| gnutls |
CVE-2026-33845 |
严重 |
3.8.12-r0 |
3.8.13-r0 |
gnutls: GnuTLS: Denial of Service via DTLS zero-length fragment
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33845
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-30 18:16 修改: 2026-05-05 03:03
|
| libcrypto3 |
CVE-2026-31789 |
严重 |
3.3.6-r0 |
3.3.7-r0 |
openssl: OpenSSL: Heap buffer overflow on 32-bit systems from large X.509 certificate processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31789
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-31789 |
严重 |
3.3.6-r0 |
3.3.7-r0 |
openssl: OpenSSL: Heap buffer overflow on 32-bit systems from large X.509 certificate processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31789
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| gnutls |
CVE-2026-3833 |
高危 |
3.8.12-r0 |
3.8.13-r0 |
gnutls: GnuTLS: Policy bypass due to case-sensitive nameConstraints comparison
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3833
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-30 18:16 修改: 2026-05-07 02:09
|
| gnutls |
CVE-2026-42010 |
高危 |
3.8.12-r0 |
3.8.13-r0 |
gnutls: gnutls: Authentication Bypass via NUL Character in Username
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42010
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-05-07 12:16 修改: 2026-05-07 15:16
|
| gnutls |
CVE-2026-42011 |
高危 |
3.8.12-r0 |
3.8.13-r0 |
gnutls: gnutls: Security bypass due to incorrect name constraint handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42011
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-05-07 15:16 修改: 2026-05-07 15:48
|
| lcms2 |
CVE-2026-41254 |
高危 |
2.16-r0 |
2.19-r0 |
Little CMS: lcms2: mm2/Little-CMS: Little CMS: Information disclosure or denial of service via integer overflow in CubeSize
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41254
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-18 07:16 修改: 2026-05-07 18:16
|
| libcap2 |
CVE-2026-4878 |
高危 |
2.70-r0 |
2.78-r0 |
libcap: libcap: Privilege escalation via TOCTOU race condition in cap_set_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4878
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-09 16:16 修改: 2026-05-07 22:16
|
| cups-libs |
CVE-2026-34980 |
高危 |
2.4.16-r0 |
2.4.18-r0 |
cups: OpenPrinting CUPS: Shared PostScript queue lets anonymous Print-Job requests reach `lp` code execution over the network
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34980
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-03 22:16 修改: 2026-04-16 18:28
|
| libcrypto3 |
CVE-2026-28387 |
高危 |
3.3.6-r0 |
3.3.7-r0 |
openssl: OpenSSL: Arbitrary code execution due to use-after-free in DANE TLSA authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28387
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-28388 |
高危 |
3.3.6-r0 |
3.3.7-r0 |
openssl: OpenSSL: Denial of Service due to NULL pointer dereference in delta CRL processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28388
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-28389 |
高危 |
3.3.6-r0 |
3.3.7-r0 |
openssl: OpenSSL: Denial of Service vulnerability in CMS processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28389
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libcrypto3 |
CVE-2026-28390 |
高危 |
3.3.6-r0 |
3.3.7-r0 |
openssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28390
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| gnutls |
CVE-2026-33846 |
高危 |
3.8.12-r0 |
3.8.13-r0 |
gnutls: GnuTLS: Denial of Service via heap buffer overflow in DTLS handshake fragment reassembly
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33846
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-05-04 10:15 修改: 2026-05-04 15:22
|
| libssl3 |
CVE-2026-28387 |
高危 |
3.3.6-r0 |
3.3.7-r0 |
openssl: OpenSSL: Arbitrary code execution due to use-after-free in DANE TLSA authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28387
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-28388 |
高危 |
3.3.6-r0 |
3.3.7-r0 |
openssl: OpenSSL: Denial of Service due to NULL pointer dereference in delta CRL processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28388
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-28389 |
高危 |
3.3.6-r0 |
3.3.7-r0 |
openssl: OpenSSL: Denial of Service vulnerability in CMS processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28389
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| libssl3 |
CVE-2026-28390 |
高危 |
3.3.6-r0 |
3.3.7-r0 |
openssl: OpenSSL: Denial of Service due to NULL pointer dereference in CMS EnvelopedData processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-28390
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| musl |
CVE-2026-40200 |
高危 |
1.2.5-r1 |
1.2.5-r3 |
musl: musl libc: Arbitrary code execution and denial of service via stack-based memory corruption in qsort
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40200
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-10 17:17 修改: 2026-04-27 19:18
|
| musl-dev |
CVE-2026-40200 |
高危 |
1.2.5-r1 |
1.2.5-r3 |
musl: musl libc: Arbitrary code execution and denial of service via stack-based memory corruption in qsort
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40200
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-10 17:17 修改: 2026-04-27 19:18
|
| musl-utils |
CVE-2026-40200 |
高危 |
1.2.5-r1 |
1.2.5-r3 |
musl: musl libc: Arbitrary code execution and denial of service via stack-based memory corruption in qsort
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40200
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-10 17:17 修改: 2026-04-27 19:18
|
| zlib |
CVE-2026-22184 |
高危 |
1.3.1-r1 |
1.3.2-r0 |
zlib: zlib: Arbitrary code execution via buffer overflow in untgz utility
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22184
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-01-07 21:16 修改: 2026-03-18 16:26
|
| cups-libs |
CVE-2026-34978 |
中危 |
2.4.16-r0 |
2.4.18-r0 |
cups: OpenPrinting CUPS: Denial of Service via path traversal in RSS notifier
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34978
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-03 22:16 修改: 2026-04-16 18:29
|
| cups-libs |
CVE-2026-34979 |
中危 |
2.4.16-r0 |
2.4.18-r0 |
cups: OpenPrinting CUPS: Denial of Service via heap-based buffer overflow in job attribute processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34979
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-03 22:16 修改: 2026-04-16 18:28
|
| cups-libs |
CVE-2026-34990 |
中危 |
2.4.16-r0 |
2.4.18-r0 |
cups: OpenPrinting CUPS: Privilege escalation via arbitrary file overwrite due to coerced authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34990
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-03 22:16 修改: 2026-04-16 18:15
|
| cups-libs |
CVE-2026-39314 |
中危 |
2.4.16-r0 |
2.4.18-r0 |
cups: CUPS: Denial of Service via integer underflow in IPP attribute handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39314
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-07 17:16 修改: 2026-04-16 18:13
|
| libssl3 |
CVE-2026-31790 |
中危 |
3.3.6-r0 |
3.3.7-r0 |
openssl: openssl: Information Disclosure from Uninitialized Memory via Invalid RSA Public Key
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31790
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| cups-libs |
CVE-2026-39316 |
中危 |
2.4.16-r0 |
2.4.18-r0 |
cups: CUPS: Denial of Service and potential arbitrary code execution via use-after-free vulnerability when deleting temporary printers.
