linux-libc-dev |
CVE-2017-5753 |
中危 |
3.16.43-2 |
3.16.64-1 |
hw: cpu: speculative execution bounds-check bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5753
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-04 13:29 修改: 2021-11-23 22:14
|
linux-libc-dev |
CVE-2017-5754 |
中危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
hw: cpu: speculative execution permission faults handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5754
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-04 13:29 修改: 2021-11-19 18:15
|
linux-libc-dev |
CVE-2017-7346 |
中危 |
3.16.43-2 |
3.16.43-2+deb8u3 |
kernel: drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7346
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-30 23:59 修改: 2017-11-04 01:29
|
linux-libc-dev |
CVE-2017-7542 |
中危 |
3.16.43-2 |
3.16.43-2+deb8u3 |
kernel: Integer overflow in ip6_find_1stfragopt() causes infinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7542
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-21 16:29 修改: 2023-02-12 23:30
|
linux-libc-dev |
CVE-2017-8831 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: Double fetch vulnerability in saa7164_bus_get function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8831
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-08 06:29 修改: 2021-06-01 19:14
|
linux-libc-dev |
CVE-2017-8924 |
中危 |
3.16.43-2 |
3.16.43-2+deb8u1 |
kernel: Information leak in completion handler in edge_bulk_in_callback function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8924
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-12 21:29 修改: 2019-04-16 14:28
|
linux-libc-dev |
CVE-2017-8925 |
中危 |
3.16.43-2 |
3.16.43-2+deb8u1 |
kernel: Reference count mishandling in the omninet_open function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8925
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-12 21:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2017-9242 |
中危 |
3.16.43-2 |
3.16.43-2+deb8u1 |
kernel: Incorrect overwrite check in __ip6_append_data()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9242
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-27 01:29 修改: 2018-01-05 02:31
|
linux-libc-dev |
CVE-2017-9605 |
中危 |
3.16.43-2 |
3.16.43-2+deb8u3 |
kernel: Uninitialized kernel memory leak in vmw_gb_surface_define_ioctl function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9605
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-13 19:29 修改: 2017-11-04 01:29
|
linux-libc-dev |
CVE-2018-1000004 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Race condition in sound system can lead to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000004
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-16 20:29 修改: 2020-07-15 03:15
|
linux-libc-dev |
CVE-2018-1000199 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: ptrace() incorrect error handling leads to corruption and DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000199
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-05-24 13:29 修改: 2020-08-24 17:37
|
linux-libc-dev |
CVE-2018-1000204 |
中危 |
3.16.43-2 |
3.16.57-1 |
kernel: Infoleak caused by incorrect handling of the SG_IO ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000204
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-26 14:29 修改: 2024-08-05 13:15
|
linux-libc-dev |
CVE-2018-10021 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: ata qc leak in drivers/scsi/libsas/sas_scsi_host.c allows local users to cause denial-of-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10021
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-11 17:29 修改: 2024-08-05 08:15
|
linux-libc-dev |
CVE-2018-10087 |
中危 |
3.16.43-2 |
|
kernel: Undefined behavior in kernel/exit.c:kernel_wait4() function allows local denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10087
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-13 13:29 修改: 2019-03-20 18:49
|
linux-libc-dev |
CVE-2018-10124 |
中危 |
3.16.43-2 |
|
kernel: Undefined behaviour with INT_MIN argument in kernel/signal.c:kill_something_info() allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10124
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-16 14:29 修改: 2019-03-20 18:40
|
linux-libc-dev |
CVE-2018-10322 |
中危 |
3.16.43-2 |
|
kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10322
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-24 06:29 修改: 2020-10-16 01:15
|
linux-libc-dev |
CVE-2018-10323 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: Invalid pointer dereference in xfs_bmapi_write() when mounting and operating on crafted xfs image allows denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10323
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-24 06:29 修改: 2020-09-08 19:15
|
linux-libc-dev |
CVE-2018-1066 |
中危 |
3.16.43-2 |
3.16.57-1 |
kernel: Null pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() when empty TargetInfo is returned in NTLMSSP setup negotiation response allowing to crash client's kernel
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1066
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-02 08:29 修改: 2019-04-23 13:37
|
linux-libc-dev |
CVE-2018-1068 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1068
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-16 16:29 修改: 2023-06-21 15:56
|
linux-libc-dev |
CVE-2018-10876 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: use-after-free in jbd2_journal_commit_transaction funtion
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10876
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-26 18:29 修改: 2023-02-13 04:51
|
linux-libc-dev |
CVE-2018-10877 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: out-of-bound access in ext4_ext_drop_refs function with a crafted ext4 image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10877
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-18 15:29 修改: 2023-02-13 04:51
|
linux-libc-dev |
CVE-2018-10880 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: stack-out-of-bounds write in ext4_update_inline_data function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10880
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-25 13:29 修改: 2023-02-13 04:51
|
linux-libc-dev |
CVE-2018-10881 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10881
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-26 18:29 修改: 2023-02-12 23:31
|
linux-libc-dev |
CVE-2018-10882 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: stack-out-of-bounds write infs/jbd2/transaction.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10882
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-27 18:29 修改: 2023-02-12 23:31
|
linux-libc-dev |
CVE-2018-10883 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10883
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-30 16:29 修改: 2023-02-12 23:31
|
linux-libc-dev |
CVE-2018-1092 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1092
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-02 03:29 修改: 2023-02-12 23:32
|
linux-libc-dev |
CVE-2018-1093 |
中危 |
3.16.43-2 |
3.16.57-1 |
kernel: Out of bounds read in ext4/balloc.c:ext4_valid_block_bitmap() causes crash with crafted ext4 image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1093
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-02 03:29 修改: 2018-08-29 10:29
|
linux-libc-dev |
CVE-2018-10940 |
中危 |
3.16.43-2 |
3.16.57-1 |
kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10940
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-05-09 17:29 修改: 2018-10-31 10:30
|
linux-libc-dev |
CVE-2018-1120 |
中危 |
3.16.43-2 |
|
kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1120
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-20 13:29 修改: 2019-10-09 23:38
|
linux-libc-dev |
CVE-2018-1130 |
中危 |
3.16.43-2 |
3.16.57-1 |
kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1130
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-05-10 13:29 修改: 2019-10-09 23:38
|
linux-libc-dev |
CVE-2018-12126 |
中危 |
3.16.43-2 |
3.16.68-1 |
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12126
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-30 16:29 修改: 2023-11-07 02:52
|
linux-libc-dev |
CVE-2018-12127 |
中危 |
3.16.43-2 |
3.16.68-1 |
hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12127
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-30 16:29 修改: 2023-11-07 02:52
|
linux-libc-dev |
CVE-2018-12130 |
中危 |
3.16.43-2 |
3.16.68-1 |
hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12130
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-30 16:29 修改: 2023-11-07 02:52
|
linux-libc-dev |
CVE-2018-12207 |
中危 |
3.16.43-2 |
|
hw: Machine Check Error on Page Size Change (IFU)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12207
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-14 20:15 修改: 2023-11-07 02:52
|
linux-libc-dev |
CVE-2018-12896 |
中危 |
3.16.43-2 |
3.16.64-1 |
kernel: Integer overflow in kernel/time/posix-timers.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12896
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-02 17:29 修改: 2019-04-03 12:04
|
linux-libc-dev |
CVE-2018-12929 |
中危 |
3.16.43-2 |
|
kernel: use-after-free in ntfs_read_locked_inode in the ntfs.ko
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12929
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-28 14:29 修改: 2019-03-26 13:35
|
linux-libc-dev |
CVE-2018-13093 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: NULL pointer dereference in lookup_slow function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13093
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-03 10:29 修改: 2019-08-06 17:15
|
linux-libc-dev |
CVE-2018-13094 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: NULL pointer dereference in xfs_da_shrink_inode function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13094
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-03 10:29 修改: 2019-04-23 17:29
|
linux-libc-dev |
CVE-2018-13095 |
中危 |
3.16.43-2 |
|
kernel: NULL pointer dereference in fs/xfs/libxfs/xfs_inode_buf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13095
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-03 10:29 修改: 2020-08-24 17:37
|
linux-libc-dev |
CVE-2018-13096 |
中危 |
3.16.43-2 |
|
kernel: out-of-bounds memory access in fs/f2fs/super.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13096
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-03 10:29 修改: 2022-10-07 02:06
|
linux-libc-dev |
CVE-2018-13097 |
中危 |
3.16.43-2 |
|
kernel: divide-by-zero in fs/f2fs/super.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13097
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-03 10:29 修改: 2019-04-03 01:29
|
linux-libc-dev |
CVE-2018-13099 |
中危 |
3.16.43-2 |
|
kernel: out-of-bounds memory access in fs/f2fs/inline.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13099
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-03 10:29 修改: 2022-10-07 02:08
|
linux-libc-dev |
CVE-2018-13100 |
中危 |
3.16.43-2 |
|
kernel: divide-by-zero in fs/f2fs/super.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13100
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-03 10:29 修改: 2019-04-03 01:29
|
linux-libc-dev |
CVE-2018-14609 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: Invalid pointer dereference in fs/btrfs/relocation.c:__del_reloc_root() when mounting crafted btrfs image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14609
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-27 04:29 修改: 2019-08-13 19:15
|
linux-libc-dev |
CVE-2018-14610 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: Out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14610
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-27 04:29 修改: 2020-06-10 13:15
|
linux-libc-dev |
CVE-2018-14611 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: Use-after-free in try_merge_free_space() when mounting crafted btrfs image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14611
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-27 04:29 修改: 2020-06-10 13:15
|
linux-libc-dev |
CVE-2018-14612 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: Invalid pointer dereference in btrfs_root_node() when mounting a crafted btrfs image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14612
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-27 04:29 修改: 2020-06-10 13:15
|
linux-libc-dev |
CVE-2018-14613 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: Invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14613
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-27 04:29 修改: 2021-06-14 18:15
|
linux-libc-dev |
CVE-2018-14614 |
中危 |
3.16.43-2 |
|
kernel: Out-of-bounds access in fs/f2fs/segment.c:__remove_dirty_segment() when mounting a crafted f2fs image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14614
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-27 04:29 修改: 2019-04-03 01:29
|
linux-libc-dev |
CVE-2018-14617 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: NULL pointer dereference in fs/hfsplus/dir.c:hfsplus_lookup() when operating on a file in a crafted hfs+ image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14617
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-27 04:29 修改: 2019-08-13 19:15
|
linux-libc-dev |
CVE-2018-15572 |
中危 |
3.16.43-2 |
3.16.59-1 |
Kernel: hw: cpu: userspace-userspace spectreRSB attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15572
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-20 02:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2018-15594 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: Mishandling of indirect calls weakens Spectre mitigation for paravirtual guests
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15594
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-20 08:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2018-16658 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: Information leak in cdrom_ioctl_drive_status
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16658
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-09-07 14:29 修改: 2019-08-06 17:15
|
linux-libc-dev |
CVE-2018-16862 |
中危 |
3.16.43-2 |
3.16.64-1 |
kernel: cleancache: Infoleak of deleted files after reuse of old inodes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16862
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-11-26 19:29 修改: 2019-04-01 21:29
|
linux-libc-dev |
CVE-2018-17972 |
中危 |
3.16.43-2 |
3.16.64-1 |
kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17972
