git |
CVE-2018-17456 |
严重 |
2.15.0-r1 |
2.15.3-r0 |
git: arbitrary code execution via .gitmodules
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17456
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2018-10-06 14:29 修改: 2020-08-24 17:37
|
git |
CVE-2018-19486 |
严重 |
2.15.0-r1 |
2.15.r-r1 |
git: Improper handling of PATH allows for commands to be executed from the current directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19486
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2018-11-23 08:29 修改: 2019-04-11 03:29
|
git |
CVE-2019-1353 |
严重 |
2.15.0-r1 |
2.15.4-r0 |
git: NTFS protections inactive when running Git in the Windows Subsystem for Linux
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1353
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2020-01-24 22:15 修改: 2023-11-07 03:08
|
libcurl |
CVE-2018-0500 |
严重 |
7.59.0-r0 |
7.61.0-r0 |
curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0500
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2018-07-11 13:29 修改: 2020-08-24 17:37
|
libcurl |
CVE-2018-1000300 |
严重 |
7.59.0-r0 |
7.60.0-r0 |
curl: FTP shutdown response heap-based buffer overflow can potentially lead to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000300
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2018-05-24 13:29 修改: 2020-08-24 17:37
|
libcurl |
CVE-2018-1000301 |
严重 |
7.59.0-r0 |
7.60.0-r0 |
curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000301
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2018-05-24 13:29 修改: 2019-10-03 00:03
|
libcurl |
CVE-2018-14618 |
严重 |
7.59.0-r0 |
7.61.1-r0 |
curl: NTLM password overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14618
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2018-09-05 19:29 修改: 2019-04-22 17:48
|
libcurl |
CVE-2018-16839 |
严重 |
7.59.0-r0 |
7.61.1-r1 |
curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16839
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2018-10-31 18:29 修改: 2023-11-07 02:53
|
libcurl |
CVE-2018-16840 |
严重 |
7.59.0-r0 |
7.61.1-r1 |
curl: Use-after-free when closing "easy" handle in Curl_close()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16840
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2018-10-31 18:29 修改: 2019-10-09 23:36
|
libcurl |
CVE-2018-16842 |
严重 |
7.59.0-r0 |
7.61.1-r1 |
curl: Heap-based buffer over-read in the curl tool warning formatting
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16842
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2018-10-31 19:29 修改: 2019-08-06 17:15
|
libcurl |
CVE-2019-3822 |
严重 |
7.59.0-r0 |
7.61.1-r2 |
curl: NTLMv2 type-3 header stack buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3822
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
libcurl |
CVE-2019-5481 |
严重 |
7.59.0-r0 |
7.61.1-r3 |
curl: double free due to subsequent call of realloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5481
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2019-09-16 19:15 修改: 2023-11-07 03:11
|
libcurl |
CVE-2019-5482 |
严重 |
7.59.0-r0 |
7.61.1-r3 |
curl: heap buffer overflow in function tftp_receive_packet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5482
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2019-09-16 19:15 修改: 2023-11-07 03:11
|
musl |
CVE-2019-14697 |
严重 |
1.1.18-r2 |
1.1.18-r4 |
musl libc through 1.1.23 has an x87 floating-point stack adjustment im ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14697
镜像层: sha256:cd7100a72410606589a54b932cabd804a17f9ae5b42a1882bd56d263e02b6215
发布日期: 2019-08-06 16:15 修改: 2023-03-03 17:43
|
musl-utils |
CVE-2019-14697 |
严重 |
1.1.18-r2 |
1.1.18-r4 |
musl libc through 1.1.23 has an x87 floating-point stack adjustment im ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14697
镜像层: sha256:cd7100a72410606589a54b932cabd804a17f9ae5b42a1882bd56d263e02b6215
发布日期: 2019-08-06 16:15 修改: 2023-03-03 17:43
|
git |
CVE-2018-11233 |
高危 |
2.15.0-r1 |
2.15.2-r0 |
git: path sanity check in is_ntfs_dotgit() can read arbitrary memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11233
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2018-05-30 04:29 修改: 2020-05-02 00:15
|
git |
CVE-2018-11235 |
高危 |
2.15.0-r1 |
2.15.2-r0 |
git: arbitrary code execution when recursively cloning a malicious repository
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11235
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2018-05-30 04:29 修改: 2020-05-02 00:15
|
git |
CVE-2019-1349 |
高危 |
2.15.0-r1 |
2.15.4-r0 |
git: Recursive submodule cloning allows using git directory twice with synonymous directory name written in .git/
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1349
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2020-01-24 21:15 修改: 2023-11-07 03:08
|
git |
CVE-2019-1350 |
高危 |
2.15.0-r1 |
2.15.4-r0 |
git: Incorrect quoting of command-line arguments allowed remote code execution during a recursive clone
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1350
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2020-01-24 21:15 修改: 2023-11-07 03:08
|
git |
CVE-2019-1351 |
高危 |
2.15.0-r1 |
2.15.4-r0 |
git: Git mistakes some paths for relative paths allowing writing outside of the worktree while cloning
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1351
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2020-01-24 21:15 修改: 2023-11-07 03:08
|
git |
CVE-2019-1352 |
高危 |
2.15.0-r1 |
2.15.4-r0 |
