curl |
CVE-2021-22945 |
严重 |
7.78.0-r0 |
7.79.0-r0 |
curl: use-after-free and double-free in MQTT sending
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22945
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-09-23 13:15 修改: 2024-03-27 15:04
|
curl |
CVE-2022-32207 |
严重 |
7.78.0-r0 |
7.79.1-r2 |
curl: Unpreserved file permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32207
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
curl |
CVE-2023-23914 |
严重 |
7.78.0-r0 |
7.79.1-r5 |
curl: HSTS ignored on multiple requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23914
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55
|
expat |
CVE-2022-22822 |
严重 |
2.4.1-r0 |
2.4.3-r0 |
expat: Integer overflow in addBinding in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22822
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-01-10 14:12 修改: 2022-10-06 15:29
|
expat |
CVE-2022-22823 |
严重 |
2.4.1-r0 |
2.4.3-r0 |
expat: Integer overflow in build_model in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22823
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47
|
expat |
CVE-2022-22824 |
严重 |
2.4.1-r0 |
2.4.3-r0 |
expat: Integer overflow in defineAttribute in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22824
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47
|
expat |
CVE-2022-23852 |
严重 |
2.4.1-r0 |
2.4.4-r0 |
expat: Integer overflow in function XML_GetBuffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23852
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-01-24 02:15 修改: 2022-10-29 02:44
|
expat |
CVE-2022-25235 |
严重 |
2.4.1-r0 |
2.4.5-r0 |
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25235
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-16 01:15 修改: 2023-11-07 03:44
|
expat |
CVE-2022-25236 |
严重 |
2.4.1-r0 |
2.4.5-r0 |
expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25236
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-16 01:15 修改: 2023-11-07 03:44
|
expat |
CVE-2022-25315 |
严重 |
2.4.1-r0 |
2.4.5-r0 |
expat: Integer overflow in storeRawNames()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25315
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44
|
heimdal-libs |
CVE-2022-44640 |
严重 |
7.7.0-r4 |
7.7.1-r0 |
Heimdal before 7.7.1 allows remote attackers to execute arbitrary code ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44640
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-12-25 05:15 修改: 2023-10-08 09:15
|
libarchive |
CVE-2022-36227 |
严重 |
3.5.1-r0 |
3.5.3-r1 |
libarchive: NULL pointer dereference in archive_write.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36227
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-11-22 02:15 修改: 2024-03-27 16:04
|
libcrypto1.1 |
CVE-2021-3711 |
严重 |
1.1.1k-r0 |
1.1.1l-r0 |
openssl: SM2 Decryption Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15
|
libcurl |
CVE-2021-22945 |
严重 |
7.78.0-r0 |
7.79.0-r0 |
curl: use-after-free and double-free in MQTT sending
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22945
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-09-23 13:15 修改: 2024-03-27 15:04
|
libcurl |
CVE-2022-32207 |
严重 |
7.78.0-r0 |
7.79.1-r2 |
curl: Unpreserved file permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32207
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
libcurl |
CVE-2023-23914 |
严重 |
7.78.0-r0 |
7.79.1-r5 |
curl: HSTS ignored on multiple requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23914
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55
|
libksba |
CVE-2022-3515 |
严重 |
1.5.1-r0 |
1.5.1-r1 |
libksba: integer overflow may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3515
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-01-12 15:15 修改: 2023-07-06 19:15
|
libksba |
CVE-2022-47629 |
严重 |
1.5.1-r0 |
1.5.1-r1 |
libksba: integer overflow to code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47629
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-12-20 23:15 修改: 2023-11-07 03:56
|
libssl1.1 |
CVE-2021-3711 |
严重 |
1.1.1k-r0 |
1.1.1l-r0 |
openssl: SM2 Decryption Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15
|
libtasn1 |
CVE-2021-46848 |
严重 |
4.17.0-r0 |
4.17.0-r1 |
libtasn1: Out-of-bound access in ETYPE_OK
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46848
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-10-24 14:15 修改: 2023-11-07 03:40
|
lz4-libs |
CVE-2021-3520 |
严重 |
1.9.3-r0 |
1.9.3-r1 |
lz4: memory corruption due to an integer overflow bug caused by memmove argument
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3520
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-06-02 13:15 修改: 2024-06-06 20:25
|
openssl |
CVE-2021-3711 |
严重 |
1.1.1k-r0 |
1.1.1l-r0 |
openssl: SM2 Decryption Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15
|
zlib |
CVE-2022-37434 |
严重 |
1.2.11-r3 |
1.2.12-r2 |
zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37434
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2022-08-05 07:15 修改: 2023-07-19 00:56
|
busybox |
CVE-2021-42383 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42383
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2021-42384 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42384
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2021-42385 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42385
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2021-42386 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42386
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2022-28391 |
高危 |
1.33.1-r3 |
1.33.1-r7 |
busybox: remote attackers may execute arbitrary code if netstat is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28391
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2022-04-03 21:15 修改: 2022-08-11 18:44
|
expat |
CVE-2021-45960 |
高危 |
2.4.1-r0 |
2.4.3-r0 |
expat: Large number of prefixed XML attributes on a single tag can crash libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45960
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-01-01 19:15 修改: 2022-10-06 19:08
|
expat |
CVE-2021-46143 |
高危 |
2.4.1-r0 |
2.4.3-r0 |
expat: Integer overflow in doProlog in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46143
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-01-06 04:15 修改: 2022-10-06 19:11
|
expat |
CVE-2022-22825 |
高危 |
2.4.1-r0 |
2.4.3-r0 |
expat: Integer overflow in lookup in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22825
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47
|
expat |
CVE-2022-22826 |
高危 |
2.4.1-r0 |
2.4.3-r0 |
expat: Integer overflow in nextScaffoldPart in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22826
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-01-10 14:12 修改: 2022-10-06 12:44
|
expat |
CVE-2022-22827 |
高危 |
2.4.1-r0 |
2.4.3-r0 |
expat: Integer overflow in storeAtts in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22827
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-01-10 14:12 修改: 2022-10-06 12:52
|
expat |
CVE-2022-23990 |
高危 |
2.4.1-r0 |
2.4.4-r0 |
expat: integer overflow in the doProlog function
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23990
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-01-26 19:15 修改: 2023-11-07 03:44
|
expat |
CVE-2022-25314 |
高危 |
2.4.1-r0 |
2.4.5-r0 |
expat: Integer overflow in copyString()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25314
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44
|
expat |
CVE-2022-40674 |
高危 |
2.4.1-r0 |
2.4.9-r0 |
expat: a use-after-free in the doContent function in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40674
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-09-14 11:15 修改: 2023-11-07 03:52
|
expat |
CVE-2022-43680 |
高危 |
2.4.1-r0 |
2.5.0-r0 |
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43680
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-10-24 14:15 修改: 2024-01-21 02:08
|
gmp |
CVE-2021-43618 |
高危 |
6.2.1-r0 |
6.2.1-r1 |
gmp: Integer overflow and resultant buffer overflow via crafted input
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43618
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-11-15 04:15 修改: 2023-09-29 15:15
|
gnutls |
CVE-2022-2509 |
高危 |
3.7.1-r0 |
3.7.1-r1 |
gnutls: Double free during gnutls_pkcs7_verify
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2509
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-01 14:15 修改: 2023-11-07 03:46
|
gnutls |
CVE-2023-0361 |
高危 |
3.7.1-r0 |
3.7.1-r2 |
gnutls: timing side-channel in the TLS RSA key exchange code
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0361
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-02-15 18:15 修改: 2023-11-07 04:00
|
gnutls-utils |
CVE-2022-2509 |
高危 |
3.7.1-r0 |
3.7.1-r1 |
gnutls: Double free during gnutls_pkcs7_verify
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2509
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-01 14:15 修改: 2023-11-07 03:46