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-03 22:29 修改: 2023-11-07 02:54
|
linux-libc-dev |
CVE-2018-18690 |
中危 |
3.16.43-2 |
3.16.64-1 |
kernel: filesystem corruption due to an unchecked error condition during an xfs attribute change
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18690
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-26 18:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2018-18710 |
中危 |
3.16.43-2 |
3.16.64-1 |
kernel: Information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18710
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-29 12:29 修改: 2019-04-03 12:39
|
linux-libc-dev |
CVE-2018-19985 |
中危 |
3.16.43-2 |
3.16.64-1 |
kernel: oob memory read in hso_probe in drivers/net/usb/hso.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19985
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-03-21 16:00 修改: 2019-09-03 00:15
|
linux-libc-dev |
CVE-2018-20169 |
中危 |
3.16.43-2 |
3.16.64-1 |
kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20169
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-17 07:29 修改: 2024-03-04 22:59
|
linux-libc-dev |
CVE-2018-20509 |
中危 |
3.16.43-2 |
|
kernel: print_binder_ref_olocked function in drivers/android/binder.c leads to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20509
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-04-30 18:29 修改: 2023-11-07 02:56
|
linux-libc-dev |
CVE-2018-20510 |
中危 |
3.16.43-2 |
3.16.57-1 |
kernel: print_binder_transaction_ilocked() in drivers/android/binder.c leads to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20510
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-04-30 18:29 修改: 2019-05-03 13:49
|
linux-libc-dev |
CVE-2018-20511 |
中危 |
3.16.43-2 |
3.16.64-1 |
kernel: Memory address exposure in drivers/net/appletalk/ipddp.c:ipddp_ioctl() by users with CAP_NET_ADMIN
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20511
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-27 14:29 修改: 2019-04-01 21:29
|
linux-libc-dev |
CVE-2018-21008 |
中危 |
3.16.43-2 |
3.16.74-1 |
kernel: use-after-free can be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-21008
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-04 21:15 修改: 2019-09-24 15:15
|
linux-libc-dev |
CVE-2018-3620 |
中危 |
3.16.43-2 |
3.16.59-1 |
Kernel: hw: cpu: L1 terminal fault (L1TF)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3620
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-14 19:29 修改: 2023-11-07 02:58
|
linux-libc-dev |
CVE-2018-3639 |
中危 |
3.16.43-2 |
3.16.64-1 |
hw: cpu: speculative store bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3639
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-05-22 12:29 修改: 2021-08-13 15:26
|
linux-libc-dev |
CVE-2018-3646 |
中危 |
3.16.43-2 |
|
Kernel: hw: cpu: L1 terminal fault (L1TF)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3646
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-14 19:29 修改: 2023-11-07 02:58
|
linux-libc-dev |
CVE-2018-3665 |
中危 |
3.16.43-2 |
3.16.57-1 |
Kernel: FPU state information leakage via lazy FPU restore
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-3665
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-21 20:29 修改: 2021-06-09 16:24
|
linux-libc-dev |
CVE-2018-5333 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Null pointer dereference in rds_atomic_free_op() allowing denial-of-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5333
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-11 07:29 修改: 2020-01-22 19:15
|
linux-libc-dev |
CVE-2018-5750 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5750
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-26 19:29 修改: 2019-03-07 20:46
|
linux-libc-dev |
CVE-2018-5803 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5803
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-12 16:29 修改: 2019-03-27 16:17
|
linux-libc-dev |
CVE-2018-5953 |
中危 |
3.16.43-2 |
3.16.64-1 |
kernel: Information Exposure through dmesg data from a "software IO TLB" printk call
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5953
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-07 18:29 修改: 2021-01-28 19:57
|
linux-libc-dev |
CVE-2018-5995 |
中危 |
3.16.43-2 |
3.16.68-1 |
kernel: Information Exposure through dmesg data from a "pages/cpu" printk call
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5995
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-07 18:29 修改: 2019-05-28 19:29
|
linux-libc-dev |
CVE-2018-6554 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: irda: Memory leak caused by repeated binds of irda socket
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6554
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-09-04 18:29 修改: 2019-10-09 23:41
|
linux-libc-dev |
CVE-2018-7191 |
中危 |
3.16.43-2 |
3.16.56-1+deb8u1 |
kernel: denial of service via ioctl call in network tun handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7191
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-17 05:29 修改: 2019-05-31 12:29
|
linux-libc-dev |
CVE-2018-7273 |
中危 |
3.16.43-2 |
|
kernel: Kernel address information leak in drivers/block/floppy.c:show_floppy function potentially allowing KASLR bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7273
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-21 00:29 修改: 2019-03-01 19:57
|
linux-libc-dev |
CVE-2018-7492 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Null pointer dereference in net/rds/rdma.c:__rds_rdma_map() allowing local attackers to cause denial-of-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7492
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-02-26 20:29 修改: 2019-03-26 18:46
|
linux-libc-dev |
CVE-2018-7740 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Denial of service in resv_map_release function in mm/hugetlb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7740
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-07 08:29 修改: 2019-03-18 19:31
|
linux-libc-dev |
CVE-2018-7754 |
中危 |
3.16.43-2 |
|
kernel: Information Exposure in aoedisk_debugfs_show function in drivers/block/aoe/aoeblk.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7754
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-10 16:29 修改: 2020-08-24 17:37
|
linux-libc-dev |
CVE-2018-7755 |
中危 |
3.16.43-2 |
3.16.59-1 |
kernel: Information exposure in fd_locked_ioctl function in drivers/block/floppy.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7755
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-08 07:29 修改: 2018-10-04 10:29
|
linux-libc-dev |
CVE-2018-7757 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7757
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-08 14:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2018-7995 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: Race condition in the store_int_with_restart() function in cpu/mcheck/mce.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7995
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-09 15:29 修改: 2024-08-05 07:15
|
linux-libc-dev |
CVE-2018-9517 |
中危 |
3.16.43-2 |
3.16.51-1 |
kernel: l2tp: Race condition between pppol2tp_session_create() and l2tp_eth_create()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9517
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-07 23:29 修改: 2019-04-03 01:29
|
linux-libc-dev |
CVE-2019-0154 |
中危 |
3.16.43-2 |
3.16.76-1 |
hw: Intel GPU Denial Of Service while accessing MMIO in lower power state
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0154
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-14 19:15 修改: 2023-11-07 03:01
|
linux-libc-dev |
CVE-2019-10207 |
中危 |
3.16.43-2 |
3.16.72-1 |
kernel: null-pointer dereference in hci_uart_set_flow_control
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10207
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-25 14:15 修改: 2023-02-12 23:33
|
linux-libc-dev |
CVE-2019-10638 |
中危 |
3.16.43-2 |
3.16.72-1 |
Kernel: net: weak IP ID generation leads to remote device tracking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10638
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-07-05 23:15 修改: 2021-06-14 18:15
|
linux-libc-dev |
CVE-2019-11091 |
中危 |
3.16.43-2 |
3.16.68-1 |
hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11091
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-30 16:29 修改: 2023-11-07 03:02
|
linux-libc-dev |
CVE-2019-11135 |
中危 |
3.16.43-2 |
3.16.76-1 |
hw: TSX Transaction Asynchronous Abort (TAA)
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11135
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-14 19:15 修改: 2023-11-07 03:02
|
linux-libc-dev |
CVE-2019-11190 |
中危 |
3.16.43-2 |
3.16.68-1 |
kernel: ASLR bypass for setuid binaries due to late install_exec_creds()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11190
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-04-12 00:29 修改: 2019-06-07 07:29
|
linux-libc-dev |
CVE-2019-11833 |
中危 |
3.16.43-2 |
3.16.68-2 |
kernel: fs/ext4/extents.c leads to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11833
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-15 13:29 修改: 2023-11-07 03:03
|
linux-libc-dev |
CVE-2019-12819 |
中危 |
3.16.43-2 |
3.16.68-1 |
kernel: use-after-free in function __mdiobus_register() in drivers/net/phy/mdio_bus.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12819
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-06-14 02:29 修改: 2019-06-18 15:15
|
linux-libc-dev |
CVE-2019-13631 |
中危 |
3.16.43-2 |
3.16.72-1 |
kernel: OOB writes in parse_hid_report_descriptor in drivers/input/tablet/gtco.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13631
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-07-17 19:15 修改: 2023-11-07 03:03
|
linux-libc-dev |
CVE-2019-14283 |
中危 |
3.16.43-2 |
3.16.72-1 |
kernel: integer overflow and OOB read in drivers/block/floppy.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14283
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-07-26 13:15 修改: 2019-08-11 23:15
|
linux-libc-dev |
CVE-2019-14284 |
中危 |
3.16.43-2 |
3.16.72-1 |
kernel: denial of service in drivers/block/floppy.c by setup_format_params division-by-zero
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14284
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-07-26 13:15 修改: 2019-08-11 23:15
|
linux-libc-dev |
CVE-2019-15098 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: a NULL pointer dereference in drivers/net/wireless/ath/ath6kl/usb.c leads to a crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15098
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-16 02:15 修改: 2023-11-07 03:05
|
linux-libc-dev |
CVE-2019-15118 |
中危 |
3.16.43-2 |
3.16.74-1 |
kernel: mishandling recursion in sound/usb/mixer.c leading to kernel stack exhaustion and crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15118
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-16 14:15 修改: 2024-02-03 02:25
|
linux-libc-dev |
CVE-2019-15211 |
中危 |
3.16.43-2 |
3.16.74-1 |
kernel: use-after-free in drivers/media/v4l2-core/v4l2-dev.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15211
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-19 22:15 修改: 2023-11-09 14:44
|
linux-libc-dev |
CVE-2019-15212 |
中危 |
3.16.43-2 |
3.16.74-1 |
kernel: double-free caused by malicious USB device in drivers/usb/misc/rio500.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15212
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-19 22:15 修改: 2023-11-09 14:44
|
linux-libc-dev |
CVE-2019-15214 |
中危 |
3.16.43-2 |
3.16.72-1 |
kernel: use-after-free in sound/core/init.c and sound/core/info.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15214
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-19 22:15 修改: 2020-03-06 17:01
|
linux-libc-dev |
CVE-2019-15215 |
中危 |
3.16.43-2 |
3.16.74-1 |
kernel: use after free in drivers/media/usb/cpia2/cpia2_usb.c driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15215
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-19 22:15 修改: 2023-11-09 14:44
|
linux-libc-dev |
CVE-2019-15216 |
中危 |
3.16.43-2 |
3.16.72-1 |
kernel: null-pointer dereference in drivers/usb/misc/yurex.c driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15216
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-19 22:15 修改: 2023-11-09 14:44
|
linux-libc-dev |
CVE-2019-15217 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: null pointer dereference in drivers/media/usb/zr364xx/zr364xx.c driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15217
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-19 22:15 修改: 2023-11-09 14:44
|
linux-libc-dev |
CVE-2019-15218 |
中危 |
3.16.43-2 |
3.16.74-1 |
kernel: null pointer dereference in the drivers/media/usb/siano/smsusb.c driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15218
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-19 22:15 修改: 2023-11-09 14:44
|
linux-libc-dev |
CVE-2019-15219 |
中危 |
3.16.43-2 |
3.16.74-1 |
kernel: null pointer dereference in drivers/usb/misc/sisusbvga/sisusb.c driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15219
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-19 22:15 修改: 2023-11-09 14:44
|
linux-libc-dev |
CVE-2019-15220 |
中危 |
3.16.43-2 |
3.16.74-1 |
kernel: Use-after-free in drivers/net/wireless/intersil/p54/p54usb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15220
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-19 22:15 修改: 2023-11-09 14:44
|
linux-libc-dev |
CVE-2019-15221 |
中危 |
3.16.43-2 |
3.16.74-1 |
kernel: Null pointer dereference in the sound/usb/line6/pcm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15221
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-19 22:15 修改: 2023-11-09 14:44
|
linux-libc-dev |
CVE-2019-15291 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: Null pointer dereference in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15291
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-20 14:15 修改: 2019-09-06 00:15
|
linux-libc-dev |
CVE-2019-15292 |
中危 |
3.16.43-2 |
3.16.74-1 |
kernel: Use-after-free in atalk_proc_exit function in net/appletalk
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15292
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-21 06:15 修改: 2023-11-07 03:05
|
linux-libc-dev |
CVE-2019-15666 |
中危 |
3.16.43-2 |
3.16.72-1 |
kernel: out-of-bounds array access in __xfrm_policy_unlink
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15666
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-27 05:15 修改: 2023-11-07 03:05
