curl |
CVE-2023-38546 |
高危 |
7.61.1-30.el8_8.2 |
7.61.1-33.el8_9.5 |
curl: cookie injection with none file
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15
|
glibc |
CVE-2023-4527 |
高危 |
2.28-225.el8 |
2.28-225.el8_8.6 |
glibc: Stack read overflow in getaddrinfo in no-aaaa mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4527
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15
|
glibc |
CVE-2023-4806 |
高危 |
2.28-225.el8 |
2.28-225.el8_8.6 |
glibc: potential use-after-free in getaddrinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15
|
glibc |
CVE-2023-4813 |
高危 |
2.28-225.el8 |
2.28-225.el8_8.6 |
glibc: potential use-after-free in gaih_inet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15
|
glibc |
CVE-2023-4911 |
高危 |
2.28-225.el8 |
2.28-225.el8_8.6 |
glibc: buffer overflow in ld.so leading to privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4911
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-10-03 18:15 修改: 2024-09-17 19:46
|
glibc |
CVE-2024-2961 |
高危 |
2.28-225.el8 |
2.28-236.el8_9.13 |
glibc: Out of bounds write in iconv may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15
|
glibc |
CVE-2024-33599 |
高危 |
2.28-225.el8 |
2.28-251.el8_10.2 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc |
CVE-2024-33600 |
高危 |
2.28-225.el8 |
2.28-251.el8_10.2 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc |
CVE-2024-33601 |
高危 |
2.28-225.el8 |
2.28-251.el8_10.2 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc |
CVE-2024-33602 |
高危 |
2.28-225.el8 |
2.28-251.el8_10.2 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-common |
CVE-2023-4527 |
高危 |
2.28-225.el8 |
2.28-225.el8_8.6 |
glibc: Stack read overflow in getaddrinfo in no-aaaa mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4527
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15
|
glibc-common |
CVE-2023-4806 |
高危 |
2.28-225.el8 |
2.28-225.el8_8.6 |
glibc: potential use-after-free in getaddrinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15
|
glibc-common |
CVE-2023-4813 |
高危 |
2.28-225.el8 |
2.28-225.el8_8.6 |
glibc: potential use-after-free in gaih_inet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15
|
glibc-common |
CVE-2023-4911 |
高危 |
2.28-225.el8 |
2.28-225.el8_8.6 |
glibc: buffer overflow in ld.so leading to privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4911
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-10-03 18:15 修改: 2024-09-17 19:46
|
glibc-common |
CVE-2024-2961 |
高危 |
2.28-225.el8 |
2.28-236.el8_9.13 |
glibc: Out of bounds write in iconv may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15
|
glibc-common |
CVE-2024-33599 |
高危 |
2.28-225.el8 |
2.28-251.el8_10.2 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-common |
CVE-2024-33600 |
高危 |
2.28-225.el8 |
2.28-251.el8_10.2 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-common |
CVE-2024-33601 |
高危 |
2.28-225.el8 |
2.28-251.el8_10.2 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-common |
CVE-2024-33602 |
高危 |
2.28-225.el8 |
2.28-251.el8_10.2 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-minimal-langpack |
CVE-2023-4527 |
高危 |
2.28-225.el8 |
2.28-225.el8_8.6 |
glibc: Stack read overflow in getaddrinfo in no-aaaa mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4527
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15
|
glibc-minimal-langpack |
CVE-2023-4806 |
高危 |
2.28-225.el8 |
2.28-225.el8_8.6 |
glibc: potential use-after-free in getaddrinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15
|
glibc-minimal-langpack |
CVE-2023-4813 |
高危 |
2.28-225.el8 |
2.28-225.el8_8.6 |
glibc: potential use-after-free in gaih_inet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15
|
glibc-minimal-langpack |
CVE-2023-4911 |
高危 |
2.28-225.el8 |
2.28-225.el8_8.6 |
glibc: buffer overflow in ld.so leading to privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4911
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-10-03 18:15 修改: 2024-09-17 19:46
