aspell |
CVE-2019-20433 |
严重 |
0.60.7~20110707.2-1+dde |
|
aspell: UCS-2 and UCS-4 null-terminated string handling OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20433
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2020-01-27 15:15 修改: 2020-01-31 15:32
|
busybox |
CVE-2021-42377 |
严重 |
1:1.30.1.2-1+dde |
|
busybox: an attacker-controlled pointer free in hush applet leads to denial of service and possible code execution when processing a crafted shell command
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42377
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2022-48174 |
严重 |
1:1.30.1.2-1+dde |
|
busybox: stack overflow vulnerability in ash.c leads to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48174
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-22 19:16 修改: 2023-08-28 18:53
|
dpkg |
CVE-2022-1664 |
严重 |
1.19.7-1+eagle |
1.19.8 |
Dpkg::Source::Archive in dpkg, the Debian package management system, b ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1664
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-05-26 14:15 修改: 2022-12-03 02:19
|
dpkg-dev |
CVE-2022-1664 |
严重 |
1.19.7-1+eagle |
1.19.8 |
Dpkg::Source::Archive in dpkg, the Debian package management system, b ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1664
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-05-26 14:15 修改: 2022-12-03 02:19
|
libaom0 |
CVE-2023-6879 |
严重 |
1.0.0.1-1+dde |
|
aom: heap-buffer-overflow on frame size change
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6879
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-12-27 23:15 修改: 2024-02-02 02:27
|
libaom0 |
CVE-2024-5171 |
严重 |
1.0.0.1-1+dde |
|
libaom: Integer overflow in internal function img_alloc_helper
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5171
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-05 20:15 修改: 2024-07-23 18:09
|
libarchive13 |
CVE-2022-36227 |
严重 |
3.3.3-4+deb10u1 |
3.3.3-4+deb10u3 |
libarchive: NULL pointer dereference in archive_write.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36227
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-11-22 02:15 修改: 2024-03-27 16:04
|
libaspell15 |
CVE-2019-20433 |
严重 |
0.60.7~20110707.2-1+dde |
|
aspell: UCS-2 and UCS-4 null-terminated string handling OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20433
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2020-01-27 15:15 修改: 2020-01-31 15:32
|
libbasicusageenvironment1 |
CVE-2020-24027 |
严重 |
2018.11.26.1-1+eagle |
|
In Live Networks, Inc., liblivemedia version 20200625, there is a pote ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24027
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-01-11 20:15 修改: 2021-01-13 19:49
|
libbasicusageenvironment1 |
CVE-2023-37117 |
严重 |
2018.11.26.1-1+eagle |
|
A heap-use-after-free vulnerability was found in live555 version 2023. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37117
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-01-12 07:15 修改: 2024-09-03 19:35
|
libdb5.3 |
CVE-2019-8457 |
严重 |
5.3.28+dfsg1-0.5 |
|
sqlite: heap out-of-bound read in function rtreenode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8457
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-05-30 16:29 修改: 2023-11-07 03:13
|
libdpkg-perl |
CVE-2022-1664 |
严重 |
1.19.7-1+eagle |
1.19.8 |
Dpkg::Source::Archive in dpkg, the Debian package management system, b ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1664
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-05-26 14:15 修改: 2022-12-03 02:19
|
libexpat1 |
CVE-2022-22822 |
严重 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in addBinding in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22822
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-01-10 14:12 修改: 2022-10-06 15:29
|
libexpat1 |
CVE-2022-22823 |
严重 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in build_model in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22823
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47
|
libexpat1 |
CVE-2022-22824 |
严重 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in defineAttribute in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22824
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47
|
libexpat1 |
CVE-2022-23852 |
严重 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in function XML_GetBuffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23852
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-01-24 02:15 修改: 2022-10-29 02:44
|
libexpat1 |
CVE-2022-25235 |
严重 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u3 |
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25235
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-02-16 01:15 修改: 2023-11-07 03:44
|
libexpat1 |
CVE-2022-25236 |
严重 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u3 |
expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25236
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-02-16 01:15 修改: 2023-11-07 03:44
|
libexpat1 |
CVE-2022-25315 |
严重 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u3 |
expat: Integer overflow in storeRawNames()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25315
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44
|
libexpat1 |
CVE-2024-45491 |
严重 |
2.2.6-2+deb10u1 |
|
libexpat: Integer Overflow or Wraparound
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28