|
linux-libc-dev |
CVE-2019-15807 |
中危 |
3.16.43-2 |
3.16.74-1 |
kernel: Memory leak in drivers/scsi/libsas/sas_expander.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15807
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-08-29 18:15 修改: 2023-11-07 03:05
|
linux-libc-dev |
CVE-2019-18660 |
中危 |
3.16.43-2 |
|
kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18660
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-27 23:15 修改: 2023-11-07 03:06
|
linux-libc-dev |
CVE-2019-19051 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: dos in i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19051
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-18 06:15 修改: 2022-11-07 14:55
|
linux-libc-dev |
CVE-2019-19056 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows to cause DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19056
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-18 06:15 修改: 2023-11-07 03:07
|
linux-libc-dev |
CVE-2019-19062 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: memory leak in the crypto_report() function in crypto/crypto_user_base.c allows for DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19062
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-18 06:15 修改: 2023-11-07 03:07
|
linux-libc-dev |
CVE-2019-19066 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c allows for a DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19066
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-18 06:15 修改: 2023-11-07 03:07
|
linux-libc-dev |
CVE-2019-19227 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: potential NULL pointer dereference leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19227
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-22 14:15 修改: 2019-12-12 16:15
|
linux-libc-dev |
CVE-2019-19319 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: out-of-bounds write in ext4_xattr_set_entry in fs/ext4/xattr.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19319
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-27 23:15 修改: 2021-02-09 19:15
|
linux-libc-dev |
CVE-2019-19332 |
中危 |
3.16.43-2 |
3.16.81-1 |
Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19332
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-01-09 15:15 修改: 2023-02-12 23:37
|
linux-libc-dev |
CVE-2019-19523 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: use-after-free caused by a malicious USB device in the drivers/usb/misc/adutux.c driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19523
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-03 16:15 修改: 2022-10-31 14:52
|
linux-libc-dev |
CVE-2019-19524 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: a malicious USB device in the drivers/input/ff-memless.c leads to use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19524
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-03 16:15 修改: 2022-10-31 14:52
|
linux-libc-dev |
CVE-2019-19527 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19527
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-03 16:15 修改: 2023-08-04 17:50
|
linux-libc-dev |
CVE-2019-19530 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: use-after-free caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19530
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-03 16:15 修改: 2022-10-31 14:51
|
linux-libc-dev |
CVE-2019-19531 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: use-after-free bug caused by a malicious USB device in the drivers/usb/misc/yurex.c driver leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19531
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-03 16:15 修改: 2022-10-31 14:51
|
linux-libc-dev |
CVE-2019-19532 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: malicious USB devices can lead to multiple out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19532
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-03 16:15 修改: 2020-01-07 06:15
|
linux-libc-dev |
CVE-2019-19536 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19536
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-03 16:15 修改: 2022-03-31 18:22
|
linux-libc-dev |
CVE-2019-19537 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: race condition caused by a malicious USB device in the USB character device driver layer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19537
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-03 16:15 修改: 2020-01-18 07:15
|
linux-libc-dev |
CVE-2019-19767 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: use-after-free in __ext4_expand_extra_isize and ext4_xattr_set_entry related to fs/ext4/inode.c and fs/ext4/super.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19767
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-12 20:15 修改: 2020-01-03 11:15
|
linux-libc-dev |
CVE-2019-19922 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: when cpu.cfs_quota_us is used allows attackers to cause a denial of service against non-cpu-bound applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19922
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-22 20:15 修改: 2022-12-14 19:15
|
linux-libc-dev |
CVE-2019-19947 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: uninitialized memory allocation in drivers/net/can/usb/kvaser_usb/kvaser_usb_leaf.c leading to information leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19947
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-24 00:15 修改: 2022-11-09 21:49
|
linux-libc-dev |
CVE-2019-19965 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19965
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-25 04:15 修改: 2022-03-31 18:19
|
linux-libc-dev |
CVE-2019-19966 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: use-after-free in cpia2_exit in drivers/media/usb/cpia2/cpia2_v4l.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19966
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-25 04:15 修改: 2022-12-20 22:15
|
linux-libc-dev |
CVE-2019-20054 |
中危 |
3.16.43-2 |
3.16.72-1 |
kernel: Null pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20054
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-28 05:15 修改: 2023-01-20 20:19
|
linux-libc-dev |
CVE-2019-20096 |
中危 |
3.16.43-2 |
3.16.72-1 |
kernel: memory leak in __feat_register_sp() in net/dccp/feat.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20096
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-30 05:15 修改: 2023-01-20 20:36
|
linux-libc-dev |
CVE-2019-20636 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: out-of-bounds write via crafted keycode table
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20636
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-04-08 14:15 修改: 2023-11-09 13:57
|
linux-libc-dev |
CVE-2019-20811 |
中危 |
3.16.43-2 |
3.16.72-1 |
kernel: net-sysfs: *_queue_add_kobject refcount issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20811
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-06-03 03:15 修改: 2023-01-20 18:37
|
linux-libc-dev |
CVE-2019-2101 |
中危 |
3.16.43-2 |
3.16.70-1 |
In uvc_parse_standard_control of uvc_driver.c, there is a possible out ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-2101
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-06-07 20:29 修改: 2022-04-18 17:16
|
linux-libc-dev |
CVE-2019-3459 |
中危 |
3.16.43-2 |
3.16.68-1 |
kernel: Heap address information leak while using L2CAP_GET_CONF_OPT
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3459
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-04-11 16:29 修改: 2023-11-07 03:09
|
linux-libc-dev |
CVE-2019-3460 |
中危 |
3.16.43-2 |
3.16.68-1 |
kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3460
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-04-11 16:29 修改: 2023-11-07 03:09
|
linux-libc-dev |
CVE-2019-3701 |
中危 |
3.16.43-2 |
3.16.64-1 |
kernel: Missing check in net/can/gw.c:can_can_gw_rcv() allows for crash by users with CAP_NET_ADMIN
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3701
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-01-03 16:29 修改: 2019-09-03 00:15
|
linux-libc-dev |
CVE-2019-3819 |
中危 |
3.16.43-2 |
3.16.64-1 |
kernel: infinite loop in drivers/hid/hid-debug.c:hid_debug_events_read()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3819
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-01-25 18:29 修改: 2020-10-19 17:43
|
linux-libc-dev |
CVE-2019-3874 |
中危 |
3.16.43-2 |
|
kernel: SCTP socket buffer memory leak leading to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3874
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-03-25 19:29 修改: 2023-02-12 23:38
|
linux-libc-dev |
CVE-2019-3882 |
中危 |
3.16.43-2 |
3.16.68-1 |
kernel: denial of service vector through vfio DMA mappings
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3882
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-04-24 16:29 修改: 2023-02-12 23:38
|
linux-libc-dev |
CVE-2019-3901 |
中危 |
3.16.43-2 |
3.16.68-1 |
kernel: perf_event_open() and execve() race in setuid programs allows a data leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3901
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-04-22 16:29 修改: 2023-02-12 23:38
|
linux-libc-dev |
CVE-2019-5108 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5108
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-23 19:15 修改: 2022-06-17 13:18
|
linux-libc-dev |
CVE-2019-5489 |
中危 |
3.16.43-2 |
3.16.68-2 |
Kernel: page cache side channel attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5489
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-01-07 17:29 修改: 2020-08-24 17:37
|
linux-libc-dev |
CVE-2019-6133 |
中危 |
3.16.43-2 |
3.16.68-1 |
polkit: Temporary auth hijacking via PID reuse and non-atomic fork
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6133
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-01-11 14:29 修改: 2020-08-24 17:37
|
linux-libc-dev |
CVE-2019-7222 |
中危 |
3.16.43-2 |
3.16.64-1 |
Kernel: KVM: leak of uninitialized stack contents to guest
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7222
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:13
|
linux-libc-dev |
CVE-2019-9213 |
中危 |
3.16.43-2 |
3.16.64-1 |
kernel: lack of check for mmap minimum address in expand_downwards in mm/mmap.c leads to NULL pointer dereferences exploit on non-SMAP platforms
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9213
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-03-05 22:29 修改: 2022-10-12 15:56
|
linux-libc-dev |
CVE-2019-9245 |
中危 |
3.16.43-2 |
|
kernel: out of bounds read due to a missing bounds check leads to local information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9245
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-06 22:15 修改: 2019-09-09 18:55
|
linux-libc-dev |
CVE-2019-9444 |
中危 |
3.16.43-2 |
|
kernel: kernel pointer leak in sync debug fs driver leads to local information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9444
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-06 22:15 修改: 2019-09-09 15:15
|
linux-libc-dev |
CVE-2019-9445 |
中危 |
3.16.43-2 |
|
kernel: out of bounds read due to missing bounds check in F2FS driver leads to local information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9445
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-06 22:15 修改: 2022-10-14 01:35
|
linux-libc-dev |
CVE-2019-9453 |
中危 |
3.16.43-2 |
|
kernel: out of bounds read in F2FS touch driver leads to local information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9453
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-06 22:15 修改: 2022-10-14 01:36
|
linux-libc-dev |
CVE-2019-9454 |
中危 |
3.16.43-2 |
3.16.56-1 |
kernel: out of bounds write in i2c driver leads to local escalation of privilege
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9454
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-06 22:15 修改: 2019-09-09 18:52
|
linux-libc-dev |
CVE-2019-9456 |
中危 |
3.16.43-2 |
3.16.57-1 |
kernel: OOB write due to missing bounds check leads to local privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9456
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-06 22:15 修改: 2022-10-14 01:39
|
linux-libc-dev |
CVE-2020-0009 |
中危 |
3.16.43-2 |
3.16.84-1 |
In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-0009
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-01-08 16:15 修改: 2022-10-14 02:33
|
linux-libc-dev |
CVE-2020-0067 |
中危 |
3.16.43-2 |
|
kernel: out of bounds read due to a missing bounds check in f2fs_xattr_generic_list of xattr.c leading to local information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-0067
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-04-17 19:15 修改: 2022-07-30 03:39
|
linux-libc-dev |
CVE-2020-0305 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: possible use-after-free due to a race condition in cdev_get of char_dev.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-0305
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-07-17 20:15 修改: 2023-02-03 16:23
|
linux-libc-dev |
CVE-2020-0543 |
中危 |
3.16.43-2 |
3.16.84-1 |
hw: Special Register Buffer Data Sampling (SRBDS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-0543
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-06-15 14:15 修改: 2023-11-07 03:13
|
linux-libc-dev |
CVE-2020-10690 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: use-after-free in cdev_put() when a PTP device is removed while it's chardev is open
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10690
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-05-08 15:15 修改: 2023-11-07 03:14
|
linux-libc-dev |
CVE-2020-10720 |
中危 |
3.16.43-2 |
3.16.76-1 |
kernel: use-after-free read in napi_gro_frags() in the Linux kernel
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10720
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-09-03 18:15 修改: 2020-09-10 14:46
|
linux-libc-dev |
CVE-2020-10732 |
中危 |
3.16.43-2 |
|
kernel: uninitialized kernel data leak in userspace coredumps
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10732
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-06-12 14:15 修改: 2023-06-06 13:46
|
linux-libc-dev |
CVE-2020-10751 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: SELinux netlink permission check bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10751
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-05-26 15:15 修改: 2023-02-12 23:39
|
linux-libc-dev |
CVE-2020-10769 |
中危 |
3.16.43-2 |
3.16.68-1 |
kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned.