|
glibc-minimal-langpack |
CVE-2024-2961 |
高危 |
2.28-225.el8 |
2.28-236.el8_9.13 |
glibc: Out of bounds write in iconv may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15
|
glibc-minimal-langpack |
CVE-2024-33599 |
高危 |
2.28-225.el8 |
2.28-251.el8_10.2 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-minimal-langpack |
CVE-2024-33600 |
高危 |
2.28-225.el8 |
2.28-251.el8_10.2 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-minimal-langpack |
CVE-2024-33601 |
高危 |
2.28-225.el8 |
2.28-251.el8_10.2 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-minimal-langpack |
CVE-2024-33602 |
高危 |
2.28-225.el8 |
2.28-251.el8_10.2 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
krb5-libs |
CVE-2024-3596 |
高危 |
1.18.2-22.el8_7 |
1.18.2-30.el8_10 |
freeradius: forgery attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3596
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-07-09 12:15 修改: 2024-07-23 09:15
|
libcurl-minimal |
CVE-2023-38546 |
高危 |
7.61.1-30.el8_8.2 |
7.61.1-33.el8_9.5 |
curl: cookie injection with none file
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15
|
platform-python |
CVE-2023-24329 |
高危 |
3.6.8-51.el8.rocky.0 |
3.6.8-51.el8_8.1.rocky.0 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
platform-python |
CVE-2023-6597 |
高危 |
3.6.8-51.el8.rocky.0 |
3.6.8-62.el8_10.rocky.0 |
python: Path traversal on tempfile.TemporaryDirectory
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15
|
platform-python |
CVE-2024-0450 |
高危 |
3.6.8-51.el8.rocky.0 |
3.6.8-62.el8_10.rocky.0 |
python: The zipfile module is vulnerable to zip-bombs leading to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15
|
platform-python-setuptools |
CVE-2024-6345 |
高危 |
39.2.0-7.el8 |
39.2.0-8.el8_10 |
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00
|
python3-libs |
CVE-2023-24329 |
高危 |
3.6.8-51.el8.rocky.0 |
3.6.8-51.el8_8.1.rocky.0 |
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
python3-libs |
CVE-2023-6597 |
高危 |
3.6.8-51.el8.rocky.0 |
3.6.8-62.el8_10.rocky.0 |
python: Path traversal on tempfile.TemporaryDirectory
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15
|
python3-libs |
CVE-2024-0450 |
高危 |
3.6.8-51.el8.rocky.0 |
3.6.8-62.el8_10.rocky.0 |
python: The zipfile module is vulnerable to zip-bombs leading to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15
|
python3-setuptools-wheel |
CVE-2024-6345 |
高危 |
39.2.0-7.el8 |
39.2.0-8.el8_10 |
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00
|
expat |
CVE-2023-52425 |
中危 |
2.2.5-11.el8 |
2.2.5-11.el8_9.1 |
expat: parsing large tokens can trigger a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-02-04 20:15 修改: 2024-08-26 20:35
|
expat |
CVE-2024-45490 |
中危 |
2.2.5-11.el8 |
2.2.5-15.el8_10 |
libexpat: Negative Length Parsing Vulnerability in libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24
|
expat |
CVE-2024-45491 |
中危 |
2.2.5-11.el8 |
2.2.5-15.el8_10 |
libexpat: Integer Overflow or Wraparound
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28
|
expat |
CVE-2024-45492 |
中危 |
2.2.5-11.el8 |
2.2.5-15.el8_10 |
libexpat: integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28
|
gnutls |
CVE-2023-5981 |
中危 |
3.6.16-6.el8_7 |
3.6.16-8.el8_9 |
gnutls: timing side-channel in the RSA-PSK authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-11-28 12:15 修改: 2024-09-16 13:15
|
gnutls |
CVE-2024-28834 |
中危 |
3.6.16-6.el8_7 |
3.6.16-8.el8_9.3 |
gnutls: vulnerable to Minerva side-channel information leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28834
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-03-21 14:15 修改: 2024-11-21 21:15
|
expat |
CVE-2024-50602 |
中危 |
2.2.5-11.el8 |
2.2.5-16.el8_10 |
libexpat: expat: DoS via XML_ResumeParser
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-10-27 05:15 修改: 2024-10-30 18:35
|
less |
CVE-2022-48624 |
中危 |
530-1.el8 |
530-2.el8_9 |