|
libexpat1 |
CVE-2024-45492 |
严重 |
2.2.6-2+deb10u1 |
|
libexpat: integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28
|
libfreeimage3 |
CVE-2024-31570 |
严重 |
3.18.0+ds2-1+deb10u1 |
|
libfreeimage in FreeImage 3.4.0 through 3.18.0 has a stack-based buffe ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31570
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-09-19 17:15 修改: 2024-09-25 14:57
|
libfreetype6 |
CVE-2022-27404 |
严重 |
2.9.1-3+deb10u2 |
2.9.1-3+deb10u3 |
FreeType: Buffer overflow in sfnt_init_face
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27404
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34
|
libgroupsock8 |
CVE-2020-24027 |
严重 |
2018.11.26.1-1+eagle |
|
In Live Networks, Inc., liblivemedia version 20200625, there is a pote ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24027
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-01-11 20:15 修改: 2021-01-13 19:49
|
libgroupsock8 |
CVE-2023-37117 |
严重 |
2018.11.26.1-1+eagle |
|
A heap-use-after-free vulnerability was found in live555 version 2023. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37117
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-01-12 07:15 修改: 2024-09-03 19:35
|
libgssapi-krb5-2 |
CVE-2024-37371 |
严重 |
1.17.4-1+eagle |
|
krb5: GSS message token handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39
|
libixml10 |
CVE-2021-29462 |
严重 |
1:1.8.4-2 |
|
The Portable SDK for UPnP Devices is an SDK for development of UPnP de ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29462
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-04-20 21:15 修改: 2022-08-03 10:20
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-40397 |
严重 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary javascript code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40397
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-09-06 21:15 修改: 2024-01-05 14:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-40414 |
严重 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40414
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-01-10 22:15 修改: 2024-02-06 02:15
|
libk5crypto3 |
CVE-2024-37371 |
严重 |
1.17.4-1+eagle |
|
krb5: GSS message token handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39
|
libkrb5-3 |
CVE-2024-37371 |
严重 |
1.17.4-1+eagle |
|
krb5: GSS message token handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39
|
libkrb5support0 |
CVE-2024-37371 |
严重 |
1.17.4-1+eagle |
|
krb5: GSS message token handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39
|
libksba8 |
CVE-2022-3515 |
严重 |
1.3.5-2 |
1.3.5-2+deb10u1 |
libksba: integer overflow may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3515
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-01-12 15:15 修改: 2023-07-06 19:15
|
libksba8 |
CVE-2022-47629 |
严重 |
1.3.5-2 |
1.3.5-2+deb10u2 |
libksba: integer overflow to code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47629
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-12-20 23:15 修改: 2023-11-07 03:56
|
liblivemedia64 |
CVE-2020-24027 |
严重 |
2018.11.26.1-1+eagle |
|
In Live Networks, Inc., liblivemedia version 20200625, there is a pote ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24027
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-01-11 20:15 修改: 2021-01-13 19:49
|
liblivemedia64 |
CVE-2023-37117 |
严重 |
2018.11.26.1-1+eagle |
|
A heap-use-after-free vulnerability was found in live555 version 2023. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37117
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-01-12 07:15 修改: 2024-09-03 19:35
|
libmysofa0 |
CVE-2021-3756 |
严重 |
0.6~dfsg0.2-1+security |
|
libmysofa is vulnerable to Heap-based Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3756
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-10-29 16:15 修改: 2023-11-07 03:38
|
libsmbclient |
CVE-2020-1472 |
严重 |
2:4.9.5.18-1+dde |
|
samba: Netlogon elevation of privilege vulnerability (Zerologon)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1472
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-08-17 19:15 修改: 2024-05-23 17:56
|
libsmbclient |
CVE-2022-44640 |
严重 |
2:4.9.5.18-1+dde |
|
Heimdal before 7.7.1 allows remote attackers to execute arbitrary code ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44640
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-25 05:15 修改: 2023-10-08 09:15
|
libsmbclient |
CVE-2022-45141 |
严重 |
2:4.9.5.18-1+dde |
|
samba: Samba AD DC using Heimdal can be forced to issue rc4-hmac encrypted Kerberos tickets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45141
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-06 23:15 修改: 2023-09-17 09:15
|
libssl1.1 |
CVE-2022-1292 |
严重 |
1.1.1d.6-1 |
1.1.1n-0+deb10u2 |
openssl: c_rehash script allows command injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1292
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-05-03 16:15 修改: 2023-11-07 03:41
|
libssl1.1 |
CVE-2022-2068 |
严重 |
1.1.1d.6-1 |
1.1.1n-0+deb10u3 |
openssl: the c_rehash script allows command injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2068
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-06-21 15:15 修改: 2023-11-07 03:46
|
libtasn1-6 |
CVE-2021-46848 |
严重 |
4.13-3 |
4.13-3+deb10u1 |
libtasn1: Out-of-bound access in ETYPE_OK
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46848