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10769
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-06-26 16:15 修改: 2023-02-12 23:39
|
linux-libc-dev |
CVE-2020-10773 |
中危 |
3.16.43-2 |
3.16.81-1 |
kernel: kernel stack information leak on s390/s390x
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10773
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-09-10 17:15 修改: 2023-11-07 03:14
|
linux-libc-dev |
CVE-2020-10942 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10942
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-03-24 22:15 修改: 2022-04-22 19:06
|
linux-libc-dev |
CVE-2020-11494 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: transmission of uninitialized data allows attackers to read sensitive information
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11494
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-04-02 21:15 修改: 2022-04-29 13:26
|
linux-libc-dev |
CVE-2020-11565 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11565
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-04-06 01:15 修改: 2024-08-04 12:15
|
linux-libc-dev |
CVE-2020-11608 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs in drivers/media/usb/gspca/ov519.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11608
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-04-07 14:15 修改: 2020-06-13 09:15
|
linux-libc-dev |
CVE-2020-11609 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: NULL pointer dereference due to incorrect handling of invalid descriptors in stv06xx subsystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11609
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-04-07 17:15 修改: 2020-06-13 09:15
|
linux-libc-dev |
CVE-2020-12114 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: DoS by corrupting mountpoint reference counter
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12114
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-05-04 12:15 修改: 2021-06-14 18:15
|
linux-libc-dev |
CVE-2020-12464 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: use-after-free in usb_sg_cancel function in drivers/usb/core/message.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12464
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-04-29 18:15 修改: 2023-10-12 14:10
|
linux-libc-dev |
CVE-2020-12652 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: race condition in __mptctl_ioctl function in drivers/message/fusion/mptctl.c allows local users to hold an incorrect lock during the ioctl operation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12652
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-05-05 05:15 修改: 2020-06-13 09:15
|
linux-libc-dev |
CVE-2020-12769 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: DoS via concurrent calls to dw_spi_irq and dw_spi_transfer_one functions in drivers/spi/spi-dw.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12769
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-05-09 21:15 修改: 2022-05-03 14:21
|
linux-libc-dev |
CVE-2020-12770 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: sg_write function lacks an sg_remove_request call in a certain failure case
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12770
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-05-09 21:15 修改: 2023-11-07 03:15
|
linux-libc-dev |
CVE-2020-12826 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: possible to send arbitrary signals to a privileged (suidroot) parent process
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12826
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-05-12 19:15 修改: 2021-07-15 19:16
|
linux-libc-dev |
CVE-2020-13143 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: usb: gadget: illegal array access in binding with UDC
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13143
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-05-18 18:15 修改: 2022-10-29 02:36
|
linux-libc-dev |
CVE-2020-14416 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: slcan : race over tty->disc_data can lead use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14416
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-06-18 11:15 修改: 2022-05-03 13:37
|
linux-libc-dev |
CVE-2020-2732 |
中危 |
3.16.43-2 |
3.16.84-1 |
Kernel: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-2732
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-04-08 22:15 修改: 2020-06-10 20:15
|
linux-libc-dev |
CVE-2020-8647 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8647
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-02-06 01:15 修改: 2021-12-30 20:50
|
linux-libc-dev |
CVE-2020-8649 |
中危 |
3.16.43-2 |
3.16.84-1 |
kernel: invalid read location in vgacon_invert_region function in drivers/video/console/vgacon.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8649
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2020-02-06 01:15 修改: 2021-12-30 20:44
|
libgcrypt20 |
CVE-2018-0495 |
中危 |
1.6.3-2+deb8u2 |
1.6.3-2+deb8u5 |
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51
|
libgcrypt20 |
CVE-2019-13627 |
中危 |
1.6.3-2+deb8u2 |
1.6.3-2+deb8u8 |
libgcrypt: ECDSA timing attack allowing private key leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13627
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-09-25 15:15 修改: 2021-07-21 11:39
|
mount |
CVE-2016-5011 |
中危 |
2.25.2-6 |
|
util-linux: Extended partition loop in MBR partition table leads to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5011
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-04-11 15:59 修改: 2020-09-11 15:22
|
e2fslibs |
CVE-2019-5188 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u2 |
e2fsprogs: Out-of-bounds write in e2fsck/rehash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5188
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2020-01-08 16:15 修改: 2023-11-07 03:11
|
libudev1 |
CVE-2018-1049 |
中危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: automount: access to automounted volumes can lock up
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1049
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-02-16 21:29 修改: 2022-01-31 18:26
|
libudev1 |
CVE-2019-6454 |
中危 |
215-17+deb8u7 |
215-17+deb8u10 |
systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6454
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:13
|
e2fsprogs |
CVE-2019-5094 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u1 |
e2fsprogs: Crafted ext4 partition leads to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5094
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-09-24 22:15 修改: 2023-11-07 03:11
|
libuuid1 |
CVE-2016-5011 |
中危 |
2.25.2-6 |
|
util-linux: Extended partition loop in MBR partition table leads to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5011
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-04-11 15:59 修改: 2020-09-11 15:22
|
e2fsprogs |
CVE-2019-5188 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u2 |
e2fsprogs: Out-of-bounds write in e2fsck/rehash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5188
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2020-01-08 16:15 修改: 2023-11-07 03:11
|
binutils |
CVE-2017-14529 |
中危 |
2.25-5+deb8u1 |
|
binutils: heap-based buffer over-read in bfd_getl16 function in peXXigen.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14529
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-18 00:29 修改: 2023-11-07 02:39
|
ncurses-base |
CVE-2017-13729 |
中危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the _nc_save_str function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13729
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-base |
CVE-2017-13730 |
中危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_read_entry_source()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13730
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-base |
CVE-2017-13731 |
中危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function postprocess_termcap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13731
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-base |
CVE-2017-13732 |
中危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function dump_uses()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13732
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-base |
CVE-2017-13733 |
中危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function fmt_entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13733
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-base |
CVE-2017-13734 |
中危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_safe_strcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13734
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2018-10-21 10:29
|
ncurses-base |
CVE-2018-19217 |
中危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference at function _nc_name_match
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19217
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-11-12 19:29 修改: 2024-08-05 12:15
|
binutils |
CVE-2017-14974 |
中危 |
2.25-5+deb8u1 |
|
binutils: NULL pointer dereference in the *_get_synthetic_symtab functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14974
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-02 01:29 修改: 2023-11-07 02:39
|
libgnutls-deb0-28 |
CVE-2018-10844 |
中危 |
3.3.8-6+deb8u5 |
3.3.30-0+deb8u1 |
gnutls: HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10844
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-22 13:29 修改: 2023-02-13 04:50
|
libgnutls-deb0-28 |
CVE-2018-10845 |
中危 |
3.3.8-6+deb8u5 |
3.3.30-0+deb8u1 |
gnutls: HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10845
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-22 13:29 修改: 2023-02-13 04:50
|
libgnutls-deb0-28 |
CVE-2018-10846 |
中危 |
3.3.8-6+deb8u5 |
3.3.30-0+deb8u1 |
gnutls: "Just in Time" PRIME + PROBE cache-based side channel attack can lead to plaintext recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10846
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-22 13:29 修改: 2023-02-13 04:50
|
libgnutls-deb0-28 |
CVE-2018-16868 |
中危 |
3.3.8-6+deb8u5 |
|
gnutls: Bleichenbacher-like side channel leakage in PKCS#1 v1.5 verification and padding oracle verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16868
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-03 14:29 修改: 2022-11-30 21:20
|
file |
CVE-2018-10360 |
中危 |
1:5.22+15-2+deb8u3 |
1:5.22+15-2+deb8u4 |
file: out-of-bounds read via a crafted ELF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10360
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-11 10:29 修改: 2019-05-02 14:40
|
ncurses-bin |
CVE-2017-13729 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the _nc_save_str function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13729
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-bin |
CVE-2017-13730 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_read_entry_source()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13730
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-bin |
CVE-2017-13731 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function postprocess_termcap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13731
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-bin |
CVE-2017-13732 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function dump_uses()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13732
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-bin |
CVE-2017-13733 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function fmt_entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13733
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-bin |
CVE-2017-13734 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_safe_strcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13734
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-08-29 06:29 修改: 2018-10-21 10:29
|
ncurses-bin |
CVE-2018-19217 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference at function _nc_name_match
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19217
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-11-12 19:29 修改: 2024-08-05 12:15
|
libgomp1 |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
openssl |
CVE-2017-3735 |
中危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u7 |
openssl: Malformed X.509 IPAdressFamily could cause OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3735
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-28 19:29 修改: 2022-12-13 12:15
|
openssl |
CVE-2018-0734 |
中危 |
1.0.1t-1+deb8u6 |
|
openssl: timing side channel attack in the DSA signature algorithm
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0734
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-30 12:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-0735 |
中危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u10 |
openssl: timing side channel attack in the ECDSA signature generation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0735
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-29 13:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-0737 |
中危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u9 |
openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0737
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-16 18:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-0739 |
中危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u8 |
openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0739
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-27 21:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-5407 |
中危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u10 |
openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5407
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-11-15 21:29 修改: 2023-11-07 02:58
|
openssl |
CVE-2019-1547 |
中危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u12 |
openssl: side-channel weak encryption vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1547
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-10 17:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2019-1559 |
中危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u11 |
openssl: 0-byte record padding oracle
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1559
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-02-27 23:29 修改: 2023-11-07 03:08
|
