| curl | CVE-2021-22945 | 严重 | 7.78.0-r0 | 7.79.0-r0 | curl: use-after-free and double-free in MQTT sending 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22945 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-09-23 13:15 修改: 2024-03-27 15:04 | 
                            
                            
                                | curl | CVE-2022-32207 | 严重 | 7.78.0-r0 | 7.79.1-r2 | curl: Unpreserved file permissions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32207 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | curl | CVE-2023-23914 | 严重 | 7.78.0-r0 | 7.79.1-r5 | curl: HSTS ignored on multiple requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23914 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55 | 
                            
                            
                                | expat | CVE-2022-22822 | 严重 | 2.4.1-r0 | 2.4.3-r0 | expat: Integer overflow in addBinding in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22822 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-01-10 14:12 修改: 2022-10-06 15:29 | 
                            
                            
                                | expat | CVE-2022-22823 | 严重 | 2.4.1-r0 | 2.4.3-r0 | expat: Integer overflow in build_model in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22823 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47 | 
                            
                            
                                | expat | CVE-2022-22824 | 严重 | 2.4.1-r0 | 2.4.3-r0 | expat: Integer overflow in defineAttribute in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22824 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47 | 
                            
                            
                                | expat | CVE-2022-23852 | 严重 | 2.4.1-r0 | 2.4.4-r0 | expat: Integer overflow in function XML_GetBuffer 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23852 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-01-24 02:15 修改: 2022-10-29 02:44 | 
                            
                            
                                | expat | CVE-2022-25235 | 严重 | 2.4.1-r0 | 2.4.5-r0 | expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25235 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-16 01:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | expat | CVE-2022-25236 | 严重 | 2.4.1-r0 | 2.4.5-r0 | expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25236 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-16 01:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | expat | CVE-2022-25315 | 严重 | 2.4.1-r0 | 2.4.5-r0 | expat: Integer overflow in storeRawNames() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25315 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | heimdal-libs | CVE-2022-44640 | 严重 | 7.7.0-r4 | 7.7.1-r0 | Heimdal before 7.7.1 allows remote attackers to execute arbitrary code ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44640 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-12-25 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | libarchive | CVE-2022-36227 | 严重 | 3.5.1-r0 | 3.5.3-r1 | libarchive: NULL pointer dereference in archive_write.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36227 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-11-22 02:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-3711 | 严重 | 1.1.1k-r0 | 1.1.1l-r0 | openssl: SM2 Decryption Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcurl | CVE-2021-22945 | 严重 | 7.78.0-r0 | 7.79.0-r0 | curl: use-after-free and double-free in MQTT sending 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22945 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-09-23 13:15 修改: 2024-03-27 15:04 | 
                            
                            
                                | libcurl | CVE-2022-32207 | 严重 | 7.78.0-r0 | 7.79.1-r2 | curl: Unpreserved file permissions 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32207 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl | CVE-2023-23914 | 严重 | 7.78.0-r0 | 7.79.1-r5 | curl: HSTS ignored on multiple requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23914 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55 | 
                            
                            
                                | libksba | CVE-2022-3515 | 严重 | 1.5.1-r0 | 1.5.1-r1 | libksba: integer overflow may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3515 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-01-12 15:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | libksba | CVE-2022-47629 | 严重 | 1.5.1-r0 | 1.5.1-r1 | libksba: integer overflow to code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47629 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-12-20 23:15 修改: 2023-11-07 03:56 | 
                            
                            
                                | libssl1.1 | CVE-2021-3711 | 严重 | 1.1.1k-r0 | 1.1.1l-r0 | openssl: SM2 Decryption Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libtasn1 | CVE-2021-46848 | 严重 | 4.17.0-r0 | 4.17.0-r1 | libtasn1: Out-of-bound access in ETYPE_OK 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46848 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-10-24 14:15 修改: 2023-11-07 03:40 | 
                            
                            
                                | lz4-libs | CVE-2021-3520 | 严重 | 1.9.3-r0 | 1.9.3-r1 | lz4: memory corruption due to an integer overflow bug caused by memmove argument 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3520 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-06-02 13:15 修改: 2024-06-06 20:25 | 
                            
                            
                                | openssl | CVE-2021-3711 | 严重 | 1.1.1k-r0 | 1.1.1l-r0 | openssl: SM2 Decryption Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | zlib | CVE-2022-37434 | 严重 | 1.2.11-r3 | 1.2.12-r2 | zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37434 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2022-08-05 07:15 修改: 2023-07-19 00:56 | 
                            
                            
                                | busybox | CVE-2021-42383 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42383 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42384 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42384 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42385 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42385 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42386 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42386 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2022-28391 | 高危 | 1.33.1-r3 | 1.33.1-r7 | busybox: remote attackers may execute arbitrary code if netstat is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28391 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2022-04-03 21:15 修改: 2022-08-11 18:44 | 
                            
                            
                                | expat | CVE-2021-45960 | 高危 | 2.4.1-r0 | 2.4.3-r0 | expat: Large number of prefixed XML attributes on a single tag can crash libexpat 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45960 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-01-01 19:15 修改: 2022-10-06 19:08 | 
                            
                            
                                | expat | CVE-2021-46143 | 高危 | 2.4.1-r0 | 2.4.3-r0 | expat: Integer overflow in doProlog in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46143 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-01-06 04:15 修改: 2022-10-06 19:11 | 
                            
                            
                                | expat | CVE-2022-22825 | 高危 | 2.4.1-r0 | 2.4.3-r0 | expat: Integer overflow in lookup in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22825 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47 | 
                            
                            
                                | expat | CVE-2022-22826 | 高危 | 2.4.1-r0 | 2.4.3-r0 | expat: Integer overflow in nextScaffoldPart in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22826 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-01-10 14:12 修改: 2022-10-06 12:44 | 
                            
                            
                                | expat | CVE-2022-22827 | 高危 | 2.4.1-r0 | 2.4.3-r0 | expat: Integer overflow in storeAtts in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22827 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-01-10 14:12 修改: 2022-10-06 12:52 | 
                            
                            
                                | expat | CVE-2022-23990 | 高危 | 2.4.1-r0 | 2.4.4-r0 | expat: integer overflow in the doProlog function 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23990 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-01-26 19:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | expat | CVE-2022-25314 | 高危 | 2.4.1-r0 | 2.4.5-r0 | expat: Integer overflow in copyString() 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25314 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | expat | CVE-2022-40674 | 高危 | 2.4.1-r0 | 2.4.9-r0 | expat: a use-after-free in the doContent function in xmlparse.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40674 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-09-14 11:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | expat | CVE-2022-43680 | 高危 | 2.4.1-r0 | 2.5.0-r0 | expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43680 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-10-24 14:15 修改: 2024-01-21 02:08 | 
                            