|
gnutls-utils |
CVE-2023-0361 |
高危 |
3.7.1-r0 |
3.7.1-r2 |
gnutls: timing side-channel in the TLS RSA key exchange code
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0361
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-02-15 18:15 修改: 2023-11-07 04:00
|
busybox |
CVE-2021-42378 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42378
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
heimdal-libs |
CVE-2021-44758 |
高危 |
7.7.0-r4 |
7.7.1-r0 |
Heimdal before 7.7.1 allows attackers to cause a NULL pointer derefere ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44758
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-12-26 05:15 修改: 2023-10-08 09:15
|
heimdal-libs |
CVE-2022-41916 |
高危 |
7.7.0-r4 |
7.7.1-r0 |
Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Version ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41916
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-11-15 23:15 修改: 2023-10-08 09:15
|
heimdal-libs |
CVE-2022-42898 |
高危 |
7.7.0-r4 |
7.7.1-r0 |
krb5: integer overflow vulnerabilities in PAC parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15
|
heimdal-libs |
CVE-2022-45142 |
高危 |
7.7.0-r4 |
7.7.1-r1 |
samba: fix introduced a logic inversion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15
|
busybox |
CVE-2021-42379 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42379
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
libarchive |
CVE-2021-31566 |
高危 |
3.5.1-r0 |
3.5.3-r0 |
libarchive: symbolic links incorrectly followed when changing modes, times, ACL and flags of a file while extracting an archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31566
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 16:15 修改: 2024-03-27 16:04
|
libcom_err |
CVE-2022-1304 |
高危 |
1.46.2-r0 |
1.46.2-r1 |
e2fsprogs: out-of-bounds read/write via crafted filesystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15
|
busybox |
CVE-2021-42380 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42380
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
libcrypto1.1 |
CVE-2021-3712 |
高危 |
1.1.1k-r0 |
1.1.1l-r0 |
openssl: Read buffer overruns processing ASN.1 strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2022-0778 |
高危 |
1.1.1k-r0 |
1.1.1n-r0 |
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2022-4450 |
高危 |
1.1.1k-r0 |
1.1.1t-r0 |
openssl: double free after calling PEM_read_bio_ex
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libcrypto1.1 |
CVE-2023-0215 |
高危 |
1.1.1k-r0 |
1.1.1t-r0 |
openssl: use-after-free following BIO_new_NDEF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2023-0286 |
高危 |
1.1.1k-r0 |
1.1.1t-r0 |
openssl: X.400 address type confusion in X.509 GeneralName
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libcrypto1.1 |
CVE-2023-0464 |
高危 |
1.1.1k-r0 |
1.1.1t-r1 |
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15
|
curl |
CVE-2021-22946 |
高危 |
7.78.0-r0 |
7.79.0-r0 |
curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12
|
curl |
CVE-2022-22576 |
高危 |
7.78.0-r0 |
7.79.1-r1 |
curl: OAUTH2 bearer bypass in connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02
|
curl |
CVE-2022-27775 |
高危 |
7.78.0-r0 |
7.79.1-r1 |
curl: bad local IPv6 connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27775
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
libcurl |
CVE-2021-22946 |
高危 |
7.78.0-r0 |
7.79.0-r0 |
curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12
|
libcurl |
CVE-2022-22576 |
高危 |
7.78.0-r0 |
7.79.1-r1 |
curl: OAUTH2 bearer bypass in connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02
|
libcurl |
CVE-2022-27775 |
高危 |
7.78.0-r0 |
7.79.1-r1 |
curl: bad local IPv6 connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27775
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
libcurl |
CVE-2022-27781 |
高危 |
7.78.0-r0 |
7.79.1-r2 |
curl: CERTINFO never-ending busy-loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01
|
libcurl |
CVE-2022-27782 |
高危 |
7.78.0-r0 |
7.79.1-r2 |
curl: TLS and SSH connection too eager reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01
|
libcurl |
CVE-2022-43551 |
高危 |
7.78.0-r0 |
7.79.1-r4 |
curl: HSTS bypass via IDN
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43551
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-12-23 15:15 修改: 2024-03-27 14:58
|
libcurl |
CVE-2023-27533 |
高危 |
7.78.0-r0 |
8.0.1-r0 |
curl: TELNET option IAC injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54
|
libcurl |
CVE-2023-27534 |
高危 |
7.78.0-r0 |
8.0.1-r0 |
curl: SFTP path ~ resolving discrepancy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54
|
libgcrypt |
CVE-2021-33560 |
高危 |
1.9.3-r0 |
1.9.4-r0 |
libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33560
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-06-08 11:15 修改: 2023-11-07 03:35
|
curl |
CVE-2022-27781 |
高危 |
7.78.0-r0 |
7.79.1-r2 |
curl: CERTINFO never-ending busy-loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01
|
curl |
CVE-2022-27782 |
高危 |
7.78.0-r0 |
7.79.1-r2 |
curl: TLS and SSH connection too eager reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01
|
libpq |
CVE-2021-23214 |
高危 |
13.3-r0 |
13.5-r0 |
postgresql: server processes unencrypted bytes from man-in-the-middle
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23214
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-04 16:15 修改: 2023-11-07 03:30
|
libpq |
CVE-2022-1552 |
高危 |
13.3-r0 |
13.7-r0 |
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1552
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-31 16:15 修改: 2023-11-07 03:42
|
libpq |
CVE-2022-2625 |
高危 |
13.3-r0 |
13.8-r0 |
postgresql: Extension scripts replace objects not belonging to the extension.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2625
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-18 19:15 修改: 2022-12-02 20:14
|
libpq |
CVE-2023-2454 |
高危 |
13.3-r0 |
13.11-r0 |
postgresql: schema_element defeats protective search_path changes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2454
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15
|
libpq |
CVE-2023-39417 |
高危 |
13.3-r0 |
13.12-r0 |
postgresql: extension script @substitutions@ within quoting allow SQL injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39417
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-08-11 13:15 修改: 2024-09-09 08:15
|
libretls |
CVE-2022-0778 |
高危 |
3.3.3p1-r2 |
3.3.3p1-r3 |
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15
|
libsasl |
CVE-2022-24407 |
高危 |
2.1.27-r12 |
2.1.28-r0 |
cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24407
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-24 15:15 修改: 2023-11-07 03:44
|
libsmbclient |
CVE-2020-25717 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Active Directory (AD) domain user could become root on domain members
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25717
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2020-25718 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2020-25719 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2020-25721 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2020-25722 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not do sufficient access and conformance checking of data stored
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2021-23192 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Subsequent DCE/RPC fragment injection vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23192
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2021-3738 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Use after free in Samba AD DC RPC server
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2021-44142 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44142
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 15:15 修改: 2023-11-07 03:39
|
libsmbclient |
CVE-2022-2031 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2022-32743 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: Validated dnsHostname write right needs to be implemented
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48
|
libsmbclient |
CVE-2022-32745 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: AD users can crash the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32745
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-11-07 03:48
|
curl |
CVE-2022-43551 |
高危 |
7.78.0-r0 |
7.79.1-r4 |
curl: HSTS bypass via IDN
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43551
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-12-23 15:15 修改: 2024-03-27 14:58
|
libssl1.1 |
CVE-2021-3712 |
高危 |
1.1.1k-r0 |
1.1.1l-r0 |
openssl: Read buffer overruns processing ASN.1 strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2022-0778 |
高危 |
1.1.1k-r0 |
1.1.1n-r0 |
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2022-4450 |
高危 |
1.1.1k-r0 |