libgomp1 |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
libgssapi-krb5-2 |
CVE-2015-2694 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: issues in OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2694
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-05-25 19:59 修改: 2020-01-21 15:46
|
libgssapi-krb5-2 |
CVE-2016-3119 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libgssapi-krb5-2 |
CVE-2016-3120 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
patch |
CVE-2019-13636 |
中危 |
2.7.5-1 |
2.7.5-1+deb8u2 |
patch: the following of symlinks in inp.c and util.c is mishandled in cases other than input files
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13636
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-07-17 21:15 修改: 2023-11-07 03:03
|
libgssapi-krb5-2 |
CVE-2017-11368 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
libgssapi-krb5-2 |
CVE-2018-20217 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: Reachable assertion in the KDC using S4U2Self requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20217
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-26 21:29 修改: 2023-11-07 02:56
|
libgssapi-krb5-2 |
CVE-2018-5710 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null pointer deference in strlen function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5710
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58
|
libgssapi-krb5-2 |
CVE-2018-5729 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libxml2 |
CVE-2016-9318 |
中危 |
2.9.1+dfsg1-5+deb8u4 |
|
libxml2: XML External Entity vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9318
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-11-16 00:59 修改: 2022-04-08 23:15
|
libxml2 |
CVE-2017-18258 |
中危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u7 |
libxml2: Unrestricted memory usage in xz_head() function in xzlib.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18258
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-04-08 17:29 修改: 2020-09-10 01:15
|
perl |
CVE-2017-6512 |
中危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u7 |
perl-File-Path: rmtree/remove_tree race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6512
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-01 16:29 修改: 2020-04-29 20:24
|
libxml2 |
CVE-2017-5969 |
中危 |
2.9.1+dfsg1-5+deb8u4 |
|
libxml2: Null pointer dereference in xmlSaveDoc implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5969
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-04-11 16:59 修改: 2024-08-05 16:15
|
libxml2 |
CVE-2018-14567 |
中危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u7 |
libxml2: Infinite loop caused by incorrect error detection during LZMA decompression
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14567
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-08-16 20:29 修改: 2020-09-10 01:15
|
libhogweed2 |
CVE-2018-16869 |
中危 |
2.7.1-5+deb8u2 |
|
nettle: Leaky data conversion exposing a manager oracle
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16869
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-03 14:29 修改: 2023-02-03 14:25
|
file |
CVE-2019-8905 |
中危 |
1:5.22+15-2+deb8u3 |
1:5.22+15-2+deb8u5 |
file: stack-based buffer over-read in do_core_note in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8905
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-02-18 17:29 修改: 2021-12-09 19:38
|
binutils |
CVE-2017-6965 |
中危 |
2.25-5+deb8u1 |
|
binutils: Heap-based buffer overflow in target_specific_reloc_handling in readelf
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6965
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-17 09:59 修改: 2017-09-19 01:36
|
libitm1 |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
perl-base |
CVE-2017-6512 |
中危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u7 |
perl-File-Path: rmtree/remove_tree race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6512
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-06-01 16:29 修改: 2020-04-29 20:24
|
libitm1 |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
libk5crypto3 |
CVE-2015-2694 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: issues in OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2694
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-05-25 19:59 修改: 2020-01-21 15:46
|
libk5crypto3 |
CVE-2016-3119 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libk5crypto3 |
CVE-2016-3120 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
libk5crypto3 |
CVE-2017-11368 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
libk5crypto3 |
CVE-2018-20217 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: Reachable assertion in the KDC using S4U2Self requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20217
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-26 21:29 修改: 2023-11-07 02:56
|
perl-modules |
CVE-2017-6512 |
中危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u7 |
perl-File-Path: rmtree/remove_tree race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6512
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-01 16:29 修改: 2020-04-29 20:24
|
libk5crypto3 |
CVE-2018-5710 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null pointer deference in strlen function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5710
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58
|
libk5crypto3 |
CVE-2018-5729 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libkrb5-3 |
CVE-2015-2694 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: issues in OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2694
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-05-25 19:59 修改: 2020-01-21 15:46
|
libkrb5-3 |
CVE-2016-3119 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libkrb5-3 |
CVE-2016-3120 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
libkrb5-3 |
CVE-2017-11368 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
libkrb5-3 |
CVE-2018-20217 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: Reachable assertion in the KDC using S4U2Self requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20217
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-26 21:29 修改: 2023-11-07 02:56
|
libkrb5-3 |
CVE-2018-5710 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null pointer deference in strlen function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5710
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58
|
libkrb5-3 |
CVE-2018-5729 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libkrb5support0 |
CVE-2015-2694 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: issues in OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2694
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-05-25 19:59 修改: 2020-01-21 15:46
|
libkrb5support0 |
CVE-2016-3119 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libkrb5support0 |
CVE-2016-3120 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
systemd |
CVE-2018-1049 |
中危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: automount: access to automounted volumes can lock up
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1049
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-02-16 21:29 修改: 2022-01-31 18:26
|
systemd |
CVE-2019-6454 |
中危 |
215-17+deb8u7 |
215-17+deb8u10 |
systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6454
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:13
|
libkrb5support0 |
CVE-2017-11368 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
libkrb5support0 |
CVE-2018-20217 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: Reachable assertion in the KDC using S4U2Self requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20217
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-12-26 21:29 修改: 2023-11-07 02:56
|
libkrb5support0 |
CVE-2018-5710 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null pointer deference in strlen function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5710
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58
|
libkrb5support0 |
CVE-2018-5729 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
g++-4.9 |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
g++-4.9 |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
systemd-sysv |
CVE-2018-1049 |
中危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: automount: access to automounted volumes can lock up
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1049
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-02-16 21:29 修改: 2022-01-31 18:26
|
systemd-sysv |
CVE-2019-6454 |
中危 |
215-17+deb8u7 |
215-17+deb8u10 |
systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6454
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:13
|
tar |
CVE-2018-20482 |
中危 |
1.27.1-2+deb8u1 |
1.27.1-2+deb8u2 |
tar: Infinite read loop in sparse_dump_region function in sparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20482
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-12-26 18:29 修改: 2021-11-30 19:52
|
libldap-2.4-2 |
CVE-2017-9287 |
中危 |
2.4.40+dfsg-1+deb8u2 |
2.4.40+dfsg-1+deb8u3 |
openldap: Double free vulnerability in servers/slapd/back-mdb/search.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9287
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-29 16:29 修改: 2022-06-13 19:18
|
libldap-2.4-2 |
CVE-2019-13057 |
中危 |
2.4.40+dfsg-1+deb8u2 |
2.4.40+dfsg-1+deb8u5 |
openldap: Information disclosure issue in slapd component
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13057
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-07-26 13:15 修改: 2022-06-13 18:38
|
binutils |
CVE-2017-6966 |
中危 |
2.25-5+deb8u1 |
|
binutils: Use-after-free in target_specific_reloc_handling in readelf
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6966
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-17 09:59 修改: 2017-09-19 01:36
|
liblsan0 |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
liblsan0 |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
gcc-4.8-base |
CVE-2017-11671 |
中危 |
4.8.4-1 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
udev |
CVE-2018-1049 |
中危 |
215-17+deb8u7 |
215-17+deb8u8 |
systemd: automount: access to automounted volumes can lock up
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1049
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-02-16 21:29 修改: 2022-01-31 18:26
|
udev |
CVE-2019-6454 |
中危 |
215-17+deb8u7 |
215-17+deb8u10 |
systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6454
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:13
|
binutils |
CVE-2017-7224 |
中危 |
2.25-5+deb8u1 |
|
binutils: Invalid write in find_nearest_line function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7224
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-22 16:59 修改: 2018-01-09 02:29
|
util-linux |
CVE-2016-5011 |
中危 |
2.25.2-6 |
|
util-linux: Extended partition loop in MBR partition table leads to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5011
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-04-11 15:59 修改: 2020-09-11 15:22
|
libmagic1 |
CVE-2018-10360 |
中危 |
1:5.22+15-2+deb8u3 |
1:5.22+15-2+deb8u4 |
file: out-of-bounds read via a crafted ELF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10360
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-06-11 10:29 修改: 2019-05-02 14:40
|
libmagic1 |
CVE-2019-8905 |
中危 |
1:5.22+15-2+deb8u3 |
1:5.22+15-2+deb8u5 |
file: stack-based buffer over-read in do_core_note in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8905
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-02-18 17:29 修改: 2021-12-09 19:38
|
gcc-4.9 |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
libmount1 |
CVE-2016-5011 |
中危 |
2.25.2-6 |
|
util-linux: Extended partition loop in MBR partition table leads to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5011
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-04-11 15:59 修改: 2020-09-11 15:22
|
binutils |
CVE-2016-4491 |
低危 |
2.25-5+deb8u1 |
|
gcc: Stack overflow due to infinite recursion in d_print_comp
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4491
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-02-24 20:59 修改: 2017-07-28 01:29
|
binutils |
CVE-2016-4492 |
低危 |
2.25-5+deb8u1 |
|
gcc: Read access violations
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4492
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-02-24 20:59 修改: 2017-07-28 01:29
|
binutils |
CVE-2016-4493 |
低危 |
2.25-5+deb8u1 |
|
gcc: Read access violations
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4493
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-02-24 20:59 修改: 2017-07-28 01:29
|
binutils |
CVE-2016-6131 |
低危 |
2.25-5+deb8u1 |
|
gcc,gdb,binutils,libitm: Stack overflow vulnerability in libiberty demangler
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6131
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-02-07 15:59 修改: 2017-02-09 22:28
|
binutils |
CVE-2017-14128 |
低危 |
2.25-5+deb8u1 |
|
binutils: Heap-based buffer over-read in the decode_line_info function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14128
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-04 20:29 修改: 2023-11-07 02:38
|
libsystemd0 |
CVE-2018-16888 |
低危 |
215-17+deb8u7 |
|
systemd: kills privileged process if unprivileged PIDFile was tampered
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16888
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-14 22:29 修改: 2023-11-07 02:53
|
libsystemd0 |
CVE-2018-6954 |
低危 |
215-17+deb8u7 |
|
systemd: Mishandled symlinks in systemd-tmpfiles allows local users to obtain ownership of arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6954
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-02-13 20:29 修改: 2023-11-07 03:00
|
libsystemd0 |
CVE-2019-3815 |
低危 |
215-17+deb8u7 |
215-17+deb8u11 |
systemd: memory leak in journald-server.c introduced by fix for CVE-2018-16864
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3815
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-28 15:29 修改: 2023-02-12 23:38
|
binutils |
CVE-2017-14129 |
低危 |
2.25-5+deb8u1 |
|
binutils: Heap-based buffer over-read in the read_section function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14129
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-04 20:29 修改: 2023-11-07 02:38
|
linux-libc-dev |
CVE-2014-9717 |
低危 |
3.16.43-2 |
|
kernel: unsharing MNT_LOCKED mount can expose files beneath the mount.