git: Files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1352
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2020-01-24 21:15 修改: 2023-11-07 03:08
|
git |
CVE-2019-1354 |
高危 |
2.15.0-r1 |
2.15.4-r0 |
git: Git does not refuse to write out tracked files with backlashes in filenames
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1354
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2020-01-24 21:15 修改: 2023-11-07 03:08
|
git |
CVE-2019-1387 |
高危 |
2.15.0-r1 |
2.15.4-r0 |
git: Remote code execution in recursive clones with nested submodules
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1387
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2019-12-18 21:15 修改: 2024-06-26 10:15
|
libcurl |
CVE-2018-16890 |
高危 |
7.59.0-r0 |
7.61.1-r2 |
curl: NTLM type-2 heap out-of-bounds buffer read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16890
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2019-02-06 20:29 修改: 2023-11-07 02:53
|
libcurl |
CVE-2019-3823 |
高危 |
7.59.0-r0 |
7.61.1-r2 |
curl: SMTP end-of-response out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3823
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
libressl2.6-libcrypto |
CVE-2018-0732 |
高危 |
2.6.3-r0 |
2.6.5-r0 |
openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0732
镜像层: sha256:cd7100a72410606589a54b932cabd804a17f9ae5b42a1882bd56d263e02b6215
发布日期: 2018-06-12 13:29 修改: 2023-11-07 02:51
|
libressl2.6-libssl |
CVE-2018-0732 |
高危 |
2.6.3-r0 |
2.6.5-r0 |
openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0732
镜像层: sha256:cd7100a72410606589a54b932cabd804a17f9ae5b42a1882bd56d263e02b6215
发布日期: 2018-06-12 13:29 修改: 2023-11-07 02:51
|
expat |
CVE-2019-15903 |
高危 |
2.2.5-r0 |
2.2.7-r1 |
expat: heap-based buffer over-read via crafted XML input
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15903
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2019-09-04 06:15 修改: 2023-11-07 03:05
|
expat |
CVE-2018-20843 |
高危 |
2.2.5-r0 |
2.2.7-r0 |
expat: large number of colons in input makes parser consume high amount of resources, leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20843
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2019-06-24 17:15 修改: 2023-11-07 02:56
|
libressl2.6-libcrypto |
CVE-2018-0495 |
中危 |
2.6.3-r0 |
2.6.5-r0 |
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495
镜像层: sha256:cd7100a72410606589a54b932cabd804a17f9ae5b42a1882bd56d263e02b6215
发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51
|
libressl2.6-libssl |
CVE-2018-0495 |
中危 |
2.6.3-r0 |
2.6.5-r0 |
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495
镜像层: sha256:cd7100a72410606589a54b932cabd804a17f9ae5b42a1882bd56d263e02b6215
发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51
|
openssh-client |
CVE-2018-15473 |
中危 |
7.5_p1-r8 |
7.5_p1-r9 |
openssh: User enumeration via malformed packets in authentication requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15473
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2018-08-17 19:29 修改: 2023-02-23 23:13
|
openssh-client |
CVE-2018-20685 |
中危 |
7.5_p1-r8 |
7.5_p1-r10 |
openssh: scp client improper directory name validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20685
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2019-01-10 21:29 修改: 2023-02-23 23:15
|
openssh-client |
CVE-2019-6109 |
中危 |
7.5_p1-r8 |
7.5_p1-r10 |
openssh: Missing character encoding in progress display allows for spoofing of scp client output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6109
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2019-01-31 18:29 修改: 2023-11-07 03:13
|
openssh-client |
CVE-2019-6111 |
中危 |
7.5_p1-r8 |
7.5_p1-r10 |
openssh: Improper validation of object names allows malicious server to overwrite files via scp client
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6111
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2019-01-31 18:29 修改: 2023-11-07 03:13
|
openssh-keygen |
CVE-2018-15473 |
中危 |
7.5_p1-r8 |
7.5_p1-r9 |
openssh: User enumeration via malformed packets in authentication requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15473
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2018-08-17 19:29 修改: 2023-02-23 23:13
|
openssh-keygen |
CVE-2018-20685 |
中危 |
7.5_p1-r8 |
7.5_p1-r10 |
openssh: scp client improper directory name validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20685
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2019-01-10 21:29 修改: 2023-02-23 23:15
|
openssh-keygen |
CVE-2019-6109 |
中危 |
7.5_p1-r8 |
7.5_p1-r10 |
openssh: Missing character encoding in progress display allows for spoofing of scp client output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6109
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2019-01-31 18:29 修改: 2023-11-07 03:13
|
openssh-keygen |
CVE-2019-6111 |
中危 |
7.5_p1-r8 |
7.5_p1-r10 |
openssh: Improper validation of object names allows malicious server to overwrite files via scp client
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6111
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2019-01-31 18:29 修改: 2023-11-07 03:13
|
git |
CVE-2019-1348 |
低危 |
2.15.0-r1 |
2.15.4-r0 |
git: Arbitrary path overwriting via export-marks in-stream command feature
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1348
镜像层: sha256:921c92d72482fd14d76b342faa1c14b68e2783fb639fe31079854880d2802174
发布日期: 2020-01-24 22:15 修改: 2023-11-07 03:08
|