1.1.1t-r0 |
openssl: double free after calling PEM_read_bio_ex
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2023-0215 |
高危 |
1.1.1k-r0 |
1.1.1t-r0 |
openssl: use-after-free following BIO_new_NDEF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2023-0286 |
高危 |
1.1.1k-r0 |
1.1.1t-r0 |
openssl: X.400 address type confusion in X.509 GeneralName
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2023-0464 |
高危 |
1.1.1k-r0 |
1.1.1t-r1 |
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15
|
curl |
CVE-2023-27533 |
高危 |
7.78.0-r0 |
8.0.1-r0 |
curl: TELNET option IAC injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54
|
libwbclient |
CVE-2020-25717 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Active Directory (AD) domain user could become root on domain members
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25717
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libwbclient |
CVE-2020-25718 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libwbclient |
CVE-2020-25719 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libwbclient |
CVE-2020-25721 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15
|
libwbclient |
CVE-2020-25722 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not do sufficient access and conformance checking of data stored
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libwbclient |
CVE-2021-23192 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Subsequent DCE/RPC fragment injection vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23192
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
libwbclient |
CVE-2021-3738 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Use after free in Samba AD DC RPC server
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
libwbclient |
CVE-2021-44142 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44142
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 15:15 修改: 2023-11-07 03:39
|
libwbclient |
CVE-2022-2031 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
libwbclient |
CVE-2022-32743 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: Validated dnsHostname write right needs to be implemented
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48
|
libwbclient |
CVE-2022-32745 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: AD users can crash the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32745
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-11-07 03:48
|
libxml2 |
CVE-2022-2309 |
高危 |
2.9.12-r1 |
2.9.14-r1 |
lxml: NULL Pointer Dereference in lxml
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2309
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-07-05 10:15 修改: 2023-11-07 03:46
|
libxml2 |
CVE-2022-23308 |
高危 |
2.9.12-r1 |
2.9.13-r0 |
libxml2: Use-after-free of ID and IDREF attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23308
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-26 05:15 修改: 2023-11-07 03:44
|
libxml2 |
CVE-2022-40303 |
高危 |
2.9.12-r1 |
2.9.14-r2 |
libxml2: integer overflows with XML_PARSE_HUGE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40303
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-11-23 00:15 修改: 2023-11-07 03:52
|
libxml2 |
CVE-2022-40304 |
高危 |
2.9.12-r1 |
2.9.14-r2 |
libxml2: dict corruption caused by entity reference cycles
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40304
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-11-23 18:15 修改: 2023-11-07 03:52
|
libxslt |
CVE-2021-30560 |
高危 |
1.1.34-r1 |
1.1.35-r0 |
Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30560
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-08-03 19:15 修改: 2024-03-27 14:45
|
curl |
CVE-2023-27534 |
高危 |
7.78.0-r0 |
8.0.1-r0 |
curl: SFTP path ~ resolving discrepancy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54
|
ncurses-libs |
CVE-2022-29458 |
高危 |
6.2_p20210612-r0 |
6.2_p20210612-r1 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
ncurses-terminfo-base |
CVE-2022-29458 |
高危 |
6.2_p20210612-r0 |
6.2_p20210612-r1 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
nettle |
CVE-2021-3580 |
高危 |
3.7.2-r0 |
3.7.3-r0 |
nettle: Remote crash in RSA decryption via manipulated ciphertext
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3580
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-08-05 21:15 修改: 2024-01-16 15:15
|
openssh |
CVE-2021-41617 |
高危 |
8.6_p1-r2 |
8.6_p1-r3 |
openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15
|
openssh-client-common |
CVE-2021-41617 |
高危 |
8.6_p1-r2 |
8.6_p1-r3 |
openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15
|
openssh-client-default |
CVE-2021-41617 |
高危 |
8.6_p1-r2 |
8.6_p1-r3 |
openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15
|
openssh-keygen |
CVE-2021-41617 |
高危 |
8.6_p1-r2 |
8.6_p1-r3 |
openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15
|
openssh-server |
CVE-2021-41617 |
高危 |
8.6_p1-r2 |
8.6_p1-r3 |
openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15
|
openssh-server-common |
CVE-2021-41617 |
高危 |
8.6_p1-r2 |
8.6_p1-r3 |
openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15
|
openssh-sftp-server |
CVE-2021-41617 |
高危 |
8.6_p1-r2 |
8.6_p1-r3 |
openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15
|
busybox |
CVE-2021-42381 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42381
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
openssl |
CVE-2021-3712 |
高危 |
1.1.1k-r0 |
1.1.1l-r0 |
openssl: Read buffer overruns processing ASN.1 strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2022-0778 |
高危 |
1.1.1k-r0 |
1.1.1n-r0 |
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2022-4450 |
高危 |
1.1.1k-r0 |
1.1.1t-r0 |
openssl: double free after calling PEM_read_bio_ex
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2023-0215 |
高危 |
1.1.1k-r0 |
1.1.1t-r0 |
openssl: use-after-free following BIO_new_NDEF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2023-0286 |
高危 |
1.1.1k-r0 |
1.1.1t-r0 |
openssl: X.400 address type confusion in X.509 GeneralName
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2023-0464 |
高危 |
1.1.1k-r0 |
1.1.1t-r1 |
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15
|
postgresql |
CVE-2021-23214 |
高危 |
13.3-r0 |
13.5-r0 |
postgresql: server processes unencrypted bytes from man-in-the-middle
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23214
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-04 16:15 修改: 2023-11-07 03:30
|
postgresql |
CVE-2022-1552 |
高危 |
13.3-r0 |
13.7-r0 |
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1552
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-31 16:15 修改: 2023-11-07 03:42
|
postgresql |
CVE-2022-2625 |
高危 |
13.3-r0 |
13.8-r0 |
postgresql: Extension scripts replace objects not belonging to the extension.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2625
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-18 19:15 修改: 2022-12-02 20:14
|
postgresql |
CVE-2023-2454 |
高危 |
13.3-r0 |
13.11-r0 |
postgresql: schema_element defeats protective search_path changes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2454
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15
|
postgresql |
CVE-2023-39417 |
高危 |
13.3-r0 |
13.12-r0 |
postgresql: extension script @substitutions@ within quoting allow SQL injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39417
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-08-11 13:15 修改: 2024-09-09 08:15
|
postgresql-client |
CVE-2021-23214 |
高危 |
13.3-r0 |
13.5-r0 |
postgresql: server processes unencrypted bytes from man-in-the-middle
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23214
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-04 16:15 修改: 2023-11-07 03:30
|
postgresql-client |
CVE-2022-1552 |
高危 |
13.3-r0 |
13.7-r0 |
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1552
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-31 16:15 修改: 2023-11-07 03:42
|
postgresql-client |
CVE-2022-2625 |
高危 |
13.3-r0 |
13.8-r0 |
postgresql: Extension scripts replace objects not belonging to the extension.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2625
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-18 19:15 修改: 2022-12-02 20:14
|
postgresql-client |
CVE-2023-2454 |
高危 |
13.3-r0 |
13.11-r0 |
postgresql: schema_element defeats protective search_path changes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2454
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15
|
postgresql-client |
CVE-2023-39417 |
高危 |
13.3-r0 |
13.12-r0 |
postgresql: extension script @substitutions@ within quoting allow SQL injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39417
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-08-11 13:15 修改: 2024-09-09 08:15
|
postgresql-contrib |
CVE-2021-23214 |
高危 |
13.3-r0 |
13.5-r0 |
postgresql: server processes unencrypted bytes from man-in-the-middle
