| git | CVE-2018-17456 | 严重 | 2.15.0-r1 | 2.15.3-r0 | git: arbitrary code execution via .gitmodules 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17456 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2018-10-06 14:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | git | CVE-2018-19486 | 严重 | 2.15.0-r1 | 2.15.r-r1 | git: Improper handling of PATH allows for commands to be executed from the current directory 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19486 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2018-11-23 08:29 修改: 2019-04-11 03:29 | 
                            
                            
                                | git | CVE-2019-1353 | 严重 | 2.15.0-r1 | 2.15.4-r0 | git: NTFS protections inactive when running Git in the Windows Subsystem for Linux 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1353 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2020-01-24 22:15 修改: 2023-11-07 03:08 | 
                            
                            
                                | libcurl | CVE-2018-0500 | 严重 | 7.59.0-r0 | 7.61.0-r0 | curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0500 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2018-07-11 13:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libcurl | CVE-2018-1000300 | 严重 | 7.59.0-r0 | 7.60.0-r0 | curl: FTP shutdown response heap-based buffer overflow can potentially lead to RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000300 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2018-05-24 13:29 修改: 2020-08-24 17:37 | 
                            
                            
                                | libcurl | CVE-2018-1000301 | 严重 | 7.59.0-r0 | 7.60.0-r0 | curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000301 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2018-05-24 13:29 修改: 2019-10-03 00:03 | 
                            
                            
                                | libcurl | CVE-2018-14618 | 严重 | 7.59.0-r0 | 7.61.1-r0 | curl: NTLM password overflow via integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14618 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2018-09-05 19:29 修改: 2019-04-22 17:48 | 
                            
                            
                                | libcurl | CVE-2018-16839 | 严重 | 7.59.0-r0 | 7.61.1-r1 | curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message() 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16839 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2018-10-31 18:29 修改: 2023-11-07 02:53 | 
                            
                            
                                | libcurl | CVE-2018-16840 | 严重 | 7.59.0-r0 | 7.61.1-r1 | curl: Use-after-free when closing "easy" handle in Curl_close() 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16840 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2018-10-31 18:29 修改: 2019-10-09 23:36 | 
                            
                            
                                | libcurl | CVE-2018-16842 | 严重 | 7.59.0-r0 | 7.61.1-r1 | curl: Heap-based buffer over-read in the curl tool warning formatting 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16842 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2018-10-31 19:29 修改: 2019-08-06 17:15 | 
                            
                            
                                | libcurl | CVE-2019-3822 | 严重 | 7.59.0-r0 | 7.61.1-r2 | curl: NTLMv2 type-3 header stack buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3822 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10 | 
                            
                            
                                | libcurl | CVE-2019-5481 | 严重 | 7.59.0-r0 | 7.61.1-r3 | curl: double free due to subsequent call of realloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5481 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2019-09-16 19:15 修改: 2023-11-07 03:11 | 
                            
                            
                                | libcurl | CVE-2019-5482 | 严重 | 7.59.0-r0 | 7.61.1-r3 | curl: heap buffer overflow in function tftp_receive_packet() 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5482 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2019-09-16 19:15 修改: 2023-11-07 03:11 | 
                            
                            
                                | musl | CVE-2019-14697 | 严重 | 1.1.18-r2 | 1.1.18-r4 | musl libc through 1.1.23 has an x87 floating-point stack adjustment im ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14697 镜像层: sha256:cd7100a72410606589a54b932cabd804a17f9ae5b42a1882bd56d263e02b6215 发布日期: 2019-08-06 16:15 修改: 2023-03-03 17:43 | 
                            
                            
                                | musl-utils | CVE-2019-14697 | 严重 | 1.1.18-r2 | 1.1.18-r4 | musl libc through 1.1.23 has an x87 floating-point stack adjustment im ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14697 镜像层: sha256:cd7100a72410606589a54b932cabd804a17f9ae5b42a1882bd56d263e02b6215 发布日期: 2019-08-06 16:15 修改: 2023-03-03 17:43 | 
                            
                            
                                | git | CVE-2018-11233 | 高危 | 2.15.0-r1 | 2.15.2-r0 | git: path sanity check in is_ntfs_dotgit() can read arbitrary memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11233 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2018-05-30 04:29 修改: 2020-05-02 00:15 | 
                            
                            
                                | git | CVE-2018-11235 | 高危 | 2.15.0-r1 | 2.15.2-r0 | git: arbitrary code execution when recursively cloning a malicious repository 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11235 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2018-05-30 04:29 修改: 2020-05-02 00:15 | 
                            
                            
                                | git | CVE-2019-1349 | 高危 | 2.15.0-r1 | 2.15.4-r0 | git: Recursive submodule cloning allows using git directory twice with synonymous directory name written in .git/ 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1349 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2020-01-24 21:15 修改: 2023-11-07 03:08 | 
                            
                            
                                | git | CVE-2019-1350 | 高危 | 2.15.0-r1 | 2.15.4-r0 | git: Incorrect quoting of command-line arguments allowed remote code execution during a recursive clone 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1350 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2020-01-24 21:15 修改: 2023-11-07 03:08 | 
                            
                            
                                | git | CVE-2019-1351 | 高危 | 2.15.0-r1 | 2.15.4-r0 | git: Git mistakes some paths for relative paths allowing writing outside of the worktree while cloning 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1351 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2020-01-24 21:15 修改: 2023-11-07 03:08 | 
                            