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39316
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-07 17:16 修改: 2026-04-16 18:08
|
| musl |
CVE-2026-6042 |
中危 |
1.2.5-r1 |
1.2.5-r2 |
musl libc: GB18030 4-byte Decoder: musl libc: Denial of Service via inefficient algorithmic complexity in iconv
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6042
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-10 09:16 修改: 2026-04-24 18:01
|
| libcrypto3 |
CVE-2026-31790 |
中危 |
3.3.6-r0 |
3.3.7-r0 |
openssl: openssl: Information Disclosure from Uninitialized Memory via Invalid RSA Public Key
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-31790
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-07 22:16 修改: 2026-05-12 13:17
|
| musl-dev |
CVE-2026-6042 |
中危 |
1.2.5-r1 |
1.2.5-r2 |
musl libc: GB18030 4-byte Decoder: musl libc: Denial of Service via inefficient algorithmic complexity in iconv
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6042
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-10 09:16 修改: 2026-04-24 18:01
|
| libpng |
CVE-2026-34757 |
中危 |
1.6.56-r0 |
1.6.57-r0 |
libpng: libpng: Information disclosure and data corruption via use-after-free vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34757
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-09 15:16 修改: 2026-05-09 11:16
|
| musl-utils |
CVE-2026-6042 |
中危 |
1.2.5-r1 |
1.2.5-r2 |
musl libc: GB18030 4-byte Decoder: musl libc: Denial of Service via inefficient algorithmic complexity in iconv
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6042
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-04-10 09:16 修改: 2026-04-24 18:01
|
| xz-libs |
CVE-2026-34743 |
中危 |
5.6.2-r1 |
5.8.3-r0 |
xz: XZ Utils: Denial of Service via buffer overflow in index decoding
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34743
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-02 19:21 修改: 2026-04-15 17:33
|
| cups-libs |
CVE-2026-27447 |
中危 |
2.4.16-r0 |
2.4.18-r0 |
cups: OpenPrinting CUPS: Authorization bypass via case-insensitive username comparison
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27447
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:20
|
| zlib |
CVE-2026-27171 |
中危 |
1.3.1-r1 |
1.3.2-r0 |
zlib: zlib: Denial of Service via infinite loop in CRC32 combine functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27171
镜像层: sha256:a0382e5f265a99100e18acf851427f0168091b54548c0fd0b6f83d4b78bfeade
发布日期: 2026-02-18 04:16 修改: 2026-03-25 21:27
|
| gnutls |
CVE-2026-3832 |
低危 |
3.8.12-r0 |
3.8.13-r0 |
gnutls: gnutls: Security bypass allows acceptance of revoked server certificates via crafted OCSP response
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3832
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 2026-04-30 18:16 修改: 2026-05-11 19:15
|
| gnutls |
CVE-2026-42014 |
未知 |
3.8.12-r0 |
3.8.13-r0 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42014
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| gnutls |
CVE-2026-42015 |
未知 |
3.8.12-r0 |
3.8.13-r0 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42015
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| gnutls |
CVE-2026-5260 |
未知 |
3.8.12-r0 |
3.8.13-r0 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5260
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| gnutls |
CVE-2026-5419 |
未知 |
3.8.12-r0 |
3.8.13-r0 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5419
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| gnutls |
CVE-2026-42009 |
未知 |
3.8.12-r0 |
3.8.13-r0 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42009
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| gnutls |
CVE-2026-42012 |
未知 |
3.8.12-r0 |
3.8.13-r0 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42012
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| gnutls |
CVE-2026-42013 |
未知 |
3.8.12-r0 |
3.8.13-r0 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42013
镜像层: sha256:cb856a18ce3235c06564dcec1f0da8ac8d599ce247eb1007d54fa15e5903b885
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|