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23214
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-04 16:15 修改: 2023-11-07 03:30
|
postgresql-contrib |
CVE-2022-1552 |
高危 |
13.3-r0 |
13.7-r0 |
postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1552
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-31 16:15 修改: 2023-11-07 03:42
|
postgresql-contrib |
CVE-2022-2625 |
高危 |
13.3-r0 |
13.8-r0 |
postgresql: Extension scripts replace objects not belonging to the extension.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2625
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-18 19:15 修改: 2022-12-02 20:14
|
postgresql-contrib |
CVE-2023-2454 |
高危 |
13.3-r0 |
13.11-r0 |
postgresql: schema_element defeats protective search_path changes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2454
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15
|
postgresql-contrib |
CVE-2023-39417 |
高危 |
13.3-r0 |
13.12-r0 |
postgresql: extension script @substitutions@ within quoting allow SQL injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39417
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-08-11 13:15 修改: 2024-09-09 08:15
|
python3 |
CVE-2022-45061 |
高危 |
3.9.5-r1 |
3.9.16-r0 |
python: CPU denial of service via inefficient IDNA decoder
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54
|
redis |
CVE-2021-32626 |
高危 |
6.2.5-r0 |
6.2.6-r0 |
redis: Lua scripts can overflow the heap-based Lua stack
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32626
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35
|
redis |
CVE-2021-32627 |
高危 |
6.2.5-r0 |
6.2.6-r0 |
redis: Integer overflow issue with Streams
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32627
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35
|
redis |
CVE-2021-32628 |
高危 |
6.2.5-r0 |
6.2.6-r0 |
redis: Integer overflow bug in the ziplist data structure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32628
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35
|
redis |
CVE-2021-32675 |
高危 |
6.2.5-r0 |
6.2.6-r0 |
redis: Denial of service via Redis Standard Protocol (RESP) request
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32675
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35
|
redis |
CVE-2021-32687 |
高危 |
6.2.5-r0 |
6.2.6-r0 |
redis: Integer overflow issue with intsets
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32687
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35
|
redis |
CVE-2021-32762 |
高危 |
6.2.5-r0 |
6.2.6-r0 |
redis: Integer overflow in redis-cli, redis-sentinel on some platforms
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32762
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35
|
redis |
CVE-2021-41099 |
高危 |
6.2.5-r0 |
6.2.6-r0 |
redis: Integer overflow issue with strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41099
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:38
|
redis |
CVE-2022-24735 |
高危 |
6.2.5-r0 |
6.2.7-r0 |
redis: Code injection via Lua script execution environment
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24735
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-04-27 20:15 修改: 2023-11-07 03:44
|
rsync |
CVE-2020-14387 |
高危 |
3.2.3-r4 |
3.2.4-r0 |
rsync: rsync-ssl does not verify the hostname in the server certificate when using openssl
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14387
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-05-27 20:15 修改: 2021-06-09 14:54
|
rsync |
CVE-2022-29154 |
高危 |
3.2.3-r4 |
3.2.4-r0 |
rsync: remote arbitrary files write inside the directories of connecting peers
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29154
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-02 15:15 修改: 2023-11-07 03:45
|
samba-client |
CVE-2020-25717 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Active Directory (AD) domain user could become root on domain members
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25717
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-client |
CVE-2020-25718 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-client |
CVE-2020-25719 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-client |
CVE-2020-25721 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15
|
samba-client |
CVE-2020-25722 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not do sufficient access and conformance checking of data stored
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-client |
CVE-2021-23192 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Subsequent DCE/RPC fragment injection vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23192
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
samba-client |
CVE-2021-3738 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Use after free in Samba AD DC RPC server
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
samba-client |
CVE-2021-44142 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44142
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 15:15 修改: 2023-11-07 03:39
|
samba-client |
CVE-2022-2031 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
samba-client |
CVE-2022-32743 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: Validated dnsHostname write right needs to be implemented
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48
|
samba-client |
CVE-2022-32745 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: AD users can crash the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32745
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-11-07 03:48
|
samba-client-libs |
CVE-2020-25717 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Active Directory (AD) domain user could become root on domain members
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25717
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-client-libs |
CVE-2020-25718 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-client-libs |
CVE-2020-25719 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-client-libs |
CVE-2020-25721 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15
|
samba-client-libs |
CVE-2020-25722 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not do sufficient access and conformance checking of data stored
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-client-libs |
CVE-2021-23192 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Subsequent DCE/RPC fragment injection vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23192
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
samba-client-libs |
CVE-2021-3738 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Use after free in Samba AD DC RPC server
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
samba-client-libs |
CVE-2021-44142 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44142
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 15:15 修改: 2023-11-07 03:39
|
samba-client-libs |
CVE-2022-2031 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
samba-client-libs |
CVE-2022-32743 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: Validated dnsHostname write right needs to be implemented
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48
|
samba-client-libs |
CVE-2022-32745 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: AD users can crash the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32745
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-11-07 03:48
|
samba-common |
CVE-2020-25717 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Active Directory (AD) domain user could become root on domain members
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25717
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-common |
CVE-2020-25718 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-common |
CVE-2020-25719 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-common |
CVE-2020-25721 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15
|
samba-common |
CVE-2020-25722 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not do sufficient access and conformance checking of data stored
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-common |
CVE-2021-23192 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Subsequent DCE/RPC fragment injection vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23192
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
samba-common |
CVE-2021-3738 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Use after free in Samba AD DC RPC server
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
samba-common |
CVE-2021-44142 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44142
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 15:15 修改: 2023-11-07 03:39
|
samba-common |
CVE-2022-2031 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
samba-common |
CVE-2022-32743 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: Validated dnsHostname write right needs to be implemented