                            
                                | gmp | CVE-2021-43618 | 高危 | 6.2.1-r0 | 6.2.1-r1 | gmp: Integer overflow and resultant buffer overflow via crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43618 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-11-15 04:15 修改: 2023-09-29 15:15 | 
                            
                            
                                | gnutls | CVE-2022-2509 | 高危 | 3.7.1-r0 | 3.7.1-r1 | gnutls: Double free during gnutls_pkcs7_verify 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2509 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-01 14:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | gnutls | CVE-2023-0361 | 高危 | 3.7.1-r0 | 3.7.1-r2 | gnutls: timing side-channel in the TLS RSA key exchange code 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0361 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-02-15 18:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | gnutls-utils | CVE-2022-2509 | 高危 | 3.7.1-r0 | 3.7.1-r1 | gnutls: Double free during gnutls_pkcs7_verify 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2509 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-01 14:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | gnutls-utils | CVE-2023-0361 | 高危 | 3.7.1-r0 | 3.7.1-r2 | gnutls: timing side-channel in the TLS RSA key exchange code 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0361 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-02-15 18:15 修改: 2023-11-07 04:00 | 
                            
                            
                                | busybox | CVE-2021-42378 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42378 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | heimdal-libs | CVE-2021-44758 | 高危 | 7.7.0-r4 | 7.7.1-r0 | Heimdal before 7.7.1 allows attackers to cause a NULL pointer derefere ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44758 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-12-26 05:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | heimdal-libs | CVE-2022-41916 | 高危 | 7.7.0-r4 | 7.7.1-r0 | Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Version ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41916 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-11-15 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | heimdal-libs | CVE-2022-42898 | 高危 | 7.7.0-r4 | 7.7.1-r0 | krb5: integer overflow vulnerabilities in PAC parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | heimdal-libs | CVE-2022-45142 | 高危 | 7.7.0-r4 | 7.7.1-r1 | samba: fix introduced a logic inversion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45142 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-06 23:15 修改: 2023-10-08 09:15 | 
                            
                            
                                | busybox | CVE-2021-42379 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42379 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libarchive | CVE-2021-31566 | 高危 | 3.5.1-r0 | 3.5.3-r0 | libarchive: symbolic links incorrectly followed when changing modes, times, ACL and flags of a file while extracting an archive 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31566 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 16:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | libcom_err | CVE-2022-1304 | 高危 | 1.46.2-r0 | 1.46.2-r1 | e2fsprogs: out-of-bounds read/write via crafted filesystem 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15 | 
                            
                            
                                | busybox | CVE-2021-42380 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42380 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-3712 | 高危 | 1.1.1k-r0 | 1.1.1l-r0 | openssl: Read buffer overruns processing ASN.1 strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2022-0778 | 高危 | 1.1.1k-r0 | 1.1.1n-r0 | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2022-4450 | 高危 | 1.1.1k-r0 | 1.1.1t-r0 | openssl: double free after calling PEM_read_bio_ex 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2023-0215 | 高危 | 1.1.1k-r0 | 1.1.1t-r0 | openssl: use-after-free following BIO_new_NDEF 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2023-0286 | 高危 | 1.1.1k-r0 | 1.1.1t-r0 | openssl: X.400 address type confusion in X.509 GeneralName 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2023-0464 | 高危 | 1.1.1k-r0 | 1.1.1t-r1 | openssl: Denial of service by excessive resource usage in verifying X509 policy constraints 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | curl | CVE-2021-22946 | 高危 | 7.78.0-r0 | 7.79.0-r0 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | curl | CVE-2022-22576 | 高危 | 7.78.0-r0 | 7.79.1-r1 | curl: OAUTH2 bearer bypass in connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | curl | CVE-2022-27775 | 高危 | 7.78.0-r0 | 7.79.1-r1 | curl: bad local IPv6 connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27775 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl | CVE-2021-22946 | 高危 | 7.78.0-r0 | 7.79.0-r0 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcurl | CVE-2022-22576 | 高危 | 7.78.0-r0 | 7.79.1-r1 | curl: OAUTH2 bearer bypass in connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl | CVE-2022-27775 | 高危 | 7.78.0-r0 | 7.79.1-r1 | curl: bad local IPv6 connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27775 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl | CVE-2022-27781 | 高危 | 7.78.0-r0 | 7.79.1-r2 | curl: CERTINFO never-ending busy-loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl | CVE-2022-27782 | 高危 | 7.78.0-r0 | 7.79.1-r2 | curl: TLS and SSH connection too eager reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl | CVE-2022-43551 | 高危 | 7.78.0-r0 | 7.79.1-r4 | curl: HSTS bypass via IDN 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43551 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-12-23 15:15 修改: 2024-03-27 14:58 | 
                            
                            
                                | libcurl | CVE-2023-27533 | 高危 | 7.78.0-r0 | 8.0.1-r0 | curl: TELNET option IAC injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl | CVE-2023-27534 | 高危 | 7.78.0-r0 | 8.0.1-r0 | curl: SFTP path ~ resolving discrepancy 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libgcrypt | CVE-2021-33560 | 高危 | 1.9.3-r0 | 1.9.4-r0 | libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33560 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-06-08 11:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | curl | CVE-2022-27781 | 高危 | 7.78.0-r0 | 7.79.1-r2 | curl: CERTINFO never-ending busy-loop 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | curl | CVE-2022-27782 | 高危 | 7.78.0-r0 | 7.79.1-r2 | curl: TLS and SSH connection too eager reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libpq | CVE-2021-23214 | 高危 | 13.3-r0 | 13.5-r0 | postgresql: server processes unencrypted bytes from man-in-the-middle 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23214 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-04 16:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | libpq | CVE-2022-1552 | 高危 | 13.3-r0 | 13.7-r0 | postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1552 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-31 16:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | libpq | CVE-2022-2625 | 高危 | 13.3-r0 | 13.8-r0 | postgresql: Extension scripts replace objects not belonging to the extension. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2625 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-18 19:15 修改: 2022-12-02 20:14 | 
                            
                            
                                | libpq | CVE-2023-2454 | 高危 | 13.3-r0 | 13.11-r0 | postgresql: schema_element defeats protective search_path changes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2454 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | libpq | CVE-2023-39417 | 高危 | 13.3-r0 | 13.12-r0 | postgresql: extension script @substitutions@ within quoting allow SQL injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39417 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-08-11 13:15 修改: 2024-09-09 08:15 | 
                            