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9717
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-05-02 10:59 修改: 2016-08-12 01:59
|
linux-libc-dev |
CVE-2015-8952 |
低危 |
3.16.43-2 |
|
kernel: mbcache code subject to softlockup DOS in cache management
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8952
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-10-16 21:59 修改: 2018-03-16 01:29
|
linux-libc-dev |
CVE-2016-3139 |
低危 |
3.16.43-2 |
|
kernel: Crash on invalid USB device descriptors (wacom driver)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3139
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2016-04-27 17:59 修改: 2023-11-07 02:32
|
linux-libc-dev |
CVE-2017-11473 |
低危 |
3.16.43-2 |
3.16.51-1 |
kernel: Buffer overflow in mp_override_legacy_irq()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11473
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-07-20 04:29 修改: 2023-01-19 15:48
|
linux-libc-dev |
CVE-2017-13216 |
低危 |
3.16.43-2 |
3.16.56-1 |
kernel: escalation of privileges (EoP) in ashmem_ioctl function in drivers/staging/android/ashmen.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13216
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-12 23:29 修改: 2018-01-30 19:43
|
linux-libc-dev |
CVE-2017-14051 |
低危 |
3.16.43-2 |
3.16.43-2+deb8u5 |
kernel: Integer overflow in the qla2x00_sysfs_write_optrom_ctl function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14051
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-08-31 04:29 修改: 2018-03-16 01:29
|
linux-libc-dev |
CVE-2017-16645 |
低危 |
3.16.43-2 |
3.16.56-1 |
kernel: Out-of-bounds read in drivers/input/misc/ims-pcu.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16645
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-07 23:29 修改: 2018-08-24 10:29
|
linux-libc-dev |
CVE-2017-17807 |
低危 |
3.16.43-2 |
3.16.51-3+deb8u1 |
kernel: Missing permissions check for request_key() destination allows local attackers to add keys to keyring without Write permission
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17807
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-20 23:29 修改: 2019-10-03 00:03
|
linux-libc-dev |
CVE-2018-13053 |
低危 |
3.16.43-2 |
3.16.64-1 |
kernel: Integer overflow in the alarm_timer_nsleep function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13053
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-07-02 12:29 修改: 2019-04-23 17:29
|
linux-libc-dev |
CVE-2018-18386 |
低危 |
3.16.43-2 |
3.16.56-1 |
kernel: Type confusion in drivers/tty/n_tty.c allows for a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18386
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-10-17 20:29 修改: 2019-04-23 17:29
|
linux-libc-dev |
CVE-2018-6412 |
低危 |
3.16.43-2 |
3.16.57-1 |
kernel: Incorrect integer signedness in sbuslibc:sbusfb_ioctl_helper() allows for information leakage
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6412
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-01-31 07:29 修改: 2019-03-20 19:04
|
linux-libc-dev |
CVE-2019-10142 |
低危 |
3.16.43-2 |
3.16.70-1 |
kernel: integer overflow in ioctl handling of fsl hypervisor
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10142
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-07-30 17:15 修改: 2019-10-09 23:44
|
linux-libc-dev |
CVE-2019-1125 |
低危 |
3.16.43-2 |
3.16.72-1 |
kernel: hw: Spectre SWAPGS gadget vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1125
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-03 18:15 修改: 2024-05-29 17:15
|
linux-libc-dev |
CVE-2019-11884 |
低危 |
3.16.43-2 |
3.16.68-2 |
kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11884
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-05-10 22:29 修改: 2023-11-07 03:03
|
linux-libc-dev |
CVE-2019-17052 |
低危 |
3.16.43-2 |
3.16.81-1 |
kernel: unprivileged users able to create RAW sockets in the the AF_AX25 network protocol.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17052
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-10-01 14:15 修改: 2023-11-07 03:06
|
linux-libc-dev |
CVE-2019-17053 |
低危 |
3.16.43-2 |
3.16.81-1 |
kernel: unprivileged users able to create RAW sockets in AF_IEEE802154 network protocol
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17053
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-10-01 14:15 修改: 2023-11-07 03:06
|
linux-libc-dev |
CVE-2019-17054 |
低危 |
3.16.43-2 |
3.16.81-1 |
kernel: privilege escalation in atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17054
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-10-01 14:15 修改: 2023-11-07 03:06
|
linux-libc-dev |
CVE-2019-17055 |
低危 |
3.16.43-2 |
3.16.81-1 |
kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17055
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-10-01 14:15 修改: 2023-11-07 03:06
|
linux-libc-dev |
CVE-2019-17056 |
低危 |
3.16.43-2 |
3.16.81-1 |
kernel: unprivileged access to llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC socket type.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17056
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-10-01 14:15 修改: 2023-11-07 03:06
|
linux-libc-dev |
CVE-2019-18806 |
低危 |
3.16.43-2 |
3.16.81-1 |
kernel: memory leak in ql_alloc_large_buffers() function in drivers/net/ethernet/qlogic/qla3xxx.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18806
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-07 16:15 修改: 2020-08-24 17:37
|
linux-libc-dev |
CVE-2019-19057 |
低危 |
3.16.43-2 |
3.16.81-1 |
kernel: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows for a DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19057
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-11-18 06:15 修改: 2023-11-07 03:07
|
linux-libc-dev |
CVE-2019-19533 |
低危 |
3.16.43-2 |
3.16.81-1 |
kernel: information leak bug caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19533
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-03 16:15 修改: 2020-01-18 07:15
|
linux-libc-dev |
CVE-2019-19534 |
低危 |
3.16.43-2 |
3.16.81-1 |
kernel: information leak bug caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19534
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-12-03 16:15 修改: 2022-03-31 18:21
|
binutils |
CVE-2017-14130 |
低危 |
2.25-5+deb8u1 |
|
binutils: Heap-based buffer over-read in the _bfd_elf_parse_attributes function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14130
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-04 20:29 修改: 2023-11-07 02:38
|
login |
CVE-2018-7169 |
低危 |
1:4.2-3+deb8u3 |
|
shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7169
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-02-15 20:29 修改: 2019-10-03 00:03
|
binutils |
CVE-2017-14930 |
低危 |
2.25-5+deb8u1 |
|
binutils: Memory leak in decode_line_info
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14930
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-30 01:29 修改: 2019-10-03 00:03
|
binutils |
CVE-2017-14932 |
低危 |
2.25-5+deb8u1 |
|
binutils: Infinite loop in the decode_line_info
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14932
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-30 01:29 修改: 2023-11-07 02:39
|
binutils |
CVE-2017-14933 |
低危 |
2.25-5+deb8u1 |
|
binutils: Infinite loop in read_formatted_entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14933
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-30 01:29 修改: 2023-11-07 02:39
|
binutils |
CVE-2017-14934 |
低危 |
2.25-5+deb8u1 |
|
binutils: Infinite loop in process_debug_info
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14934
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-30 01:29 修改: 2023-11-07 02:39
|
binutils |
CVE-2017-14938 |
低危 |
2.25-5+deb8u1 |
|
binutils: Excessive memory allocation in _bfd_elf_slurp_version_tables
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14938
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-30 01:29 修改: 2023-11-07 02:39
|
libdevmapper1.02.1 |
CVE-2020-8991 |
低危 |
2:1.02.90-2.2+deb8u1 |
|
lvm2: memory leak in vg_lookup in daemons/lvmetad/lvmetad-core.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8991
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2020-02-14 05:15 修改: 2024-08-04 11:15
|
binutils |
CVE-2017-14939 |
低危 |
2.25-5+deb8u1 |
|
binutils: Heap-based buffer over-read in the decode_line_info
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14939
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-30 01:29 修改: 2023-11-07 02:39
|
libncurses5 |
CVE-2018-19211 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: Null pointer dereference at function _nc_parse_entry in parse_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19211
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-11-12 19:29 修改: 2019-04-23 13:15
|
libncurses5 |
CVE-2019-17594 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
libncurses5 |
CVE-2019-17595 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
binutils |
CVE-2017-14940 |
低危 |
2.25-5+deb8u1 |
|
binutils: NULL pointer dereference in the scan_unit_for_symbols
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14940
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-30 01:29 修改: 2023-11-07 02:39
|
binutils |
CVE-2017-15020 |
低危 |
2.25-5+deb8u1 |
|
binutils: Heap-based buffer overflow in parse_die
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15020
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-05 01:29 修改: 2023-11-07 02:39
|
binutils |
CVE-2017-15021 |
低危 |
2.25-5+deb8u1 |
|
binutils: Heap-based buffer over-read in bfd_get_debug_link_info_1
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15021
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-05 01:29 修改: 2023-11-07 02:39
|
libtinfo5 |
CVE-2018-19211 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: Null pointer dereference at function _nc_parse_entry in parse_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19211
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-11-12 19:29 修改: 2019-04-23 13:15
|
libtinfo5 |
CVE-2019-17594 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
libtinfo5 |
CVE-2019-17595 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
ncurses-base |
CVE-2018-19211 |
低危 |
5.9+20140913-1 |
|
ncurses: Null pointer dereference at function _nc_parse_entry in parse_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19211
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-11-12 19:29 修改: 2019-04-23 13:15
|
ncurses-base |
CVE-2019-17594 |
低危 |
5.9+20140913-1 |
|
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
ncurses-base |
CVE-2019-17595 |
低危 |
5.9+20140913-1 |
|
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
binutils |
CVE-2017-15022 |
低危 |
2.25-5+deb8u1 |
|
binutils: NULL pointer dereference in dwarf2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15022
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-05 01:29 修改: 2023-11-07 02:39
|
dmsetup |
CVE-2020-8991 |
低危 |
2:1.02.90-2.2+deb8u1 |
|
lvm2: memory leak in vg_lookup in daemons/lvmetad/lvmetad-core.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8991
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2020-02-14 05:15 修改: 2024-08-04 11:15
|
binutils |
CVE-2017-15023 |
低危 |
2.25-5+deb8u1 |
|
binutils: NULL pointer dereference in read_formatted_entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15023
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-05 01:29 修改: 2023-11-07 02:39
|
binutils |
CVE-2017-15024 |
低危 |
2.25-5+deb8u1 |
|
binutils: Infinite recursion in find_abstract_instance_name
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15024
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-05 01:29 修改: 2023-11-07 02:39
|
binutils |
CVE-2017-15025 |
低危 |
2.25-5+deb8u1 |
|
binutils: Divide-by-zero in decode_line_info
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15025
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-05 01:29 修改: 2023-11-07 02:39
|
binutils |
CVE-2017-15225 |
低危 |
2.25-5+deb8u1 |
|
binutils: Memory leak in _bfd_dwarf2_cleanup_debug_info
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15225
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-10 23:29 修改: 2023-11-07 02:39
|
binutils |
CVE-2017-15938 |
低危 |
2.25-5+deb8u1 |
|
binutils: Invalid memory read in find_abstract_instance_name
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15938
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-27 21:29 修改: 2023-11-07 02:40
|
binutils |
CVE-2017-15996 |
低危 |
2.25-5+deb8u1 |
|
binutils: Excessive memory allocation in elfcomm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15996
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-10-29 17:29 修改: 2023-11-07 02:40
|
binutils |
CVE-2017-16826 |
低危 |
2.25-5+deb8u1 |
|
binutils: Invalid memory access in the coff_slurp_line_table function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16826
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-15 08:29 修改: 2023-11-07 02:40
|
binutils |
CVE-2017-16827 |
低危 |
2.25-5+deb8u1 |
|
binutils: Invalid free in the aout_get_external_symbols function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16827
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-15 08:29 修改: 2023-11-07 02:40
|
libncursesw5 |
CVE-2018-19211 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: Null pointer dereference at function _nc_parse_entry in parse_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19211
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-11-12 19:29 修改: 2019-04-23 13:15
|
libncursesw5 |
CVE-2019-17594 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
libncursesw5 |