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48
|
samba-common |
CVE-2022-32745 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: AD users can crash the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32745
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-11-07 03:48
|
samba-libs |
CVE-2020-25717 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Active Directory (AD) domain user could become root on domain members
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25717
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2020-25718 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2020-25719 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2020-25721 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2020-25722 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not do sufficient access and conformance checking of data stored
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2021-23192 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Subsequent DCE/RPC fragment injection vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23192
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2021-3738 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Use after free in Samba AD DC RPC server
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2021-44142 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44142
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 15:15 修改: 2023-11-07 03:39
|
samba-libs |
CVE-2022-2031 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2022-32743 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: Validated dnsHostname write right needs to be implemented
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48
|
samba-libs |
CVE-2022-32745 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: AD users can crash the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32745
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-11-07 03:48
|
samba-util-libs |
CVE-2020-25717 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Active Directory (AD) domain user could become root on domain members
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25717
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-util-libs |
CVE-2020-25718 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-util-libs |
CVE-2020-25719 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-util-libs |
CVE-2020-25721 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15
|
samba-util-libs |
CVE-2020-25722 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Samba AD DC did not do sufficient access and conformance checking of data stored
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-util-libs |
CVE-2021-23192 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Subsequent DCE/RPC fragment injection vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23192
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
samba-util-libs |
CVE-2021-3738 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Use after free in Samba AD DC RPC server
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
samba-util-libs |
CVE-2021-44142 |
高危 |
4.14.5-r0 |
4.14.12-r0 |
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44142
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 15:15 修改: 2023-11-07 03:39
|
samba-util-libs |
CVE-2022-2031 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
samba-util-libs |
CVE-2022-32743 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: Validated dnsHostname write right needs to be implemented
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48
|
samba-util-libs |
CVE-2022-32745 |
高危 |
4.14.5-r0 |
4.14.14-r0 |
samba: AD users can crash the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32745
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-11-07 03:48
|
ssl_client |
CVE-2021-42378 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42378
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
ssl_client |
CVE-2021-42379 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42379
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
ssl_client |
CVE-2021-42380 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42380
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
ssl_client |
CVE-2021-42381 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42381
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
ssl_client |
CVE-2021-42382 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42382
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
ssl_client |
CVE-2021-42383 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42383
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
ssl_client |
CVE-2021-42384 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42384
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
ssl_client |
CVE-2021-42385 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42385
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
ssl_client |
CVE-2021-42386 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42386
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
ssl_client |
CVE-2022-28391 |
高危 |
1.33.1-r3 |
1.33.1-r7 |
busybox: remote attackers may execute arbitrary code if netstat is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28391
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2022-04-03 21:15 修改: 2022-08-11 18:44
|
xz-libs |
CVE-2022-1271 |
高危 |
5.2.5-r0 |
5.2.5-r1 |
gzip: arbitrary-file-write vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1271
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-31 16:15 修改: 2024-08-26 10:47
|
busybox |
CVE-2021-42382 |
高危 |
1.33.1-r3 |
1.33.1-r6 |
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42382
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
zlib |
CVE-2018-25032 |
高危 |
1.2.11-r3 |
1.2.12-r0 |
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-25032
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2022-03-25 09:15 修改: 2023-11-07 02:56
|
net-snmp-agent-libs |
CVE-2022-24807 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24807
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-agent-libs |
CVE-2022-24808 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24808
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-agent-libs |
CVE-2022-24809 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24809
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-agent-libs |
CVE-2022-24810 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24810
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-agent-libs |
CVE-2022-44792 |
中危 |
5.9-r4 |
5.9.3-r1 |
net-snmp: NULL Pointer Exception when handling ipDefaultTTL
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44792
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:16
|
net-snmp-agent-libs |
CVE-2022-44793 |
中危 |
5.9-r4 |
5.9.3-r1 |
net-snmp: NULL Pointer Exception when handling pv6IpForwarding
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44793
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:17
|
net-snmp-libs |
CVE-2022-24805 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24805
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-libs |
CVE-2022-24806 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24806
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-libs |
CVE-2022-24807 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24807
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-libs |
CVE-2022-24808 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24808
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-libs |
CVE-2022-24809 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24809
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-libs |
CVE-2022-24810 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24810
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-libs |
CVE-2022-44792 |
中危 |
5.9-r4 |
5.9.3-r1 |
net-snmp: NULL Pointer Exception when handling ipDefaultTTL
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44792
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:16
|
net-snmp-libs |
CVE-2022-44793 |
中危 |
5.9-r4 |
5.9.3-r1 |
net-snmp: NULL Pointer Exception when handling pv6IpForwarding
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44793
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:17
|
net-snmp-tools |
CVE-2022-24805 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24805
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-tools |
CVE-2022-24806 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24806
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-tools |
CVE-2022-24807 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24807
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-tools |
CVE-2022-24808 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24808
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-tools |