                            
                                | git | CVE-2019-1352 | 高危 | 2.15.0-r1 | 2.15.4-r0 | git: Files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1352 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2020-01-24 21:15 修改: 2023-11-07 03:08 | 
                            
                            
                                | git | CVE-2019-1354 | 高危 | 2.15.0-r1 | 2.15.4-r0 | git: Git does not refuse to write out tracked files with backlashes in filenames 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1354 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2020-01-24 21:15 修改: 2023-11-07 03:08 | 
                            
                            
                                | git | CVE-2019-1387 | 高危 | 2.15.0-r1 | 2.15.4-r0 | git: Remote code execution in recursive clones with nested submodules 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1387 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2019-12-18 21:15 修改: 2024-06-26 10:15 | 
                            
                            
                                | libcurl | CVE-2018-16890 | 高危 | 7.59.0-r0 | 7.61.1-r2 | curl: NTLM type-2 heap out-of-bounds buffer read 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16890 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2019-02-06 20:29 修改: 2023-11-07 02:53 | 
                            
                            
                                | libcurl | CVE-2019-3823 | 高危 | 7.59.0-r0 | 7.61.1-r2 | curl: SMTP end-of-response out-of-bounds read 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3823 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10 | 
                            
                            
                                | libressl2.6-libcrypto | CVE-2018-0732 | 高危 | 2.6.3-r0 | 2.6.5-r0 | openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0732 镜像层: sha256:cd7100a72410606589a54b932cabd804a17f9ae5b42a1882bd56d263e02b6215 发布日期: 2018-06-12 13:29 修改: 2023-11-07 02:51 | 
                            
                            
                                | libressl2.6-libssl | CVE-2018-0732 | 高危 | 2.6.3-r0 | 2.6.5-r0 | openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0732 镜像层: sha256:cd7100a72410606589a54b932cabd804a17f9ae5b42a1882bd56d263e02b6215 发布日期: 2018-06-12 13:29 修改: 2023-11-07 02:51 | 
                            
                            
                                | expat | CVE-2019-15903 | 高危 | 2.2.5-r0 | 2.2.7-r1 | expat: heap-based buffer over-read via crafted XML input 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15903 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2019-09-04 06:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | expat | CVE-2018-20843 | 高危 | 2.2.5-r0 | 2.2.7-r0 | expat: large number of colons in input makes parser consume high amount of resources, leading to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20843 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2019-06-24 17:15 修改: 2023-11-07 02:56 | 
                            
                            
                                | libressl2.6-libcrypto | CVE-2018-0495 | 中危 | 2.6.3-r0 | 2.6.5-r0 | ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495 镜像层: sha256:cd7100a72410606589a54b932cabd804a17f9ae5b42a1882bd56d263e02b6215 发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51 | 
                            
                            
                                | libressl2.6-libssl | CVE-2018-0495 | 中危 | 2.6.3-r0 | 2.6.5-r0 | ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495 镜像层: sha256:cd7100a72410606589a54b932cabd804a17f9ae5b42a1882bd56d263e02b6215 发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51 | 
                            
                            
                                | openssh-client | CVE-2018-15473 | 中危 | 7.5_p1-r8 | 7.5_p1-r9 | openssh: User enumeration via malformed packets in authentication requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15473 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2018-08-17 19:29 修改: 2023-02-23 23:13 | 
                            
                            
                                | openssh-client | CVE-2018-20685 | 中危 | 7.5_p1-r8 | 7.5_p1-r10 | openssh: scp client improper directory name validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20685 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2019-01-10 21:29 修改: 2023-02-23 23:15 | 
                            
                            
                                | openssh-client | CVE-2019-6109 | 中危 | 7.5_p1-r8 | 7.5_p1-r10 | openssh: Missing character encoding in progress display allows for spoofing of scp client output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6109 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2019-01-31 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | openssh-client | CVE-2019-6111 | 中危 | 7.5_p1-r8 | 7.5_p1-r10 | openssh: Improper validation of object names allows malicious server to overwrite files via scp client 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6111 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2019-01-31 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | openssh-keygen | CVE-2018-15473 | 中危 | 7.5_p1-r8 | 7.5_p1-r9 | openssh: User enumeration via malformed packets in authentication requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15473 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2018-08-17 19:29 修改: 2023-02-23 23:13 | 
                            
                            
                                | openssh-keygen | CVE-2018-20685 | 中危 | 7.5_p1-r8 | 7.5_p1-r10 | openssh: scp client improper directory name validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20685 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2019-01-10 21:29 修改: 2023-02-23 23:15 | 
                            
                            
                                | openssh-keygen | CVE-2019-6109 | 中危 | 7.5_p1-r8 | 7.5_p1-r10 | openssh: Missing character encoding in progress display allows for spoofing of scp client output 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6109 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2019-01-31 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | openssh-keygen | CVE-2019-6111 | 中危 | 7.5_p1-r8 | 7.5_p1-r10 | openssh: Improper validation of object names allows malicious server to overwrite files via scp client 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6111 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2019-01-31 18:29 修改: 2023-11-07 03:13 | 
                            
                            
                                | git | CVE-2019-1348 | 低危 | 2.15.0-r1 | 2.15.4-r0 | git: Arbitrary path overwriting via export-marks in-stream command feature 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1348 镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174 发布日期: 2020-01-24 22:15 修改: 2023-11-07 03:08 |