CVE-2019-17595 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
ncurses-bin |
CVE-2018-19211 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: Null pointer dereference at function _nc_parse_entry in parse_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19211
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-11-12 19:29 修改: 2019-04-23 13:15
|
ncurses-bin |
CVE-2019-17594 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
ncurses-bin |
CVE-2019-17595 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
binutils |
CVE-2017-16828 |
低危 |
2.25-5+deb8u1 |
|
binutils: Integer overflow in the display_debug_frames function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16828
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-15 08:29 修改: 2023-11-07 02:40
|
libudev1 |
CVE-2018-16888 |
低危 |
215-17+deb8u7 |
|
systemd: kills privileged process if unprivileged PIDFile was tampered
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16888
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-14 22:29 修改: 2023-11-07 02:53
|
libudev1 |
CVE-2018-6954 |
低危 |
215-17+deb8u7 |
|
systemd: Mishandled symlinks in systemd-tmpfiles allows local users to obtain ownership of arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6954
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-02-13 20:29 修改: 2023-11-07 03:00
|
libudev1 |
CVE-2019-3815 |
低危 |
215-17+deb8u7 |
215-17+deb8u11 |
systemd: memory leak in journald-server.c introduced by fix for CVE-2018-16864
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3815
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-28 15:29 修改: 2023-02-12 23:38
|
binutils |
CVE-2017-16829 |
低危 |
2.25-5+deb8u1 |
|
binutils: Out-of-bounds read in the _bfd_elf_parse_gnu_properties function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16829
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-15 08:29 修改: 2023-11-07 02:40
|
binutils |
CVE-2017-16830 |
低危 |
2.25-5+deb8u1 |
|
binutils: Segmentation fault in the print_gnu_property_note function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16830
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-15 08:29 修改: 2023-11-07 02:40
|
binutils |
CVE-2017-16831 |
低危 |
2.25-5+deb8u1 |
|
binutils: Integer overflow in coffgen.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16831
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-15 08:29 修改: 2023-11-07 02:40
|
binutils |
CVE-2017-16832 |
低危 |
2.25-5+deb8u1 |
|
binutils: Segmentation fault in the pe_bfd_read_buildid function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16832
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-15 08:29 修改: 2023-11-07 02:40
|
libpcre3 |
CVE-2017-7245 |
低危 |
2:8.35-3.3+deb8u4 |
|
pcre: stack-based buffer overflow write in pcre32_copy_substring
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7245
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
openssl |
CVE-2019-1563 |
低危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u12 |
openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1563
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-10 17:15 修改: 2023-11-07 03:08
|
libpcre3 |
CVE-2017-7246 |
低危 |
2:8.35-3.3+deb8u4 |
|
pcre: stack-based buffer overflow write in pcre32_copy_substring
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7246
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
passwd |
CVE-2018-7169 |
低危 |
1:4.2-3+deb8u3 |
|
shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7169
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-02-15 20:29 修改: 2019-10-03 00:03
|
binutils |
CVE-2017-17080 |
低危 |
2.25-5+deb8u1 |
|
binutils: Heap-based buffer over-read in bfd_getl32
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17080
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-11-30 21:29 修改: 2019-10-03 00:03
|
binutils |
CVE-2017-17121 |
低危 |
2.25-5+deb8u1 |
|
binutils: Memory access violation via a crafted COFF binary
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17121
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-04 08:29 修改: 2023-11-07 02:41
|
binutils |
CVE-2017-17122 |
低危 |
2.25-5+deb8u1 |
|
binutils: Excessive memory allocation in the dump_relocs_in_section function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17122
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-04 08:29 修改: 2023-11-07 02:41
|
binutils |
CVE-2017-17123 |
低危 |
2.25-5+deb8u1 |
|
binutils: NULL pointer dereference in the coff_slurp_reloc_table function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17123
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-04 08:29 修改: 2023-11-07 02:41
|
binutils |
CVE-2017-17124 |
低危 |
2.25-5+deb8u1 |
|
binutils: Heap buffer overflow in the _bfd_coff_read_string_table function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17124
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-04 08:29 修改: 2023-11-07 02:41
|
binutils |
CVE-2017-17125 |
低危 |
2.25-5+deb8u1 |
|
binutils: Buffer over-read in the _bfd_elf_get_symbol_version_string function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17125
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-04 08:29 修改: 2023-11-07 02:41
|
binutils |
CVE-2017-17126 |
低危 |
2.25-5+deb8u1 |
|
binutils: Invalid memory access in the load_debug_section function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17126
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-12-04 08:29 修改: 2023-11-07 02:41
|
binutils |
CVE-2017-7210 |
低危 |
2.25-5+deb8u1 |
|
binutils: Heap-based buffer over-reads in objdump
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7210
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-03-21 06:59 修改: 2018-01-09 02:29
|
gnupg |
CVE-2019-14855 |
低危 |
1.4.18-7+deb8u3 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
binutils |
CVE-2017-7614 |
低危 |
2.25-5+deb8u1 |
|
binutils: NULL pointer dereference in bfd_elf_final_link function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7614
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-04-09 14:59 修改: 2017-09-19 01:36
|
binutils |
CVE-2017-9038 |
低危 |
2.25-5+deb8u1 |
|
binutils: Heap-buffer overflow in the byte_get_little_endian
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9038
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-18 01:29 修改: 2023-11-07 02:50
|
gpgv |
CVE-2019-14855 |
低危 |
1.4.18-7+deb8u3 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
binutils |
CVE-2017-9039 |
低危 |
2.25-5+deb8u1 |
|
binutils: Memory consumption via many program headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9039
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-18 01:29 修改: 2023-11-07 02:50
|
inetutils-ping |
CVE-2019-0053 |
低危 |
2:1.9.2.39.3a460-3 |
|
Insufficient validation of environment variables in the telnet client ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0053
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-07-11 20:15 修改: 2023-10-08 14:15
|
libapr1 |
CVE-2017-12613 |
低危 |
1.5.1-3 |
|
apr: Out-of-bounds array deref in apr_time_exp*() functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12613
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-10-24 01:29 修改: 2023-11-07 02:38
|
libgssapi-krb5-2 |
CVE-2017-11462 |
低危 |
1.12.1+dfsg-19+deb8u2 |
|
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
libgssapi-krb5-2 |
CVE-2018-5730 |
低危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
libaprutil1 |
CVE-2017-12618 |
低危 |
1.5.4-1 |
|
apr-util: Out-of-bounds access in corrupted SDBM database
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12618
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-10-24 01:29 修改: 2018-10-31 10:29
|
libaprutil1-dbd-sqlite3 |
CVE-2017-12618 |
低危 |
1.5.4-1 |
|
apr-util: Out-of-bounds access in corrupted SDBM database
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12618
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-10-24 01:29 修改: 2018-10-31 10:29
|
libaprutil1-ldap |
CVE-2017-12618 |
低危 |
1.5.4-1 |
|
apr-util: Out-of-bounds access in corrupted SDBM database
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12618
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2017-10-24 01:29 修改: 2018-10-31 10:29
|
binutils |
CVE-2017-9040 |
低危 |
2.25-5+deb8u1 |
|
binutils: NULL pointer dereference in the process_mips_specific_function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9040
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-18 01:29 修改: 2023-11-07 02:50
|
binutils |
CVE-2017-9041 |
低危 |
2.25-5+deb8u1 |
|
binutils: Heap buffer overflow in the process_mips_specific function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9041
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-18 01:29 修改: 2023-11-07 02:50
|
binutils |
CVE-2017-9042 |
低危 |
2.25-5+deb8u1 |
|
binutils: Invalid variable type in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9042
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-18 01:29 修改: 2023-11-07 02:50
|
binutils |
CVE-2017-9043 |
低危 |
2.25-5+deb8u1 |
|
binutils: Shift exponent too large for type unsigned long in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9043
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-18 01:29 修改: 2023-11-07 02:50
|
binutils |
CVE-2017-9044 |
低危 |
2.25-5+deb8u1 |
|
binutils: Out-of-bounds read in the print_symbol_for_build_attribute function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9044
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-05-18 01:29 修改: 2017-05-25 01:29
|
binutils |
CVE-2017-9742 |
低危 |
2.25-5+deb8u1 |
|
binutils: Global buffer over-read in print_insn_score16 function while disassembling corrupt score binary
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9742
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2017-09-19 01:36
|
binutils |
CVE-2017-9743 |
低危 |
2.25-5+deb8u1 |
|
binutils: Global buffer over-read in print_insn_score32 function while disassembling corrupt score binary
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9743
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2018-01-09 02:29
|
binutils |
CVE-2017-9744 |
低危 |
2.25-5+deb8u1 |
|
binutils: Address violation in sh_elf_set_mach_from_flags function when disassembling a corrupt SH binary
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9744
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2017-06-26 16:10
|
binutils |
CVE-2017-9745 |
低危 |
2.25-5+deb8u1 |
|
binutils: Heap buffer over-read in _bfd_vms_slurp_etir function when handling VMS alpha binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9745
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2017-06-26 16:13
|
libk5crypto3 |
CVE-2017-11462 |
低危 |
1.12.1+dfsg-19+deb8u2 |
|
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
libk5crypto3 |
CVE-2018-5730 |
低危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
binutils |
CVE-2017-9746 |
低危 |
2.25-5+deb8u1 |
|
binutils: Heap buffer over-read in disassemble_bytes function when disassembling a corrupt binary
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9746
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2018-01-09 02:29
|
binutils |
CVE-2017-9747 |
低危 |
2.25-5+deb8u1 |
|
binutils: Stack-based buffer over-read in ieee_archive_p function while disassembling corrupt IEEE binary
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9747
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2017-08-13 01:29
|
binutils |
CVE-2017-9748 |
低危 |
2.25-5+deb8u1 |
|
binutils: Stack-based buffer over-read in ieee_object_p function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9748
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2017-08-12 01:29
|
binutils |
CVE-2017-9749 |
低危 |
2.25-5+deb8u1 |
|
binutils: Global buffer over-read in *regs* macros when disassembling corrupt bfin binary
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9749
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2018-01-09 02:29
|
binutils |
CVE-2017-9750 |
低危 |
2.25-5+deb8u1 |
|
binutils: Global buffer over-read in opcodes/rx-decode.opc when disassembling a corrupt RX binary
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9750
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2018-01-09 02:29
|
binutils |
CVE-2017-9751 |
低危 |
2.25-5+deb8u1 |
|
binutils: Stack-based buffer over-read in opcodes/rl78-decode.opc when disassembling a corrupt RL78 binary
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9751
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2018-01-09 02:29
|
binutils |
CVE-2017-9752 |
低危 |
2.25-5+deb8u1 |
|
binutils: Heap buffer over-read in f_bfd_vms_get_value function when processing a corrupt Alpha VMA binary
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9752
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2017-06-26 16:20
|
libkrb5-3 |
CVE-2017-11462 |
低危 |
1.12.1+dfsg-19+deb8u2 |
|
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
systemd |
CVE-2018-16888 |
低危 |
215-17+deb8u7 |
|
systemd: kills privileged process if unprivileged PIDFile was tampered
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16888
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-14 22:29 修改: 2023-11-07 02:53
|
systemd |
CVE-2018-6954 |
低危 |
215-17+deb8u7 |
|
systemd: Mishandled symlinks in systemd-tmpfiles allows local users to obtain ownership of arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6954
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-02-13 20:29 修改: 2023-11-07 03:00
|
systemd |
CVE-2019-3815 |
低危 |
215-17+deb8u7 |
215-17+deb8u11 |
systemd: memory leak in journald-server.c introduced by fix for CVE-2018-16864
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3815