                            
                                | libretls | CVE-2022-0778 | 高危 | 3.3.3p1-r2 | 3.3.3p1-r3 | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libsasl | CVE-2022-24407 | 高危 | 2.1.27-r12 | 2.1.28-r0 | cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24407 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-24 15:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libsmbclient | CVE-2020-25717 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Active Directory (AD) domain user could become root on domain members 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25717 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libsmbclient | CVE-2020-25718 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libsmbclient | CVE-2020-25719 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libsmbclient | CVE-2020-25721 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid) 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libsmbclient | CVE-2020-25722 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not do sufficient access and conformance checking of data stored 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libsmbclient | CVE-2021-23192 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Subsequent DCE/RPC fragment injection vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23192 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libsmbclient | CVE-2021-3738 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Use after free in Samba AD DC RPC server 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libsmbclient | CVE-2021-44142 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44142 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 15:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libsmbclient | CVE-2022-2031 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libsmbclient | CVE-2022-32743 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: Validated dnsHostname write right needs to be implemented 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libsmbclient | CVE-2022-32745 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: AD users can crash the server process with an LDAP add or modify request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32745 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | curl | CVE-2022-43551 | 高危 | 7.78.0-r0 | 7.79.1-r4 | curl: HSTS bypass via IDN 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43551 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-12-23 15:15 修改: 2024-03-27 14:58 | 
                            
                            
                                | libssl1.1 | CVE-2021-3712 | 高危 | 1.1.1k-r0 | 1.1.1l-r0 | openssl: Read buffer overruns processing ASN.1 strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2022-0778 | 高危 | 1.1.1k-r0 | 1.1.1n-r0 | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2022-4450 | 高危 | 1.1.1k-r0 | 1.1.1t-r0 | openssl: double free after calling PEM_read_bio_ex 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0215 | 高危 | 1.1.1k-r0 | 1.1.1t-r0 | openssl: use-after-free following BIO_new_NDEF 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0286 | 高危 | 1.1.1k-r0 | 1.1.1t-r0 | openssl: X.400 address type confusion in X.509 GeneralName 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0464 | 高危 | 1.1.1k-r0 | 1.1.1t-r1 | openssl: Denial of service by excessive resource usage in verifying X509 policy constraints 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | curl | CVE-2023-27533 | 高危 | 7.78.0-r0 | 8.0.1-r0 | curl: TELNET option IAC injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libwbclient | CVE-2020-25717 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Active Directory (AD) domain user could become root on domain members 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25717 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwbclient | CVE-2020-25718 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwbclient | CVE-2020-25719 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwbclient | CVE-2020-25721 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid) 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwbclient | CVE-2020-25722 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not do sufficient access and conformance checking of data stored 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwbclient | CVE-2021-23192 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Subsequent DCE/RPC fragment injection vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23192 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwbclient | CVE-2021-3738 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Use after free in Samba AD DC RPC server 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwbclient | CVE-2021-44142 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44142 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 15:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libwbclient | CVE-2022-2031 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwbclient | CVE-2022-32743 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: Validated dnsHostname write right needs to be implemented 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libwbclient | CVE-2022-32745 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: AD users can crash the server process with an LDAP add or modify request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32745 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | libxml2 | CVE-2022-2309 | 高危 | 2.9.12-r1 | 2.9.14-r1 | lxml: NULL Pointer Dereference in lxml 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2309 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-07-05 10:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | libxml2 | CVE-2022-23308 | 高危 | 2.9.12-r1 | 2.9.13-r0 | libxml2: Use-after-free of ID and IDREF attributes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23308 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-26 05:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | libxml2 | CVE-2022-40303 | 高危 | 2.9.12-r1 | 2.9.14-r2 | libxml2: integer overflows with XML_PARSE_HUGE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40303 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-11-23 00:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libxml2 | CVE-2022-40304 | 高危 | 2.9.12-r1 | 2.9.14-r2 | libxml2: dict corruption caused by entity reference cycles 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40304 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-11-23 18:15 修改: 2023-11-07 03:52 | 
                            
                            
                                | libxslt | CVE-2021-30560 | 高危 | 1.1.34-r1 | 1.1.35-r0 | Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 a ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30560 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-08-03 19:15 修改: 2024-03-27 14:45 | 
                            
                            
                                | curl | CVE-2023-27534 | 高危 | 7.78.0-r0 | 8.0.1-r0 | curl: SFTP path ~ resolving discrepancy 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | ncurses-libs | CVE-2022-29458 | 高危 | 6.2_p20210612-r0 | 6.2_p20210612-r1 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | ncurses-terminfo-base | CVE-2022-29458 | 高危 | 6.2_p20210612-r0 | 6.2_p20210612-r1 | ncurses: segfaulting OOB read 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | nettle | CVE-2021-3580 | 高危 | 3.7.2-r0 | 3.7.3-r0 | nettle: Remote crash in RSA decryption via manipulated ciphertext 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3580 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-08-05 21:15 修改: 2024-01-16 15:15 | 
                            
                            
                                | openssh | CVE-2021-41617 | 高危 | 8.6_p1-r2 | 8.6_p1-r3 | openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15 | 
                            
                            
                                | openssh-client-common | CVE-2021-41617 | 高危 | 8.6_p1-r2 | 8.6_p1-r3 | openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15 | 
                            
                            
                                | openssh-client-default | CVE-2021-41617 | 高危 | 8.6_p1-r2 | 8.6_p1-r3 | openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15 | 
                            
                            
                                | openssh-keygen | CVE-2021-41617 | 高危 | 8.6_p1-r2 | 8.6_p1-r3 | openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15 | 
                            
                            
                                | openssh-server | CVE-2021-41617 | 高危 | 8.6_p1-r2 | 8.6_p1-r3 | openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15 | 
                            
                            
                                | openssh-server-common | CVE-2021-41617 | 高危 | 8.6_p1-r2 | 8.6_p1-r3 | openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15 | 
                            
                            
                                | openssh-sftp-server | CVE-2021-41617 | 高危 | 8.6_p1-r2 | 8.6_p1-r3 | openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41617 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-09-26 19:15 修改: 2023-12-26 04:15 | 
                            
                            
                                | busybox | CVE-2021-42381 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42381 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | openssl | CVE-2021-3712 | 高危 | 1.1.1k-r0 | 1.1.1l-r0 | openssl: Read buffer overruns processing ASN.1 strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | openssl | CVE-2022-0778 | 高危 | 1.1.1k-r0 | 1.1.1n-r0 | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | openssl | CVE-2022-4450 | 高危 | 1.1.1k-r0 | 1.1.1t-r0 | openssl: double free after calling PEM_read_bio_ex 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | openssl | CVE-2023-0215 | 高危 | 1.1.1k-r0 | 1.1.1t-r0 | openssl: use-after-free following BIO_new_NDEF 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | openssl | CVE-2023-0286 | 高危 | 1.1.1k-r0 | 1.1.1t-r0 | openssl: X.400 address type confusion in X.509 GeneralName 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | openssl | CVE-2023-0464 | 高危 | 1.1.1k-r0 | 1.1.1t-r1 | openssl: Denial of service by excessive resource usage in verifying X509 policy constraints 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | postgresql | CVE-2021-23214 | 高危 | 13.3-r0 | 13.5-r0 | postgresql: server processes unencrypted bytes from man-in-the-middle 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23214 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-04 16:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | postgresql | CVE-2022-1552 | 高危 | 13.3-r0 | 13.7-r0 | postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1552 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-31 16:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | postgresql | CVE-2022-2625 | 高危 | 13.3-r0 | 13.8-r0 | postgresql: Extension scripts replace objects not belonging to the extension. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2625 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-18 19:15 修改: 2022-12-02 20:14 | 
                            