CVE-2022-24809 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24809
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-tools |
CVE-2022-24810 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24810
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-tools |
CVE-2022-44792 |
中危 |
5.9-r4 |
5.9.3-r1 |
net-snmp: NULL Pointer Exception when handling ipDefaultTTL
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44792
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:16
|
net-snmp-tools |
CVE-2022-44793 |
中危 |
5.9-r4 |
5.9.3-r1 |
net-snmp: NULL Pointer Exception when handling pv6IpForwarding
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44793
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:17
|
libcurl |
CVE-2021-22947 |
中危 |
7.78.0-r0 |
7.79.0-r0 |
curl: Server responses received before STARTTLS processed after TLS handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03
|
libcurl |
CVE-2022-27774 |
中危 |
7.78.0-r0 |
7.79.1-r1 |
curl: credential leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
libcurl |
CVE-2022-27776 |
中危 |
7.78.0-r0 |
7.79.1-r1 |
curl: auth/cookie leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
libcurl |
CVE-2022-32205 |
中危 |
7.78.0-r0 |
7.79.1-r2 |
curl: Set-Cookie denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32205
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:01
|
libcurl |
CVE-2022-32206 |
中危 |
7.78.0-r0 |
7.79.1-r2 |
curl: HTTP compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
libcurl |
CVE-2022-32208 |
中危 |
7.78.0-r0 |
7.79.1-r2 |
curl: FTP-KRB bad message verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
libcurl |
CVE-2022-43552 |
中危 |
7.78.0-r0 |
7.79.1-r4 |
curl: Use-after-free triggered by an HTTP proxy deny response
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35
|
libcurl |
CVE-2023-23915 |
中危 |
7.78.0-r0 |
7.79.1-r5 |
curl: HSTS amnesia with --parallel
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23915
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55
|
libcurl |
CVE-2023-23916 |
中危 |
7.78.0-r0 |
7.79.1-r5 |
curl: HTTP multi-header compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54
|
libcurl |
CVE-2023-27535 |
中危 |
7.78.0-r0 |
8.0.1-r0 |
curl: FTP too eager connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47
|
libcurl |
CVE-2023-27536 |
中危 |
7.78.0-r0 |
8.0.1-r0 |
curl: GSS delegation too eager connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46
|
libcurl |
CVE-2023-27537 |
中危 |
7.78.0-r0 |
8.0.1-r0 |
curl: HSTS double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27537
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46
|
libcurl |
CVE-2023-27538 |
中危 |
7.78.0-r0 |
8.0.1-r0 |
curl: SSH connection too eager reuse still
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46
|
libfdisk |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libfdisk |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
openssl |
CVE-2022-2097 |
中危 |
1.1.1k-r0 |
1.1.1q-r0 |
openssl: AES OCB fails to encrypt some bytes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2022-4304 |
中危 |
1.1.1k-r0 |
1.1.1t-r0 |
openssl: timing attack in RSA Decryption implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2023-0465 |
中危 |
1.1.1k-r0 |
1.1.1t-r2 |
openssl: Invalid certificate policies in leaf certificates are silently ignored
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
partx |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
partx |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
partx |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
partx |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
libfdisk |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
libfdisk |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
flock |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
curl |
CVE-2022-43552 |
中危 |
7.78.0-r0 |
7.79.1-r4 |
curl: Use-after-free triggered by an HTTP proxy deny response
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35
|
gnupg |
CVE-2022-34903 |
中危 |
2.2.27-r0 |
2.2.31-r1 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48
|
postgresql |
CVE-2021-23222 |
中危 |
13.3-r0 |
13.5-r0 |
postgresql: libpq processes unencrypted bytes from man-in-the-middle
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23222
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-11-07 03:30
|
postgresql |
CVE-2021-3677 |
中危 |
13.3-r0 |
13.4-r0 |
postgresql: memory disclosure in certain queries
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3677
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-01-31 17:29
|
postgresql |
CVE-2023-2455 |
中危 |
13.3-r0 |
13.11-r0 |
postgresql: row security policies disregard user ID changes after inlining.
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2455
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15
|
postgresql |
CVE-2023-39418 |
中危 |
13.3-r0 |
13.12-r0 |
postgresql: MERGE fails to enforce UPDATE or SELECT row security policies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39418
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-08-11 13:15 修改: 2024-09-16 16:15
|
libmount |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libmount |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
libmount |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
libmount |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
curl |
CVE-2023-23915 |
中危 |
7.78.0-r0 |
7.79.1-r5 |
curl: HSTS amnesia with --parallel
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23915
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55
|
postgresql-client |
CVE-2021-23222 |
中危 |
13.3-r0 |
13.5-r0 |
postgresql: libpq processes unencrypted bytes from man-in-the-middle
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23222
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-11-07 03:30
|
postgresql-client |
CVE-2021-3677 |
中危 |
13.3-r0 |
13.4-r0 |
postgresql: memory disclosure in certain queries
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3677
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-01-31 17:29
|
postgresql-client |
CVE-2023-2455 |
中危 |
13.3-r0 |
13.11-r0 |
postgresql: row security policies disregard user ID changes after inlining.
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2455
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15
|
postgresql-client |
CVE-2023-39418 |
中危 |
13.3-r0 |
13.12-r0 |
postgresql: MERGE fails to enforce UPDATE or SELECT row security policies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39418
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-08-11 13:15 修改: 2024-09-16 16:15
|
curl |
CVE-2023-23916 |
中危 |
7.78.0-r0 |
7.79.1-r5 |
curl: HTTP multi-header compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54
|
curl |
CVE-2023-27535 |
中危 |
7.78.0-r0 |
8.0.1-r0 |
curl: FTP too eager connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47
|
curl |
CVE-2023-27536 |
中危 |
7.78.0-r0 |
8.0.1-r0 |
curl: GSS delegation too eager connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46
|
curl |
CVE-2023-27537 |
中危 |
7.78.0-r0 |
8.0.1-r0 |
curl: HSTS double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27537
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46
|
libpq |
CVE-2021-23222 |
中危 |
13.3-r0 |
13.5-r0 |
postgresql: libpq processes unencrypted bytes from man-in-the-middle
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23222
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-11-07 03:30
|
postgresql-contrib |
CVE-2021-23222 |
中危 |
13.3-r0 |
13.5-r0 |
postgresql: libpq processes unencrypted bytes from man-in-the-middle
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23222
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-11-07 03:30
|
postgresql-contrib |
CVE-2021-3677 |
中危 |
13.3-r0 |
13.4-r0 |
postgresql: memory disclosure in certain queries
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3677
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-01-31 17:29
|
postgresql-contrib |
CVE-2023-2455 |
中危 |
13.3-r0 |
13.11-r0 |
postgresql: row security policies disregard user ID changes after inlining.
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2455
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15
|
postgresql-contrib |
CVE-2023-39418 |
中危 |
13.3-r0 |
13.12-r0 |
postgresql: MERGE fails to enforce UPDATE or SELECT row security policies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39418
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-08-11 13:15 修改: 2024-09-16 16:15
|
libpq |
CVE-2021-3677 |
中危 |
13.3-r0 |
13.4-r0 |
postgresql: memory disclosure in certain queries
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3677
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-03-02 23:15 修改: 2023-01-31 17:29
|
libpq |
CVE-2023-2455 |
中危 |
13.3-r0 |
13.11-r0 |
postgresql: row security policies disregard user ID changes after inlining.