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-10-24 14:15 修改: 2023-11-07 03:40
|
libupnp13 |
CVE-2021-29462 |
严重 |
1:1.8.4-2 |
|
The Portable SDK for UPnP Devices is an SDK for development of UPnP de ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29462
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-04-20 21:15 修改: 2022-08-03 10:20
|
libusageenvironment3 |
CVE-2020-24027 |
严重 |
2018.11.26.1-1+eagle |
|
In Live Networks, Inc., liblivemedia version 20200625, there is a pote ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24027
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-01-11 20:15 修改: 2021-01-13 19:49
|
libusageenvironment3 |
CVE-2023-37117 |
严重 |
2018.11.26.1-1+eagle |
|
A heap-use-after-free vulnerability was found in live555 version 2023. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37117
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-01-12 07:15 修改: 2024-09-03 19:35
|
libvlc5 |
CVE-2023-47359 |
严重 |
3.0.11.2-1 |
3.0.20-0+deb10u1 |
Videolan VLC prior to version 3.0.20 contains an incorrect offset read ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47359
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-07 16:15 修改: 2023-12-01 02:15
|
libvlccore9 |
CVE-2023-47359 |
严重 |
3.0.11.2-1 |
3.0.20-0+deb10u1 |
Videolan VLC prior to version 3.0.20 contains an incorrect offset read ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47359
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-07 16:15 修改: 2023-12-01 02:15
|
libwbclient0 |
CVE-2020-1472 |
严重 |
2:4.9.5.18-1+dde |
|
samba: Netlogon elevation of privilege vulnerability (Zerologon)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1472
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-08-17 19:15 修改: 2024-05-23 17:56
|
libwbclient0 |
CVE-2022-44640 |
严重 |
2:4.9.5.18-1+dde |
|
Heimdal before 7.7.1 allows remote attackers to execute arbitrary code ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44640
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-25 05:15 修改: 2023-10-08 09:15
|
libwbclient0 |
CVE-2022-45141 |
严重 |
2:4.9.5.18-1+dde |
|
samba: Samba AD DC using Heimdal can be forced to issue rc4-hmac encrypted Kerberos tickets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45141
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-06 23:15 修改: 2023-09-17 09:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-40397 |
严重 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary javascript code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40397
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-09-06 21:15 修改: 2024-01-05 14:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-40414 |
严重 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40414
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-01-10 22:15 修改: 2024-02-06 02:15
|
libzbar0 |
CVE-2023-40889 |
严重 |
0.22-1 |
0.22-1+deb10u1 |
A heap-based buffer overflow exists in the qr_reader_match_centers fun ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40889
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-29 17:15 修改: 2024-01-18 03:15
|
libzbar0 |
CVE-2023-40890 |
严重 |
0.22-1 |
0.22-1+deb10u1 |
A stack-based buffer overflow vulnerability exists in the lookup_seque ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40890
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-29 17:15 修改: 2024-01-18 03:15
|
libzmq5 |
CVE-2021-20236 |
严重 |
4.3.1.2-1 |
|
zeromq: Stack overflow on server running PUB/XPUB socket
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20236
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-28 11:15 修改: 2023-11-07 03:29
|
openssl |
CVE-2022-1292 |
严重 |
1.1.1d.6-1 |
1.1.1n-0+deb10u2 |
openssl: c_rehash script allows command injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1292
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-05-03 16:15 修改: 2023-11-07 03:41
|
openssl |
CVE-2022-2068 |
严重 |
1.1.1d.6-1 |
1.1.1n-0+deb10u3 |
openssl: the c_rehash script allows command injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2068
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-06-21 15:15 修改: 2023-11-07 03:46
|
samba-libs |
CVE-2020-1472 |
严重 |
2:4.9.5.18-1+dde |
|
samba: Netlogon elevation of privilege vulnerability (Zerologon)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1472
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-08-17 19:15 修改: 2024-05-23 17:56
|
samba-libs |
CVE-2022-44640 |
严重 |
2:4.9.5.18-1+dde |
|
Heimdal before 7.7.1 allows remote attackers to execute arbitrary code ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44640
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-25 05:15 修改: 2023-10-08 09:15
|
samba-libs |
CVE-2022-45141 |
严重 |
2:4.9.5.18-1+dde |
|
samba: Samba AD DC using Heimdal can be forced to issue rc4-hmac encrypted Kerberos tickets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45141
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-06 23:15 修改: 2023-09-17 09:15
|
vlc-data |
CVE-2023-47359 |
严重 |
3.0.11.2-1 |
3.0.20-0+deb10u1 |
Videolan VLC prior to version 3.0.20 contains an incorrect offset read ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47359
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-07 16:15 修改: 2023-12-01 02:15
|
vlc-plugin-base |
CVE-2023-47359 |
严重 |
3.0.11.2-1 |
3.0.20-0+deb10u1 |