                            
                                | postgresql | CVE-2023-2454 | 高危 | 13.3-r0 | 13.11-r0 | postgresql: schema_element defeats protective search_path changes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2454 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | postgresql | CVE-2023-39417 | 高危 | 13.3-r0 | 13.12-r0 | postgresql: extension script @substitutions@ within quoting allow SQL injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39417 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-08-11 13:15 修改: 2024-09-09 08:15 | 
                            
                            
                                | postgresql-client | CVE-2021-23214 | 高危 | 13.3-r0 | 13.5-r0 | postgresql: server processes unencrypted bytes from man-in-the-middle 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23214 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-04 16:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | postgresql-client | CVE-2022-1552 | 高危 | 13.3-r0 | 13.7-r0 | postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1552 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-31 16:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | postgresql-client | CVE-2022-2625 | 高危 | 13.3-r0 | 13.8-r0 | postgresql: Extension scripts replace objects not belonging to the extension. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2625 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-18 19:15 修改: 2022-12-02 20:14 | 
                            
                            
                                | postgresql-client | CVE-2023-2454 | 高危 | 13.3-r0 | 13.11-r0 | postgresql: schema_element defeats protective search_path changes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2454 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | postgresql-client | CVE-2023-39417 | 高危 | 13.3-r0 | 13.12-r0 | postgresql: extension script @substitutions@ within quoting allow SQL injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39417 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-08-11 13:15 修改: 2024-09-09 08:15 | 
                            
                            
                                | postgresql-contrib | CVE-2021-23214 | 高危 | 13.3-r0 | 13.5-r0 | postgresql: server processes unencrypted bytes from man-in-the-middle 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23214 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-04 16:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | postgresql-contrib | CVE-2022-1552 | 高危 | 13.3-r0 | 13.7-r0 | postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1552 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-31 16:15 修改: 2023-11-07 03:42 | 
                            
                            
                                | postgresql-contrib | CVE-2022-2625 | 高危 | 13.3-r0 | 13.8-r0 | postgresql: Extension scripts replace objects not belonging to the extension. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2625 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-18 19:15 修改: 2022-12-02 20:14 | 
                            
                            
                                | postgresql-contrib | CVE-2023-2454 | 高危 | 13.3-r0 | 13.11-r0 | postgresql: schema_element defeats protective search_path changes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2454 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | postgresql-contrib | CVE-2023-39417 | 高危 | 13.3-r0 | 13.12-r0 | postgresql: extension script @substitutions@ within quoting allow SQL injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39417 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-08-11 13:15 修改: 2024-09-09 08:15 | 
                            
                            
                                | python3 | CVE-2022-45061 | 高危 | 3.9.5-r1 | 3.9.16-r0 | python: CPU denial of service via inefficient IDNA decoder 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54 | 
                            
                            
                                | redis | CVE-2021-32626 | 高危 | 6.2.5-r0 | 6.2.6-r0 | redis: Lua scripts can overflow the heap-based Lua stack 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32626 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | redis | CVE-2021-32627 | 高危 | 6.2.5-r0 | 6.2.6-r0 | redis: Integer overflow issue with Streams 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32627 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | redis | CVE-2021-32628 | 高危 | 6.2.5-r0 | 6.2.6-r0 | redis: Integer overflow bug in the ziplist data structure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32628 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | redis | CVE-2021-32675 | 高危 | 6.2.5-r0 | 6.2.6-r0 | redis: Denial of service via Redis Standard Protocol (RESP) request 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32675 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | redis | CVE-2021-32687 | 高危 | 6.2.5-r0 | 6.2.6-r0 | redis: Integer overflow issue with intsets 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32687 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | redis | CVE-2021-32762 | 高危 | 6.2.5-r0 | 6.2.6-r0 | redis: Integer overflow in redis-cli, redis-sentinel on some platforms 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32762 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | redis | CVE-2021-41099 | 高危 | 6.2.5-r0 | 6.2.6-r0 | redis: Integer overflow issue with strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41099 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | redis | CVE-2022-24735 | 高危 | 6.2.5-r0 | 6.2.7-r0 | redis: Code injection via Lua script execution environment 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24735 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-04-27 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | rsync | CVE-2020-14387 | 高危 | 3.2.3-r4 | 3.2.4-r0 | rsync: rsync-ssl does not verify the hostname in the server certificate when using openssl 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14387 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-05-27 20:15 修改: 2021-06-09 14:54 | 
                            
                            
                                | rsync | CVE-2022-29154 | 高危 | 3.2.3-r4 | 3.2.4-r0 | rsync: remote arbitrary files write inside the directories of connecting peers 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29154 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-02 15:15 修改: 2023-11-07 03:45 | 
                            