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2455
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15
|
libpq |
CVE-2023-39418 |
中危 |
13.3-r0 |
13.12-r0 |
postgresql: MERGE fails to enforce UPDATE or SELECT row security policies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39418
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-08-11 13:15 修改: 2024-09-16 16:15
|
curl |
CVE-2023-27538 |
中危 |
7.78.0-r0 |
8.0.1-r0 |
curl: SSH connection too eager reuse still
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46
|
blkid |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
libsmartcols |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libsmartcols |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
libsmartcols |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
libsmartcols |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
redis |
CVE-2021-32672 |
中危 |
6.2.5-r0 |
6.2.6-r0 |
redis: Out of bounds read in lua debugger protocol parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32672
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35
|
redis |
CVE-2022-24736 |
中危 |
6.2.5-r0 |
6.2.7-r0 |
redis: Malformed Lua script can crash Redis
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24736
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-04-27 20:15 修改: 2023-11-07 03:44
|
redis |
CVE-2022-35977 |
中危 |
6.2.5-r0 |
6.2.9-r0 |
redis: Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands may result with false OOM panic
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35977
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-01-20 19:15 修改: 2023-02-02 14:28
|
redis |
CVE-2023-22458 |
中危 |
6.2.5-r0 |
6.2.9-r0 |
redis: Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands may lead to denial-of-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22458
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-01-20 19:15 修改: 2023-02-02 14:23
|
blkid |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
blkid |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
heimdal-libs |
CVE-2019-14870 |
中危 |
7.7.0-r4 |
7.7.1-r0 |
samba: The DelegationNotAllowed Kerberos feature restriction was not being applied when processing protocol transition requests (S4U2Self), in the AD DC KDC
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14870
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2019-12-10 23:15 修改: 2023-11-07 03:05
|
heimdal-libs |
CVE-2021-3671 |
中危 |
7.7.0-r4 |
7.7.1-r0 |
samba: Null pointer dereference on missing sname in TGS-REQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38
|
heimdal-libs |
CVE-2022-3437 |
中危 |
7.7.0-r4 |
7.7.1-r0 |
samba: heap buffer overflow in GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3437
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-01-12 15:15 修改: 2024-10-28 19:35
|
hexdump |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
hexdump |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
hexdump |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
hexdump |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
busybox |
CVE-2021-42374 |
中危 |
1.33.1-r3 |
1.33.1-r4 |
busybox: out-of-bounds read in unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42374
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2021-42375 |
中危 |
1.33.1-r3 |
1.33.1-r5 |
busybox: incorrect handling of a special element in ash applet leads to denial of service when processing a crafted shell command
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42375
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
libsmbclient |
CVE-2016-2124 |
中危 |
4.14.5-r0 |
4.14.12-r0 |
samba: SMB1 client connections can be downgraded to plaintext authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2124
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2021-3671 |
中危 |
4.14.5-r0 |
4.14.8-r0 |
samba: Null pointer dereference on missing sname in TGS-REQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38
|
samba-client |
CVE-2016-2124 |
中危 |
4.14.5-r0 |
4.14.12-r0 |
samba: SMB1 client connections can be downgraded to plaintext authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2124
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-client |
CVE-2021-3671 |
中危 |
4.14.5-r0 |
4.14.8-r0 |
samba: Null pointer dereference on missing sname in TGS-REQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38
|
samba-client |
CVE-2022-32742 |
中危 |
4.14.5-r0 |
4.14.14-r0 |
samba: server memory information leak via SMB1
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32742
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2024-07-03 01:38
|
samba-client |
CVE-2022-32746 |
中危 |
4.14.5-r0 |
4.14.14-r0 |
samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2022-32742 |
中危 |
4.14.5-r0 |
4.14.14-r0 |
samba: server memory information leak via SMB1
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32742
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2024-07-03 01:38
|
libsmbclient |
CVE-2022-32746 |
中危 |
4.14.5-r0 |
4.14.14-r0 |
samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
libssh |
CVE-2021-3634 |
中危 |
0.9.5-r0 |
0.9.6-r0 |
libssh: possible heap-based buffer overflow when rekeying
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3634
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-08-31 17:15 修改: 2023-12-22 10:15
|
libarchive |
CVE-2021-36976 |
中危 |
3.5.1-r0 |
3.5.3-r0 |
libarchive: use-after-free in copy_string()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36976
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-20 07:15 修改: 2024-03-27 16:04
|
libblkid |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libblkid |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
libblkid |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
libblkid |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
cfdisk |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
cfdisk |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
libssl1.1 |
CVE-2022-2097 |
中危 |
1.1.1k-r0 |
1.1.1q-r0 |
openssl: AES OCB fails to encrypt some bytes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15
|
samba-client-libs |
CVE-2016-2124 |
中危 |
4.14.5-r0 |
4.14.12-r0 |
samba: SMB1 client connections can be downgraded to plaintext authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2124
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-client-libs |
CVE-2021-3671 |
中危 |
4.14.5-r0 |
4.14.8-r0 |
samba: Null pointer dereference on missing sname in TGS-REQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38
|
samba-client-libs |
CVE-2022-32742 |
中危 |
4.14.5-r0 |
4.14.14-r0 |
samba: server memory information leak via SMB1
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32742
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2024-07-03 01:38
|
samba-client-libs |
CVE-2022-32746 |
中危 |
4.14.5-r0 |
4.14.14-r0 |
samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
libssl1.1 |
CVE-2022-4304 |
中危 |
1.1.1k-r0 |
1.1.1t-r0 |
openssl: timing attack in RSA Decryption implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2023-0465 |
中危 |
1.1.1k-r0 |
1.1.1t-r2 |
openssl: Invalid certificate policies in leaf certificates are silently ignored
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
cfdisk |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
libuuid |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libuuid |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
libuuid |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
libuuid |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
cfdisk |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
blkid |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
curl |
CVE-2021-22947 |
中危 |
7.78.0-r0 |
7.79.0-r0 |
curl: Server responses received before STARTTLS processed after TLS handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03
|
curl |
CVE-2022-27774 |
中危 |
7.78.0-r0 |
7.79.1-r1 |
curl: credential leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
samba-common |
CVE-2016-2124 |
中危 |
4.14.5-r0 |
4.14.12-r0 |
samba: SMB1 client connections can be downgraded to plaintext authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2124
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-common |
CVE-2021-3671 |
中危 |
4.14.5-r0 |
4.14.8-r0 |
samba: Null pointer dereference on missing sname in TGS-REQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38
|
samba-common |
CVE-2022-32742 |
中危 |
4.14.5-r0 |
4.14.14-r0 |
samba: server memory information leak via SMB1
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32742
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2024-07-03 01:38
|
samba-common |
CVE-2022-32746 |
中危 |
4.14.5-r0 |
4.14.14-r0 |
samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
curl |
CVE-2022-27776 |
中危 |
7.78.0-r0 |
7.79.1-r1 |
curl: auth/cookie leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
libcrypto1.1 |
CVE-2022-2097 |
中危 |
1.1.1k-r0 |
1.1.1q-r0 |
openssl: AES OCB fails to encrypt some bytes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2022-4304 |
中危 |
1.1.1k-r0 |
1.1.1t-r0 |