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-28 15:29 修改: 2023-02-12 23:38
|
libkrb5-3 |
CVE-2018-5730 |
低危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
binutils |
CVE-2017-9753 |
低危 |
2.25-5+deb8u1 |
|
binutils: Address violation in versados_mkobject function when disassembling a corrupt versados binary
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9753
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2017-06-26 16:20
|
binutils |
CVE-2017-9754 |
低危 |
2.25-5+deb8u1 |
|
binutils: Stack-based buffer over-read in process_otr function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9754
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2017-06-26 16:21
|
binutils |
CVE-2017-9755 |
低危 |
2.25-5+deb8u1 |
|
binutils: Global buffer over-read in opcodes/i386-dis.c while checking invalid registers
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9755
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2018-01-09 02:29
|
binutils |
CVE-2017-9756 |
低危 |
2.25-5+deb8u1 |
|
binutils: Address violation in aarch64_ext_ldst_reglist function when disassembling corrupt aarch64 binary
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9756
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-06-19 04:29 修改: 2018-01-09 02:29
|
binutils |
CVE-2018-8945 |
低危 |
2.25-5+deb8u1 |
|
binutils: Crash in elf.c:bfd_section_from_shdr() with crafted executable
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8945
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-22 21:29 修改: 2019-10-31 01:15
|
apache2-utils |
CVE-2020-1934 |
低危 |
2.4.10-10+deb8u8 |
|
httpd: mod_proxy_ftp use of uninitialized value
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1934
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2020-04-01 20:15 修改: 2023-11-07 03:19
|
apache2-data |
CVE-2020-1934 |
低危 |
2.4.10-10+deb8u8 |
|
httpd: mod_proxy_ftp use of uninitialized value
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1934
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2020-04-01 20:15 修改: 2023-11-07 03:19
|
systemd-sysv |
CVE-2018-16888 |
低危 |
215-17+deb8u7 |
|
systemd: kills privileged process if unprivileged PIDFile was tampered
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16888
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-14 22:29 修改: 2023-11-07 02:53
|
systemd-sysv |
CVE-2018-6954 |
低危 |
215-17+deb8u7 |
|
systemd: Mishandled symlinks in systemd-tmpfiles allows local users to obtain ownership of arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6954
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-02-13 20:29 修改: 2023-11-07 03:00
|
systemd-sysv |
CVE-2019-3815 |
低危 |
215-17+deb8u7 |
215-17+deb8u11 |
systemd: memory leak in journald-server.c introduced by fix for CVE-2018-16864
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3815
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-28 15:29 修改: 2023-02-12 23:38
|
libkrb5support0 |
CVE-2017-11462 |
低危 |
1.12.1+dfsg-19+deb8u2 |
|
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
libkrb5support0 |
CVE-2018-5730 |
低危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
apache2 |
CVE-2020-1927 |
低危 |
2.4.10-10+deb8u8 |
|
httpd: mod_rewrite configurations vulnerable to open redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1927
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2020-04-02 00:15 修改: 2023-11-07 03:19
|
apache2-bin |
CVE-2020-1927 |
低危 |
2.4.10-10+deb8u8 |
|
httpd: mod_rewrite configurations vulnerable to open redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1927
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2020-04-02 00:15 修改: 2023-11-07 03:19
|
coreutils |
CVE-2016-2781 |
低危 |
8.23-4 |
|
coreutils: Non-privileged session can escape to the parent session in chroot
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2781
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2017-02-07 15:59 修改: 2023-11-07 02:32
|
libssl1.0.0 |
CVE-2019-1563 |
低危 |
1.0.1t-1+deb8u6 |
1.0.1t-1+deb8u12 |
openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1563
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2019-09-10 17:15 修改: 2023-11-07 03:08
|
apache2-bin |
CVE-2020-1934 |
低危 |
2.4.10-10+deb8u8 |
|
httpd: mod_proxy_ftp use of uninitialized value
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1934
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2020-04-01 20:15 修改: 2023-11-07 03:19
|
apache2 |
CVE-2020-1934 |
低危 |
2.4.10-10+deb8u8 |
|
httpd: mod_proxy_ftp use of uninitialized value
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1934
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2020-04-01 20:15 修改: 2023-11-07 03:19
|
apache2-data |
CVE-2020-1927 |
低危 |
2.4.10-10+deb8u8 |
|
httpd: mod_rewrite configurations vulnerable to open redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1927
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2020-04-02 00:15 修改: 2023-11-07 03:19
|
udev |
CVE-2018-16888 |
低危 |
215-17+deb8u7 |
|
systemd: kills privileged process if unprivileged PIDFile was tampered
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16888
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-14 22:29 修改: 2023-11-07 02:53
|
udev |
CVE-2018-6954 |
低危 |
215-17+deb8u7 |
|
systemd: Mishandled symlinks in systemd-tmpfiles allows local users to obtain ownership of arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6954
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2018-02-13 20:29 修改: 2023-11-07 03:00
|
udev |
CVE-2019-3815 |
低危 |
215-17+deb8u7 |
215-17+deb8u11 |
systemd: memory leak in journald-server.c introduced by fix for CVE-2018-16864
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3815
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 2019-01-28 15:29 修改: 2023-02-12 23:38
|
apache2-utils |
CVE-2020-1927 |
低危 |
2.4.10-10+deb8u8 |
|
httpd: mod_rewrite configurations vulnerable to open redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1927
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 2020-04-02 00:15 修改: 2023-11-07 03:19
|
binutils |
CVE-2016-2226 |
低危 |
2.25-5+deb8u1 |
|
gcc: Exploitable buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2226
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-02-24 20:59 修改: 2017-08-12 01:29
|
binutils |
CVE-2016-4487 |
低危 |
2.25-5+deb8u1 |
|
gcc: Invalid write due to a use-after-free to array btypevec
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4487
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-02-24 20:59 修改: 2017-07-28 01:29
|
binutils |
CVE-2016-4488 |
低危 |
2.25-5+deb8u1 |
|
gcc: Invalid write due to a use-after-free to array ktypevec
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4488
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-02-24 20:59 修改: 2017-07-28 01:29
|
binutils |
CVE-2016-4489 |
低危 |
2.25-5+deb8u1 |
|
gcc: Invalid write due to integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4489
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-02-24 20:59 修改: 2017-07-28 01:29
|
binutils |
CVE-2016-4490 |
低危 |
2.25-5+deb8u1 |
|
gcc: Write access violation
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4490
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 2017-02-24 20:59 修改: 2017-07-28 01:29
|
libssh2-1 |
DLA-1730-2 |
未知 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u3 |
libssh2 - regression update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libquadmath0 |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libquadmath0 |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
gcc-4.9-base |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libgcc1 |
DLA-1606-1 |
未知 |
1:4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libgcc1 |
DSA-4117-1 |
未知 |
1:4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
gcc-4.9-base |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
apache2-bin |
DLA-1900-2 |
未知 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u16 |
apache2 - regression update
漏洞详情:
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
g++-4.9 |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libasan1 |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libitm1 |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libtsan0 |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libtsan0 |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libitm1 |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libgcrypt20 |
TEMP-0000000-96B2E9 |
未知 |
1.6.3-2+deb8u2 |
|
[hardening for RSA-CRT leak]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0000000-96B2E9
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libcilkrts5 |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libubsan0 |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libubsan0 |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libstdc++-4.9-dev |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libstdc++-4.9-dev |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libcilkrts5 |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
liblsan0 |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
liblsan0 |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
systemd |
DLA-1762-2 |
未知 |
215-17+deb8u7 |
215-17+deb8u13 |
systemd - regression update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libstdc++6 |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libstdc++6 |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libasan1 |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
g++-4.9 |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
apache2-utils |
DLA-1900-2 |
未知 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u16 |
apache2 - regression update
漏洞详情:
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
apache2 |
DLA-1900-2 |
未知 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u16 |
apache2 - regression update
漏洞详情:
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libudev1 |
DLA-1762-2 |
未知 |
215-17+deb8u7 |
215-17+deb8u13 |
systemd - regression update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libmagic1 |
DLA-1698-2 |
未知 |
1:5.22+15-2+deb8u3 |
1:5.22+15-2+deb8u7 |
file - regression update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
linux-libc-dev |
DLA-1422-2 |
未知 |
3.16.43-2 |
3.16.57-2 |
linux - regression update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
passwd |
DSA-3793-2 |
未知 |
1:4.2-3+deb8u3 |
1:4.2-3+deb8u4 |
shadow - regression update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
linux-libc-dev |
DSA-3886-2 |
未知 |
3.16.43-2 |
3.16.43-2+deb8u2 |
linux - regression update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
systemd-sysv |
DLA-1762-2 |
未知 |
215-17+deb8u7 |
215-17+deb8u13 |
systemd - regression update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libatomic1 |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
tzdata |
DLA-1563-1 |
未知 |
2017b-0+deb8u1 |
2018g-0+deb8u1 |
tzdata - update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
tzdata |
DLA-1625-1 |
未知 |
2017b-0+deb8u1 |
2018i-0+deb8u1 |
tzdata - new upstream version
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
tzdata |
DLA-1744-1 |
未知 |
2017b-0+deb8u1 |
2019a-0+deb8u1 |
tzdata - new upstream version
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
tzdata |
DLA-1957-1 |
未知 |
2017b-0+deb8u1 |
2019c-0+deb8u1 |
tzdata - new upstream version
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libatomic1 |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
login |
DSA-3793-2 |
未知 |
1:4.2-3+deb8u3 |
1:4.2-3+deb8u4 |
shadow - regression update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
apache2-data |
DLA-1900-2 |
未知 |
2.4.10-10+deb8u8 |
2.4.10-10+deb8u16 |
apache2 - regression update
漏洞详情:
镜像层: sha256:6c16cb61811cfd6b8c650eeeb2378eae0fd84d3aaa90ef8eaabcbb94c77915a9
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
cpp-4.9 |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
cpp-4.9 |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
gcc-4.9 |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libsystemd0 |
DLA-1762-2 |
未知 |
215-17+deb8u7 |
215-17+deb8u13 |
systemd - regression update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libgomp1 |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libpcre3 |
TEMP-0827564-93E4E3 |
未知 |
2:8.35-3.3+deb8u4 |
|
[Stack corruption from crafted pattern]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0827564-93E4E3
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libgomp1 |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
gcc-4.9 |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
udev |
DLA-1762-2 |
未知 |
215-17+deb8u7 |
215-17+deb8u13 |
systemd - regression update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
file |
DLA-1698-2 |
未知 |
1:5.22+15-2+deb8u3 |
1:5.22+15-2+deb8u7 |
file - regression update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libbz2-1.0 |
DLA-1833-2 |
未知 |
1.0.6-7+b3 |
1.0.6-7+deb8u2 |
bzip2 - regression update
漏洞详情:
镜像层: sha256:8d4d1ab5ff74fc361fb74212fff3b6dc1e6c16d1e1f0e8b44f9a9112b00b564f
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libgcc-4.9-dev |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libgcc-4.9-dev |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
bzip2 |
DLA-1833-2 |
未知 |
1.0.6-7+b3 |
1.0.6-7+deb8u2 |
bzip2 - regression update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
ca-certificates |
DLA-1417-1 |
未知 |
20141019+deb8u3 |
20141019+deb8u4 |
ca-certificates - security update
漏洞详情:
镜像层: sha256:ca3fde139d440bf323f43799c0c1d596bbb8ba09e08cf386cc6e83cbf7b26e87
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|