                            
                                | samba-client | CVE-2020-25717 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Active Directory (AD) domain user could become root on domain members 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25717 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client | CVE-2020-25718 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client | CVE-2020-25719 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client | CVE-2020-25721 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid) 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client | CVE-2020-25722 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not do sufficient access and conformance checking of data stored 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client | CVE-2021-23192 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Subsequent DCE/RPC fragment injection vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23192 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client | CVE-2021-3738 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Use after free in Samba AD DC RPC server 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client | CVE-2021-44142 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44142 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 15:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | samba-client | CVE-2022-2031 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client | CVE-2022-32743 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: Validated dnsHostname write right needs to be implemented 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | samba-client | CVE-2022-32745 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: AD users can crash the server process with an LDAP add or modify request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32745 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | samba-client-libs | CVE-2020-25717 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Active Directory (AD) domain user could become root on domain members 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25717 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client-libs | CVE-2020-25718 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client-libs | CVE-2020-25719 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client-libs | CVE-2020-25721 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid) 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client-libs | CVE-2020-25722 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not do sufficient access and conformance checking of data stored 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client-libs | CVE-2021-23192 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Subsequent DCE/RPC fragment injection vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23192 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client-libs | CVE-2021-3738 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Use after free in Samba AD DC RPC server 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client-libs | CVE-2021-44142 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44142 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 15:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | samba-client-libs | CVE-2022-2031 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client-libs | CVE-2022-32743 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: Validated dnsHostname write right needs to be implemented 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | samba-client-libs | CVE-2022-32745 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: AD users can crash the server process with an LDAP add or modify request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32745 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | samba-common | CVE-2020-25717 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Active Directory (AD) domain user could become root on domain members 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25717 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-common | CVE-2020-25718 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-common | CVE-2020-25719 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-common | CVE-2020-25721 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid) 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-common | CVE-2020-25722 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not do sufficient access and conformance checking of data stored 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-common | CVE-2021-23192 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Subsequent DCE/RPC fragment injection vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23192 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-common | CVE-2021-3738 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Use after free in Samba AD DC RPC server 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-common | CVE-2021-44142 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44142 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 15:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | samba-common | CVE-2022-2031 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-common | CVE-2022-32743 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: Validated dnsHostname write right needs to be implemented 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | samba-common | CVE-2022-32745 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: AD users can crash the server process with an LDAP add or modify request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32745 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | samba-libs | CVE-2020-25717 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Active Directory (AD) domain user could become root on domain members 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25717 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-libs | CVE-2020-25718 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-libs | CVE-2020-25719 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-libs | CVE-2020-25721 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid) 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-libs | CVE-2020-25722 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not do sufficient access and conformance checking of data stored 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-libs | CVE-2021-23192 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Subsequent DCE/RPC fragment injection vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23192 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-libs | CVE-2021-3738 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Use after free in Samba AD DC RPC server 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-libs | CVE-2021-44142 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44142 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 15:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | samba-libs | CVE-2022-2031 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-libs | CVE-2022-32743 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: Validated dnsHostname write right needs to be implemented 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | samba-libs | CVE-2022-32745 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: AD users can crash the server process with an LDAP add or modify request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32745 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | samba-util-libs | CVE-2020-25717 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Active Directory (AD) domain user could become root on domain members 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25717 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-util-libs | CVE-2020-25718 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-util-libs | CVE-2020-25719 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-util-libs | CVE-2020-25721 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid) 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-util-libs | CVE-2020-25722 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Samba AD DC did not do sufficient access and conformance checking of data stored 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-util-libs | CVE-2021-23192 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Subsequent DCE/RPC fragment injection vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23192 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-util-libs | CVE-2021-3738 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Use after free in Samba AD DC RPC server 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-util-libs | CVE-2021-44142 | 高危 | 4.14.5-r0 | 4.14.12-r0 | samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44142 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 15:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | samba-util-libs | CVE-2022-2031 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-util-libs | CVE-2022-32743 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: Validated dnsHostname write right needs to be implemented 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | samba-util-libs | CVE-2022-32745 | 高危 | 4.14.5-r0 | 4.14.14-r0 | samba: AD users can crash the server process with an LDAP add or modify request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32745 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | ssl_client | CVE-2021-42378 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42378 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42379 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42379 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42380 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42380 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42381 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42381 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42382 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42382 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42383 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42383 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42384 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42384 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42385 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42385 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42386 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42386 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2022-28391 | 高危 | 1.33.1-r3 | 1.33.1-r7 | busybox: remote attackers may execute arbitrary code if netstat is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28391 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2022-04-03 21:15 修改: 2022-08-11 18:44 | 
                            
                            
                                | xz-libs | CVE-2022-1271 | 高危 | 5.2.5-r0 | 5.2.5-r1 | gzip: arbitrary-file-write vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1271 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-31 16:15 修改: 2024-08-26 10:47 | 
                            
                            
                                | busybox | CVE-2021-42382 | 高危 | 1.33.1-r3 | 1.33.1-r6 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42382 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | zlib | CVE-2018-25032 | 高危 | 1.2.11-r3 | 1.2.12-r0 | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-25032 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2022-03-25 09:15 修改: 2023-11-07 02:56 | 
                            
                            
                                | net-snmp-agent-libs | CVE-2022-24807 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24807 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-agent-libs | CVE-2022-24808 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24808 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-agent-libs | CVE-2022-24809 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24809 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-agent-libs | CVE-2022-24810 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24810 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-agent-libs | CVE-2022-44792 | 中危 | 5.9-r4 | 5.9.3-r1 | net-snmp: NULL Pointer Exception when handling ipDefaultTTL 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44792 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:16 | 
                            
                            
                                | net-snmp-agent-libs | CVE-2022-44793 | 中危 | 5.9-r4 | 5.9.3-r1 | net-snmp: NULL Pointer Exception when handling pv6IpForwarding 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44793 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:17 | 
                            
                            
                                | net-snmp-libs | CVE-2022-24805 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A buffer overflow in the handling of the INDEX of             NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24805 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-libs | CVE-2022-24806 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24806 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-libs | CVE-2022-24807 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24807 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-libs | CVE-2022-24808 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24808 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-libs | CVE-2022-24809 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24809 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-libs | CVE-2022-24810 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24810 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-libs | CVE-2022-44792 | 中危 | 5.9-r4 | 5.9.3-r1 | net-snmp: NULL Pointer Exception when handling ipDefaultTTL 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44792 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:16 | 
                            
                            
                                | net-snmp-libs | CVE-2022-44793 | 中危 | 5.9-r4 | 5.9.3-r1 | net-snmp: NULL Pointer Exception when handling pv6IpForwarding 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44793 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:17 | 
                            
                            
                                | net-snmp-tools | CVE-2022-24805 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A buffer overflow in the handling of the INDEX of             NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24805 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-tools | CVE-2022-24806 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24806 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-tools | CVE-2022-24807 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24807 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-tools | CVE-2022-24808 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24808 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-tools | CVE-2022-24809 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A malformed OID in a GET-NEXT to the nsVacmAccessTable can cause a NULL pointer dereference. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24809 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-tools | CVE-2022-24810 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24810 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-tools | CVE-2022-44792 | 中危 | 5.9-r4 | 5.9.3-r1 | net-snmp: NULL Pointer Exception when handling ipDefaultTTL 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44792 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:16 | 
                            
                            
                                | net-snmp-tools | CVE-2022-44793 | 中危 | 5.9-r4 | 5.9.3-r1 | net-snmp: NULL Pointer Exception when handling pv6IpForwarding 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44793 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-11-07 03:15 修改: 2023-03-28 17:17 | 
                            
                            
                                | libcurl | CVE-2021-22947 | 中危 | 7.78.0-r0 | 7.79.0-r0 | curl: Server responses received before STARTTLS processed after TLS handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03 | 
                            
                            
                                | libcurl | CVE-2022-27774 | 中危 | 7.78.0-r0 | 7.79.1-r1 | curl: credential leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl | CVE-2022-27776 | 中危 | 7.78.0-r0 | 7.79.1-r1 | curl: auth/cookie leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl | CVE-2022-32205 | 中危 | 7.78.0-r0 | 7.79.1-r2 | curl: Set-Cookie denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32205 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | libcurl | CVE-2022-32206 | 中危 | 7.78.0-r0 | 7.79.1-r2 | curl: HTTP compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl | CVE-2022-32208 | 中危 | 7.78.0-r0 | 7.79.1-r2 | curl: FTP-KRB bad message verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libcurl | CVE-2022-43552 | 中危 | 7.78.0-r0 | 7.79.1-r4 | curl: Use-after-free triggered by an HTTP proxy deny response 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35 | 
                            