Videolan VLC prior to version 3.0.20 contains an incorrect offset read ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47359
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-07 16:15 修改: 2023-12-01 02:15
|
vlc-plugin-video-output |
CVE-2023-47359 |
严重 |
3.0.11.2-1 |
3.0.20-0+deb10u1 |
Videolan VLC prior to version 3.0.20 contains an incorrect offset read ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47359
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-07 16:15 修改: 2023-12-01 02:15
|
wpasupplicant |
CVE-2022-23303 |
严重 |
2:2.7.5-1+dde |
|
wpa_supplicant: SAE side channel attacks as a result of cache access patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23303
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-17 02:15 修改: 2023-11-07 03:44
|
wpasupplicant |
CVE-2022-23304 |
严重 |
2:2.7.5-1+dde |
|
wpa_supplicant: EAP-pwd side-channel attacks as a result of cache access patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23304
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-17 02:15 修改: 2023-11-07 03:44
|
zlib1g |
CVE-2023-45853 |
严重 |
1:1.2.12.1-1+eagle |
|
zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45853
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-10-14 02:15 修改: 2024-08-01 13:44
|
zlib1g-dev |
CVE-2023-45853 |
严重 |
1:1.2.12.1-1+eagle |
|
zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45853
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-10-14 02:15 修改: 2024-08-01 13:44
|
libavdevice58 |
CVE-2020-21688 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the av_freep function in libavutil/mem.c of F ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21688
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libavdevice58 |
CVE-2022-3109 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
An issue was discovered in the FFmpeg package, where vp3_decode_frame ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3109
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-16 15:15 修改: 2023-11-07 03:50
|
libavdevice58 |
CVE-2022-48434 |
高危 |
7:4.1.8.1-1+dde |
|
libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48434
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-29 17:15 修改: 2024-10-21 16:35
|
libavdevice58 |
CVE-2024-32230 |
高危 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size- ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32230
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-08-22 13:24
|
libavdevice58 |
CVE-2024-7272 |
高危 |
7:4.1.8.1-1+dde |
|
A vulnerability, which was classified as critical, was found in FFmpeg ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7272
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-12 13:38 修改: 2024-08-13 15:16
|
libavfilter7 |
CVE-2020-20891 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Buffer Overflow vulnerability in function config_input in libavfilter/ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20891
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:49
|
libavfilter7 |
CVE-2020-20892 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function filter_frame in libavfilter/vf_len ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20892
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2023-11-07 03:19
|
libavfilter7 |
CVE-2020-20896 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function latm_write_packet in libavformat/l ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20896
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:46
|
libavfilter7 |
CVE-2020-21688 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the av_freep function in libavutil/mem.c of F ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21688
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libavfilter7 |
CVE-2022-3109 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
An issue was discovered in the FFmpeg package, where vp3_decode_frame ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3109
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-16 15:15 修改: 2023-11-07 03:50
|
libavfilter7 |
CVE-2022-48434 |
高危 |
7:4.1.8.1-1+dde |
|
libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48434
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-29 17:15 修改: 2024-10-21 16:35
|
libavfilter7 |
CVE-2024-32230 |
高危 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size- ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32230
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-08-22 13:24
|
libavfilter7 |
CVE-2024-7272 |
高危 |
7:4.1.8.1-1+dde |
|
A vulnerability, which was classified as critical, was found in FFmpeg ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7272
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-12 13:38 修改: 2024-08-13 15:16
|
libavformat58 |
CVE-2020-20891 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Buffer Overflow vulnerability in function config_input in libavfilter/ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20891
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:49
|
libavformat58 |
CVE-2020-20892 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function filter_frame in libavfilter/vf_len ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20892
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2023-11-07 03:19
|
libavformat58 |
CVE-2020-20896 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function latm_write_packet in libavformat/l ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20896