openssl: timing attack in RSA Decryption implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libcrypto1.1 |
CVE-2023-0465 |
中危 |
1.1.1k-r0 |
1.1.1t-r2 |
openssl: Invalid certificate policies in leaf certificates are silently ignored
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
curl |
CVE-2022-32205 |
中危 |
7.78.0-r0 |
7.79.1-r2 |
curl: Set-Cookie denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32205
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:01
|
curl |
CVE-2022-32206 |
中危 |
7.78.0-r0 |
7.79.1-r2 |
curl: HTTP compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
curl |
CVE-2022-32208 |
中危 |
7.78.0-r0 |
7.79.1-r2 |
curl: FTP-KRB bad message verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
libwbclient |
CVE-2016-2124 |
中危 |
4.14.5-r0 |
4.14.12-r0 |
samba: SMB1 client connections can be downgraded to plaintext authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2124
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libwbclient |
CVE-2021-3671 |
中危 |
4.14.5-r0 |
4.14.8-r0 |
samba: Null pointer dereference on missing sname in TGS-REQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38
|
libwbclient |
CVE-2022-32742 |
中危 |
4.14.5-r0 |
4.14.14-r0 |
samba: server memory information leak via SMB1
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32742
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2024-07-03 01:38
|
libwbclient |
CVE-2022-32746 |
中危 |
4.14.5-r0 |
4.14.14-r0 |
samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2016-2124 |
中危 |
4.14.5-r0 |
4.14.12-r0 |
samba: SMB1 client connections can be downgraded to plaintext authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2124
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2021-3671 |
中危 |
4.14.5-r0 |
4.14.8-r0 |
samba: Null pointer dereference on missing sname in TGS-REQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38
|
samba-libs |
CVE-2022-32742 |
中危 |
4.14.5-r0 |
4.14.14-r0 |
samba: server memory information leak via SMB1
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32742
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2024-07-03 01:38
|
samba-libs |
CVE-2022-32746 |
中危 |
4.14.5-r0 |
4.14.14-r0 |
samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
expat |
CVE-2022-25313 |
中危 |
2.4.1-r0 |
2.4.5-r0 |
expat: Stack exhaustion in doctype parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25313
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44
|
findmnt |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
findmnt |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
findmnt |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
libxml2 |
CVE-2022-29824 |
中危 |
2.9.12-r1 |
2.9.14-r0 |
libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29824
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-05-03 03:15 修改: 2023-11-07 03:46
|
findmnt |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
logger |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
logger |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
logger |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
logger |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
logrotate |
CVE-2022-1348 |
中危 |
3.18.1-r0 |
3.18.1-r2 |
logrotate: potential DoS from unprivileged users via the state file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1348
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-05-25 16:15 修改: 2023-11-07 03:41
|
samba-util-libs |
CVE-2016-2124 |
中危 |
4.14.5-r0 |
4.14.12-r0 |
samba: SMB1 client connections can be downgraded to plaintext authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2124
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-util-libs |
CVE-2021-3671 |
中危 |
4.14.5-r0 |
4.14.8-r0 |
samba: Null pointer dereference on missing sname in TGS-REQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38
|
samba-util-libs |
CVE-2022-32742 |
中危 |
4.14.5-r0 |
4.14.14-r0 |
samba: server memory information leak via SMB1
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32742
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2024-07-03 01:38
|
samba-util-libs |
CVE-2022-32746 |
中危 |
4.14.5-r0 |
4.14.14-r0 |
samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
setpriv |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
setpriv |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
setpriv |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
setpriv |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
sfdisk |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
sfdisk |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
sfdisk |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
sfdisk |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
lsblk |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
lsblk |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
lsblk |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
lsblk |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
flock |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
mcookie |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
mcookie |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
mcookie |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
mcookie |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
flock |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
ssl_client |
CVE-2021-42374 |
中危 |
1.33.1-r3 |
1.33.1-r4 |
busybox: out-of-bounds read in unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42374
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
ssl_client |
CVE-2021-42375 |
中危 |
1.33.1-r3 |
1.33.1-r5 |
busybox: incorrect handling of a special element in ash applet leads to denial of service when processing a crafted shell command
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42375
镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
util-linux |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
util-linux |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
util-linux |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
util-linux |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
uuidgen |
CVE-2021-37600 |
中危 |
2.37-r0 |
2.37.2-r0 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
uuidgen |
CVE-2021-3995 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
uuidgen |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
uuidgen |
CVE-2022-0563 |
中危 |
2.37-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
flock |
CVE-2021-3996 |
中危 |
2.37-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
net-snmp-agent-libs |
CVE-2022-24805 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24805
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-agent-libs |
CVE-2022-24806 |
中危 |
5.9-r4 |
5.9.3-r0 |
net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24806
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48
|
net-snmp-libs |
CVE-2015-8100 |
低危 |
5.9-r4 |
5.9.3-r1 |
CVE-2015-8100 affecting package net-snmp 5.8-4
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8100
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2015-11-10 03:59 修改: 2016-12-07 18:26
|
libcurl |
CVE-2022-35252 |
低危 |
7.78.0-r0 |
7.79.1-r3 |
curl: Incorrect handling of control code characters in cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00
|
postgresql-client |
CVE-2022-41862 |
低危 |
13.3-r0 |
13.10-r0 |
postgresql: Client memory disclosure when connecting with Kerberos to modified server
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41862
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-03 16:15 修改: 2023-04-27 15:15
|
libpq |
CVE-2022-41862 |
低危 |
13.3-r0 |
13.10-r0 |
postgresql: Client memory disclosure when connecting with Kerberos to modified server
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41862
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-03 16:15 修改: 2023-04-27 15:15
|
postgresql-contrib |
CVE-2022-41862 |
低危 |
13.3-r0 |
13.10-r0 |
postgresql: Client memory disclosure when connecting with Kerberos to modified server
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41862
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-03 16:15 修改: 2023-04-27 15:15
|
curl |
CVE-2022-35252 |
低危 |
7.78.0-r0 |
7.79.1-r3 |
curl: Incorrect handling of control code characters in cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00
|
net-snmp-tools |
CVE-2015-8100 |
低危 |
5.9-r4 |
5.9.3-r1 |
CVE-2015-8100 affecting package net-snmp 5.8-4
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8100
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2015-11-10 03:59 修改: 2016-12-07 18:26
|
net-snmp-agent-libs |
CVE-2015-8100 |
低危 |
5.9-r4 |
5.9.3-r1 |
CVE-2015-8100 affecting package net-snmp 5.8-4
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8100
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2015-11-10 03:59 修改: 2016-12-07 18:26
|
postgresql |
CVE-2022-41862 |
低危 |
13.3-r0 |
13.10-r0 |
postgresql: Client memory disclosure when connecting with Kerberos to modified server
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41862
镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f
发布日期: 2023-03-03 16:15 修改: 2023-04-27 15:15
|