                            
                                | libcurl | CVE-2023-23915 | 中危 | 7.78.0-r0 | 7.79.1-r5 | curl: HSTS amnesia with --parallel 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23915 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55 | 
                            
                            
                                | libcurl | CVE-2023-23916 | 中危 | 7.78.0-r0 | 7.79.1-r5 | curl: HTTP multi-header compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | libcurl | CVE-2023-27535 | 中危 | 7.78.0-r0 | 8.0.1-r0 | curl: FTP too eager connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47 | 
                            
                            
                                | libcurl | CVE-2023-27536 | 中危 | 7.78.0-r0 | 8.0.1-r0 | curl: GSS delegation too eager connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libcurl | CVE-2023-27537 | 中危 | 7.78.0-r0 | 8.0.1-r0 | curl: HSTS double-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27537 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libcurl | CVE-2023-27538 | 中危 | 7.78.0-r0 | 8.0.1-r0 | curl: SSH connection too eager reuse still 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libfdisk | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | libfdisk | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | openssl | CVE-2022-2097 | 中危 | 1.1.1k-r0 | 1.1.1q-r0 | openssl: AES OCB fails to encrypt some bytes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | openssl | CVE-2022-4304 | 中危 | 1.1.1k-r0 | 1.1.1t-r0 | openssl: timing attack in RSA Decryption implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | openssl | CVE-2023-0465 | 中危 | 1.1.1k-r0 | 1.1.1t-r2 | openssl: Invalid certificate policies in leaf certificates are silently ignored 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | partx | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | partx | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | partx | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | partx | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libfdisk | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | libfdisk | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | flock | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | curl | CVE-2022-43552 | 中危 | 7.78.0-r0 | 7.79.1-r4 | curl: Use-after-free triggered by an HTTP proxy deny response 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35 | 
                            
                            
                                | gnupg | CVE-2022-34903 | 中危 | 2.2.27-r0 | 2.2.31-r1 | gpg: Signature spoofing via status line injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48 | 
                            
                            
                                | postgresql | CVE-2021-23222 | 中危 | 13.3-r0 | 13.5-r0 | postgresql: libpq processes unencrypted bytes from man-in-the-middle 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23222 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | postgresql | CVE-2021-3677 | 中危 | 13.3-r0 | 13.4-r0 | postgresql: memory disclosure in certain queries 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3677 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-01-31 17:29 | 
                            
                            
                                | postgresql | CVE-2023-2455 | 中危 | 13.3-r0 | 13.11-r0 | postgresql: row security policies disregard user ID changes after inlining. 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2455 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | postgresql | CVE-2023-39418 | 中危 | 13.3-r0 | 13.12-r0 | postgresql: MERGE fails to enforce UPDATE or SELECT row security policies 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39418 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-08-11 13:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | libmount | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | libmount | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libmount | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | libmount | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | curl | CVE-2023-23915 | 中危 | 7.78.0-r0 | 7.79.1-r5 | curl: HSTS amnesia with --parallel 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23915 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55 | 
                            
                            
                                | postgresql-client | CVE-2021-23222 | 中危 | 13.3-r0 | 13.5-r0 | postgresql: libpq processes unencrypted bytes from man-in-the-middle 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23222 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | postgresql-client | CVE-2021-3677 | 中危 | 13.3-r0 | 13.4-r0 | postgresql: memory disclosure in certain queries 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3677 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-01-31 17:29 | 
                            
                            
                                | postgresql-client | CVE-2023-2455 | 中危 | 13.3-r0 | 13.11-r0 | postgresql: row security policies disregard user ID changes after inlining. 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2455 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | postgresql-client | CVE-2023-39418 | 中危 | 13.3-r0 | 13.12-r0 | postgresql: MERGE fails to enforce UPDATE or SELECT row security policies 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39418 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-08-11 13:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | curl | CVE-2023-23916 | 中危 | 7.78.0-r0 | 7.79.1-r5 | curl: HTTP multi-header compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54 | 
                            
                            
                                | curl | CVE-2023-27535 | 中危 | 7.78.0-r0 | 8.0.1-r0 | curl: FTP too eager connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47 | 
                            
                            
                                | curl | CVE-2023-27536 | 中危 | 7.78.0-r0 | 8.0.1-r0 | curl: GSS delegation too eager connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | curl | CVE-2023-27537 | 中危 | 7.78.0-r0 | 8.0.1-r0 | curl: HSTS double-free 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27537 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | libpq | CVE-2021-23222 | 中危 | 13.3-r0 | 13.5-r0 | postgresql: libpq processes unencrypted bytes from man-in-the-middle 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23222 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | postgresql-contrib | CVE-2021-23222 | 中危 | 13.3-r0 | 13.5-r0 | postgresql: libpq processes unencrypted bytes from man-in-the-middle 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23222 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | postgresql-contrib | CVE-2021-3677 | 中危 | 13.3-r0 | 13.4-r0 | postgresql: memory disclosure in certain queries 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3677 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-01-31 17:29 | 
                            
                            
                                | postgresql-contrib | CVE-2023-2455 | 中危 | 13.3-r0 | 13.11-r0 | postgresql: row security policies disregard user ID changes after inlining. 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2455 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | postgresql-contrib | CVE-2023-39418 | 中危 | 13.3-r0 | 13.12-r0 | postgresql: MERGE fails to enforce UPDATE or SELECT row security policies 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39418 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-08-11 13:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | libpq | CVE-2021-3677 | 中危 | 13.3-r0 | 13.4-r0 | postgresql: memory disclosure in certain queries 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3677 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-03-02 23:15 修改: 2023-01-31 17:29 | 
                            
                            
                                | libpq | CVE-2023-2455 | 中危 | 13.3-r0 | 13.11-r0 | postgresql: row security policies disregard user ID changes after inlining. 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2455 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-06-09 19:15 修改: 2023-07-06 19:15 | 
                            
                            
                                | libpq | CVE-2023-39418 | 中危 | 13.3-r0 | 13.12-r0 | postgresql: MERGE fails to enforce UPDATE or SELECT row security policies 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39418 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-08-11 13:15 修改: 2024-09-16 16:15 | 
                            
                            
                                | curl | CVE-2023-27538 | 中危 | 7.78.0-r0 | 8.0.1-r0 | curl: SSH connection too eager reuse still 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46 | 
                            
                            
                                | blkid | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libsmartcols | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | libsmartcols | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libsmartcols | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | libsmartcols | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | redis | CVE-2021-32672 | 中危 | 6.2.5-r0 | 6.2.6-r0 | redis: Out of bounds read in lua debugger protocol parser 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32672 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | redis | CVE-2022-24736 | 中危 | 6.2.5-r0 | 6.2.7-r0 | redis: Malformed Lua script can crash Redis 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24736 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-04-27 20:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | redis | CVE-2022-35977 | 中危 | 6.2.5-r0 | 6.2.9-r0 | redis: Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands may result with false OOM panic 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35977 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-01-20 19:15 修改: 2023-02-02 14:28 | 
                            