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:46
|
libavformat58 |
CVE-2020-21688 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the av_freep function in libavutil/mem.c of F ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21688
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libavformat58 |
CVE-2022-3109 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
An issue was discovered in the FFmpeg package, where vp3_decode_frame ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3109
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-16 15:15 修改: 2023-11-07 03:50
|
libavformat58 |
CVE-2022-48434 |
高危 |
7:4.1.8.1-1+dde |
|
libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48434
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-29 17:15 修改: 2024-10-21 16:35
|
libavformat58 |
CVE-2024-32230 |
高危 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size- ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32230
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-08-22 13:24
|
libavformat58 |
CVE-2024-7272 |
高危 |
7:4.1.8.1-1+dde |
|
A vulnerability, which was classified as critical, was found in FFmpeg ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7272
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-12 13:38 修改: 2024-08-13 15:16
|
libavresample4 |
CVE-2020-20891 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Buffer Overflow vulnerability in function config_input in libavfilter/ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20891
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:49
|
libavresample4 |
CVE-2020-20892 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function filter_frame in libavfilter/vf_len ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20892
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2023-11-07 03:19
|
libavresample4 |
CVE-2020-20896 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function latm_write_packet in libavformat/l ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20896
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:46
|
libavresample4 |
CVE-2020-21688 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the av_freep function in libavutil/mem.c of F ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21688
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libavresample4 |
CVE-2022-3109 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
An issue was discovered in the FFmpeg package, where vp3_decode_frame ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3109
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-16 15:15 修改: 2023-11-07 03:50
|
libavresample4 |
CVE-2022-48434 |
高危 |
7:4.1.8.1-1+dde |
|
libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48434
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-29 17:15 修改: 2024-10-21 16:35
|
libavresample4 |
CVE-2024-32230 |
高危 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size- ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32230
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-08-22 13:24
|
libavresample4 |
CVE-2024-7272 |
高危 |
7:4.1.8.1-1+dde |
|
A vulnerability, which was classified as critical, was found in FFmpeg ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7272
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-12 13:38 修改: 2024-08-13 15:16
|
libavutil56 |
CVE-2020-20891 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Buffer Overflow vulnerability in function config_input in libavfilter/ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20891
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:49
|
libavutil56 |
CVE-2020-20892 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function filter_frame in libavfilter/vf_len ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20892
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2023-11-07 03:19
|
libavutil56 |
CVE-2020-20896 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function latm_write_packet in libavformat/l ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20896
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:46
|
libavutil56 |
CVE-2020-21688 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the av_freep function in libavutil/mem.c of F ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21688
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libavutil56 |
CVE-2022-3109 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
An issue was discovered in the FFmpeg package, where vp3_decode_frame ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3109
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-16 15:15 修改: 2023-11-07 03:50
|
libavutil56 |
CVE-2022-48434 |
高危 |
7:4.1.8.1-1+dde |
|
libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48434
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-29 17:15 修改: 2024-10-21 16:35
|
libavutil56 |
CVE-2024-32230 |
高危 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size- ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32230
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-08-22 13:24
|
libavutil56 |
CVE-2024-7272 |
高危 |
7:4.1.8.1-1+dde |
|
A vulnerability, which was classified as critical, was found in FFmpeg ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7272
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-12 13:38 修改: 2024-08-13 15:16