less: missing quoting of shell metacharacters in LESSCLOSE handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48624
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-02-19 01:15 修改: 2024-06-10 18:15
|
libcap |
CVE-2023-2602 |
中危 |
2.48-4.el8 |
2.48-5.el8_8 |
libcap: Memory Leak on pthread_create() Error
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2602
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-06-06 20:15 修改: 2023-11-30 05:15
|
libcap |
CVE-2023-2603 |
中危 |
2.48-4.el8 |
2.48-5.el8_8 |
libcap: Integer Overflow in _libcap_strdup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2603
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-06-06 20:15 修改: 2024-10-10 16:32
|
curl |
CVE-2023-27536 |
中危 |
7.61.1-30.el8_8.2 |
7.61.1-30.el8_8.3 |
curl: GSS delegation too eager connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46
|
libcurl-minimal |
CVE-2023-27536 |
中危 |
7.61.1-30.el8_8.2 |
7.61.1-30.el8_8.3 |
curl: GSS delegation too eager connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46
|
libcurl-minimal |
CVE-2023-28321 |
中危 |
7.61.1-30.el8_8.2 |
7.61.1-30.el8_8.3 |
curl: IDN wildcard match may lead to Improper Cerificate Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28321
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-05-26 21:15 修改: 2023-11-07 04:10
|
libcurl-minimal |
CVE-2023-28322 |
中危 |
7.61.1-30.el8_8.2 |
7.61.1-33.el8_9.5 |
curl: more POST-after-PUT confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15
|
libcurl-minimal |
CVE-2023-46218 |
中危 |
7.61.1-30.el8_8.2 |
7.61.1-33.el8_9.5 |
curl: information disclosure by exploiting a mixed case flaw
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15
|
libxml2 |
CVE-2023-28484 |
中危 |
2.9.7-16.el8 |
2.9.7-16.el8_8.1 |
libxml2: NULL dereference in xmlSchemaFixupComplexType
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28484
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-04-24 21:15 修改: 2024-02-01 17:15
|
libxml2 |
CVE-2023-29469 |
中危 |
2.9.7-16.el8 |
2.9.7-16.el8_8.1 |
libxml2: Hashing of empty dict strings isn't deterministic
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29469
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-04-24 21:15 修改: 2023-06-01 14:15
|
libxml2 |
CVE-2024-25062 |
中危 |
2.9.7-16.el8 |
2.9.7-18.el8_10.1 |
libxml2: use-after-free in XMLReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25062
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-02-04 16:15 修改: 2024-02-13 00:40
|
pam |
CVE-2024-22365 |
中危 |
1.3.1-25.el8 |
1.3.1-33.el8 |
pam: allowing unprivileged user to block another user namespace
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27
|
curl |
CVE-2023-28321 |
中危 |
7.61.1-30.el8_8.2 |
7.61.1-30.el8_8.3 |
curl: IDN wildcard match may lead to Improper Cerificate Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28321
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-05-26 21:15 修改: 2023-11-07 04:10
|
curl |
CVE-2023-28322 |
中危 |
7.61.1-30.el8_8.2 |
7.61.1-33.el8_9.5 |
curl: more POST-after-PUT confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15
|
curl |
CVE-2023-46218 |
中危 |
7.61.1-30.el8_8.2 |
7.61.1-33.el8_9.5 |
curl: information disclosure by exploiting a mixed case flaw
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15
|
platform-python |
CVE-2023-27043 |
中危 |
3.6.8-51.el8.rocky.0 |
3.6.8-56.el8_9.3.rocky.0 |
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
platform-python |
CVE-2024-4032 |
中危 |
3.6.8-51.el8.rocky.0 |
3.6.8-67.el8_10.rocky.0 |
python: incorrect IPv4 and IPv6 private ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35
|
platform-python |
CVE-2024-6232 |
中危 |
3.6.8-51.el8.rocky.0 |
3.6.8-67.el8_10.rocky.0 |
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15
|
platform-python |
CVE-2024-6923 |
中危 |
3.6.8-51.el8.rocky.0 |
3.6.8-67.el8_10.rocky.0 |
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15
|
dbus |
CVE-2023-34969 |
中危 |
1:1.12.8-24.el8 |
1:1.12.8-24.el8_8.1 |
dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34969
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-06-08 03:15 修改: 2023-12-27 16:36
|
dbus-common |
CVE-2023-34969 |
中危 |
1:1.12.8-24.el8 |
1:1.12.8-24.el8_8.1 |
dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34969
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-06-08 03:15 修改: 2023-12-27 16:36
|
dbus-daemon |
CVE-2023-34969 |
中危 |
1:1.12.8-24.el8 |
1:1.12.8-24.el8_8.1 |
dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34969
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-06-08 03:15 修改: 2023-12-27 16:36
|
dbus-libs |
CVE-2023-34969 |
中危 |
1:1.12.8-24.el8 |
1:1.12.8-24.el8_8.1 |
dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34969
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-06-08 03:15 修改: 2023-12-27 16:36
|
python3-libs |
CVE-2023-27043 |
中危 |
3.6.8-51.el8.rocky.0 |
3.6.8-56.el8_9.3.rocky.0 |
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
python3-libs |
CVE-2024-4032 |
中危 |
3.6.8-51.el8.rocky.0 |
3.6.8-67.el8_10.rocky.0 |
python: incorrect IPv4 and IPv6 private ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35
|
python3-libs |
CVE-2024-6232 |
中危 |
3.6.8-51.el8.rocky.0 |
3.6.8-67.el8_10.rocky.0 |
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15
|
python3-libs |
CVE-2024-6923 |
中危 |
3.6.8-51.el8.rocky.0 |
3.6.8-67.el8_10.rocky.0 |
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15
|
dbus-tools |
CVE-2023-34969 |
中危 |
1:1.12.8-24.el8 |
1:1.12.8-24.el8_8.1 |
dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34969
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-06-08 03:15 修改: 2023-12-27 16:36
|
sqlite-libs |
CVE-2020-24736 |
中危 |
3.26.0-17.el8_7 |
3.26.0-18.el8_8 |
sqlite: Crash due to misuse of window functions.
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24736
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-04-11 18:15 修改: 2023-05-26 20:15
|
sqlite-libs |
CVE-2023-7104 |
中危 |
3.26.0-17.el8_7 |
3.26.0-19.el8_9 |
sqlite: heap-buffer-overflow at sessionfuzz
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7104
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-12-29 10:15 修改: 2024-05-17 02:34
|
systemd |
CVE-2023-26604 |
中危 |
239-74.el8_8 |
239-74.el8_8.2 |
systemd: privilege escalation via the less pager
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26604
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-03-03 16:15 修改: 2023-11-07 04:09
|
systemd-libs |
CVE-2023-26604 |
中危 |
239-74.el8_8 |
239-74.el8_8.2 |
systemd: privilege escalation via the less pager
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26604
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-03-03 16:15 修改: 2023-11-07 04:09
|
systemd-pam |
CVE-2023-26604 |
中危 |
239-74.el8_8 |
239-74.el8_8.2 |
systemd: privilege escalation via the less pager
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26604
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2023-03-03 16:15 修改: 2023-11-07 04:09
|
binutils |
CVE-2018-12699 |
低危 |
2.30-119.el8 |
2.30-125.el8_10 |
binutils: heap-based buffer overflow in finish_stab in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12699
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15
|
krb5-libs |
CVE-2024-26458 |
低危 |
1.18.2-22.el8_7 |
1.18.2-27.el8_10 |
krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09
|
openssl-libs |
CVE-2024-5535 |
低危 |
1:1.1.1k-9.el8_7 |
1:1.1.1k-14.el8_10 |
openssl: SSL_select_next_proto buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15
|
krb5-libs |
CVE-2024-26461 |
低危 |
1.18.2-22.el8_7 |
1.18.2-27.el8_10 |
krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35
|
bzip2-libs |
CVE-2019-12900 |
低危 |
1.0.6-26.el8 |
1.0.6-27.el8_10 |
bzip2: out-of-bounds write in function BZ2_decompress
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12900
镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423
发布日期: 2019-06-19 23:15 修改: 2023-11-07 03:03
|