                            
                                | redis | CVE-2023-22458 | 中危 | 6.2.5-r0 | 6.2.9-r0 | redis: Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands may lead to denial-of-service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22458 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-01-20 19:15 修改: 2023-02-02 14:23 | 
                            
                            
                                | blkid | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | blkid | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | heimdal-libs | CVE-2019-14870 | 中危 | 7.7.0-r4 | 7.7.1-r0 | samba: The DelegationNotAllowed Kerberos feature restriction was not being applied when processing protocol transition requests (S4U2Self), in the AD DC KDC 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14870 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2019-12-10 23:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | heimdal-libs | CVE-2021-3671 | 中危 | 7.7.0-r4 | 7.7.1-r0 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | heimdal-libs | CVE-2022-3437 | 中危 | 7.7.0-r4 | 7.7.1-r0 | samba: heap buffer overflow in GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3437 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-01-12 15:15 修改: 2024-10-28 19:35 | 
                            
                            
                                | hexdump | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | hexdump | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | hexdump | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | hexdump | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | busybox | CVE-2021-42374 | 中危 | 1.33.1-r3 | 1.33.1-r4 | busybox: out-of-bounds read in unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42374 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42375 | 中危 | 1.33.1-r3 | 1.33.1-r5 | busybox: incorrect handling of a special element in ash applet leads to denial of service when processing a crafted shell command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42375 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libsmbclient | CVE-2016-2124 | 中危 | 4.14.5-r0 | 4.14.12-r0 | samba: SMB1 client connections can be downgraded to plaintext authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2124 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libsmbclient | CVE-2021-3671 | 中危 | 4.14.5-r0 | 4.14.8-r0 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | samba-client | CVE-2016-2124 | 中危 | 4.14.5-r0 | 4.14.12-r0 | samba: SMB1 client connections can be downgraded to plaintext authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2124 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client | CVE-2021-3671 | 中危 | 4.14.5-r0 | 4.14.8-r0 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | samba-client | CVE-2022-32742 | 中危 | 4.14.5-r0 | 4.14.14-r0 | samba: server memory information leak via SMB1 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32742 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2024-07-03 01:38 | 
                            
                            
                                | samba-client | CVE-2022-32746 | 中危 | 4.14.5-r0 | 4.14.14-r0 | samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libsmbclient | CVE-2022-32742 | 中危 | 4.14.5-r0 | 4.14.14-r0 | samba: server memory information leak via SMB1 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32742 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2024-07-03 01:38 | 
                            
                            
                                | libsmbclient | CVE-2022-32746 | 中危 | 4.14.5-r0 | 4.14.14-r0 | samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libssh | CVE-2021-3634 | 中危 | 0.9.5-r0 | 0.9.6-r0 | libssh: possible heap-based buffer overflow when rekeying 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3634 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-08-31 17:15 修改: 2023-12-22 10:15 | 
                            
                            
                                | libarchive | CVE-2021-36976 | 中危 | 3.5.1-r0 | 3.5.3-r0 | libarchive: use-after-free in copy_string() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36976 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-20 07:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | libblkid | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | libblkid | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libblkid | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | libblkid | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | cfdisk | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | cfdisk | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2022-2097 | 中危 | 1.1.1k-r0 | 1.1.1q-r0 | openssl: AES OCB fails to encrypt some bytes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | samba-client-libs | CVE-2016-2124 | 中危 | 4.14.5-r0 | 4.14.12-r0 | samba: SMB1 client connections can be downgraded to plaintext authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2124 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-client-libs | CVE-2021-3671 | 中危 | 4.14.5-r0 | 4.14.8-r0 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | samba-client-libs | CVE-2022-32742 | 中危 | 4.14.5-r0 | 4.14.14-r0 | samba: server memory information leak via SMB1 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32742 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2024-07-03 01:38 | 
                            
                            
                                | samba-client-libs | CVE-2022-32746 | 中危 | 4.14.5-r0 | 4.14.14-r0 | samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2022-4304 | 中危 | 1.1.1k-r0 | 1.1.1t-r0 | openssl: timing attack in RSA Decryption implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libssl1.1 | CVE-2023-0465 | 中危 | 1.1.1k-r0 | 1.1.1t-r2 | openssl: Invalid certificate policies in leaf certificates are silently ignored 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | cfdisk | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | libuuid | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | libuuid | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | libuuid | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | libuuid | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | cfdisk | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | blkid | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | curl | CVE-2021-22947 | 中危 | 7.78.0-r0 | 7.79.0-r0 | curl: Server responses received before STARTTLS processed after TLS handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03 | 
                            
                            
                                | curl | CVE-2022-27774 | 中危 | 7.78.0-r0 | 7.79.1-r1 | curl: credential leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | samba-common | CVE-2016-2124 | 中危 | 4.14.5-r0 | 4.14.12-r0 | samba: SMB1 client connections can be downgraded to plaintext authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2124 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-common | CVE-2021-3671 | 中危 | 4.14.5-r0 | 4.14.8-r0 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | samba-common | CVE-2022-32742 | 中危 | 4.14.5-r0 | 4.14.14-r0 | samba: server memory information leak via SMB1 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32742 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2024-07-03 01:38 | 
                            
                            
                                | samba-common | CVE-2022-32746 | 中危 | 4.14.5-r0 | 4.14.14-r0 | samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | curl | CVE-2022-27776 | 中危 | 7.78.0-r0 | 7.79.1-r1 | curl: auth/cookie leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcrypto1.1 | CVE-2022-2097 | 中危 | 1.1.1k-r0 | 1.1.1q-r0 | openssl: AES OCB fails to encrypt some bytes 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2022-4304 | 中危 | 1.1.1k-r0 | 1.1.1t-r0 | openssl: timing attack in RSA Decryption implementation 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2023-0465 | 中危 | 1.1.1k-r0 | 1.1.1t-r2 | openssl: Invalid certificate policies in leaf certificates are silently ignored 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15 | 
                            
                            
                                | curl | CVE-2022-32205 | 中危 | 7.78.0-r0 | 7.79.1-r2 | curl: Set-Cookie denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32205 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:01 | 
                            
                            
                                | curl | CVE-2022-32206 | 中危 | 7.78.0-r0 | 7.79.1-r2 | curl: HTTP compression denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | curl | CVE-2022-32208 | 中危 | 7.78.0-r0 | 7.79.1-r2 | curl: FTP-KRB bad message verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | libwbclient | CVE-2016-2124 | 中危 | 4.14.5-r0 | 4.14.12-r0 | samba: SMB1 client connections can be downgraded to plaintext authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2124 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | libwbclient | CVE-2021-3671 | 中危 | 4.14.5-r0 | 4.14.8-r0 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libwbclient | CVE-2022-32742 | 中危 | 4.14.5-r0 | 4.14.14-r0 | samba: server memory information leak via SMB1 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32742 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2024-07-03 01:38 | 
                            
                            
                                | libwbclient | CVE-2022-32746 | 中危 | 4.14.5-r0 | 4.14.14-r0 | samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-libs | CVE-2016-2124 | 中危 | 4.14.5-r0 | 4.14.12-r0 | samba: SMB1 client connections can be downgraded to plaintext authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2124 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-libs | CVE-2021-3671 | 中危 | 4.14.5-r0 | 4.14.8-r0 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | samba-libs | CVE-2022-32742 | 中危 | 4.14.5-r0 | 4.14.14-r0 | samba: server memory information leak via SMB1 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32742 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2024-07-03 01:38 | 
                            
                            
                                | samba-libs | CVE-2022-32746 | 中危 | 4.14.5-r0 | 4.14.14-r0 | samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | expat | CVE-2022-25313 | 中危 | 2.4.1-r0 | 2.4.5-r0 | expat: Stack exhaustion in doctype parsing 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25313 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44 | 
                            
                            
                                | findmnt | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | findmnt | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | findmnt | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | libxml2 | CVE-2022-29824 | 中危 | 2.9.12-r1 | 2.9.14-r0 | libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29824 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-05-03 03:15 修改: 2023-11-07 03:46 | 
                            
                            
                                | findmnt | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | logger | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | logger | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | logger | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | logger | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | logrotate | CVE-2022-1348 | 中危 | 3.18.1-r0 | 3.18.1-r2 | logrotate: potential DoS from unprivileged users via the state file 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1348 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-05-25 16:15 修改: 2023-11-07 03:41 | 
                            
                            
                                | samba-util-libs | CVE-2016-2124 | 中危 | 4.14.5-r0 | 4.14.12-r0 | samba: SMB1 client connections can be downgraded to plaintext authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2124 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | samba-util-libs | CVE-2021-3671 | 中危 | 4.14.5-r0 | 4.14.8-r0 | samba: Null pointer dereference on missing sname in TGS-REQ 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | samba-util-libs | CVE-2022-32742 | 中危 | 4.14.5-r0 | 4.14.14-r0 | samba: server memory information leak via SMB1 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32742 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2024-07-03 01:38 | 
                            
                            
                                | samba-util-libs | CVE-2022-32746 | 中危 | 4.14.5-r0 | 4.14.14-r0 | samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15 | 
                            
                            
                                | setpriv | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | setpriv | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | setpriv | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | setpriv | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | sfdisk | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | sfdisk | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | sfdisk | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | sfdisk | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | lsblk | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | lsblk | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | lsblk | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | lsblk | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | flock | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | mcookie | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | mcookie | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | mcookie | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | mcookie | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | flock | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | ssl_client | CVE-2021-42374 | 中危 | 1.33.1-r3 | 1.33.1-r4 | busybox: out-of-bounds read in unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42374 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42375 | 中危 | 1.33.1-r3 | 1.33.1-r5 | busybox: incorrect handling of a special element in ash applet leads to denial of service when processing a crafted shell command 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42375 镜像层: sha256:bc276c40b172b1c5467277d36db5308a203a48262d5f278766cf083947d05466 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | util-linux | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | util-linux | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | util-linux | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | util-linux | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | uuidgen | CVE-2021-37600 | 中危 | 2.37-r0 | 2.37.2-r0 | util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15 | 
                            
                            
                                | uuidgen | CVE-2021-3995 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | uuidgen | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | uuidgen | CVE-2022-0563 | 中危 | 2.37-r0 | 2.37.4-r0 | util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15 | 
                            
                            
                                | flock | CVE-2021-3996 | 中危 | 2.37-r0 | 2.37.3-r0 | util-linux: Unauthorized unmount of filesystems in libmount 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35 | 
                            
                            
                                | net-snmp-agent-libs | CVE-2022-24805 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: A buffer overflow in the handling of the INDEX of             NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24805 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-agent-libs | CVE-2022-24806 | 中危 | 5.9-r4 | 5.9.3-r0 | net-snmp: Improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24806 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2024-04-16 20:15 修改: 2024-04-17 12:48 | 
                            
                            
                                | net-snmp-libs | CVE-2015-8100 | 低危 | 5.9-r4 | 5.9.3-r1 | CVE-2015-8100 affecting package net-snmp 5.8-4 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8100 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2015-11-10 03:59 修改: 2016-12-07 18:26 | 
                            
                            
                                | libcurl | CVE-2022-35252 | 低危 | 7.78.0-r0 | 7.79.1-r3 | curl: Incorrect handling of control code characters in cookies 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | postgresql-client | CVE-2022-41862 | 低危 | 13.3-r0 | 13.10-r0 | postgresql: Client memory disclosure when connecting with Kerberos to modified server 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41862 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-03 16:15 修改: 2023-04-27 15:15 | 
                            
                            
                                | libpq | CVE-2022-41862 | 低危 | 13.3-r0 | 13.10-r0 | postgresql: Client memory disclosure when connecting with Kerberos to modified server 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41862 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-03 16:15 修改: 2023-04-27 15:15 | 
                            
                            
                                | postgresql-contrib | CVE-2022-41862 | 低危 | 13.3-r0 | 13.10-r0 | postgresql: Client memory disclosure when connecting with Kerberos to modified server 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41862 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-03 16:15 修改: 2023-04-27 15:15 | 
                            
                            
                                | curl | CVE-2022-35252 | 低危 | 7.78.0-r0 | 7.79.1-r3 | curl: Incorrect handling of control code characters in cookies 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00 | 
                            
                            
                                | net-snmp-tools | CVE-2015-8100 | 低危 | 5.9-r4 | 5.9.3-r1 | CVE-2015-8100 affecting package net-snmp 5.8-4 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8100 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2015-11-10 03:59 修改: 2016-12-07 18:26 | 
                            
                            
                                | net-snmp-agent-libs | CVE-2015-8100 | 低危 | 5.9-r4 | 5.9.3-r1 | CVE-2015-8100 affecting package net-snmp 5.8-4 漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8100 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2015-11-10 03:59 修改: 2016-12-07 18:26 | 
                            
                            
                                | postgresql | CVE-2022-41862 | 低危 | 13.3-r0 | 13.10-r0 | postgresql: Client memory disclosure when connecting with Kerberos to modified server 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41862 镜像层: sha256:a59e5a6ab44c1b2ed1afea4e2f931ef547f4bf63c6fdd8285b67fe8a5a2ce99f 发布日期: 2023-03-03 16:15 修改: 2023-04-27 15:15 |