|
busybox |
CVE-2021-42378 |
高危 |
1:1.30.1.2-1+dde |
|
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42378
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2021-42379 |
高危 |
1:1.30.1.2-1+dde |
|
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42379
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
libbasicusageenvironment1 |
CVE-2021-28899 |
高危 |
2018.11.26.1-1+eagle |
|
Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileS ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28899
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-04-29 15:15 修改: 2021-05-11 20:07
|
libbasicusageenvironment1 |
CVE-2021-38380 |
高危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 mishandles huge requests for the same MP3 stream, ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38380
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 18:15 修改: 2023-11-07 03:37
|
libbasicusageenvironment1 |
CVE-2021-39282 |
高危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 has a memory leak in AC3AudioStreamParser for AC3 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39282
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-18 17:15 修改: 2023-11-07 03:37
|
libbasicusageenvironment1 |
CVE-2021-41396 |
高危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 does not handle socket connections properly. A hu ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41396
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-07-12 14:15 修改: 2022-07-18 18:59
|
libblkid-dev |
CVE-2024-28085 |
高危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35
|
libblkid1 |
CVE-2024-28085 |
高危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35
|
libbluetooth3 |
CVE-2023-44431 |
高危 |
5.50.22-1+dde |
|
bluez: AVRCP stack-based buffer overflow remote code execution vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44431
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:15 修改: 2024-05-03 12:48
|
libbluetooth3 |
CVE-2023-50229 |
高危 |
5.50.22-1+dde |
|
bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50229
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48
|
libbluetooth3 |
CVE-2023-50230 |
高危 |
5.50.22-1+dde |
|
bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50230
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48
|
libbluetooth3 |
CVE-2023-51596 |
高危 |
5.50.22-1+dde |
|
bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51596
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48
|
libc-bin |
CVE-2020-1751 |
高危 |
2.28.17-1+eagle |
|
glibc: array overflow in backtrace functions for powerpc
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2020-04-17 19:15 修改: 2023-11-07 03:19
|
libc-dev-bin |
CVE-2020-1751 |
高危 |
2.28.17-1+eagle |
|
glibc: array overflow in backtrace functions for powerpc
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-04-17 19:15 修改: 2023-11-07 03:19
|
libc-l10n |
CVE-2020-1751 |
高危 |
2.28.17-1+eagle |
|
glibc: array overflow in backtrace functions for powerpc
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-04-17 19:15 修改: 2023-11-07 03:19
|
libc6 |
CVE-2020-1751 |
高危 |
2.28.17-1+eagle |
|
glibc: array overflow in backtrace functions for powerpc
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2020-04-17 19:15 修改: 2023-11-07 03:19
|
libc6-dev |
CVE-2020-1751 |
高危 |
2.28.17-1+eagle |
|
glibc: array overflow in backtrace functions for powerpc
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-04-17 19:15 修改: 2023-11-07 03:19
|
libcaca0 |
CVE-2021-30498 |
高危 |
0.99.beta19-2.1 |
0.99.beta19-2.1+deb10u1 |
A flaw was found in libcaca. A heap buffer overflow in export.c in fun ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30498
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-26 22:15 修改: 2024-04-07 10:15
|
libcaca0 |
CVE-2021-30499 |
高危 |
0.99.beta19-2.1 |
0.99.beta19-2.1+deb10u1 |
A flaw was found in libcaca. A buffer overflow of export.c in function ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30499
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-27 00:15 修改: 2024-04-07 10:15
|
libcaca0 |
CVE-2021-3410 |
高危 |
0.99.beta19-2.1 |
|
A flaw was found in libcaca v0.99.beta19. A buffer overflow issue in c ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3410
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-02-23 23:15 修改: 2023-11-07 03:37
|
libcc1-0 |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libcc1-0 |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
libcom-err2 |
CVE-2022-1304 |
高危 |
1.44.5-1+deb10u3 |
|
e2fsprogs: out-of-bounds read/write via crafted filesystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-04-14 21:15 修改: 2023-11-07 03:41
|
libcrypto++6 |
CVE-2022-48570 |
高危 |
5.6.4-8 |
|
Crypto++ through 8.4 contains a timing side channel in ECDSA signature ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48570
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:21
|
libcrypto++6 |
CVE-2023-50980 |
高危 |
5.6.4-8 |
|
gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50980
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-12-18 04:15 修改: 2023-12-27 19:04
|
libcrypto++6 |
CVE-2023-50981 |
高危 |
5.6.4-8 |
|
ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 allows atta ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50981
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-12-18 04:15 修改: 2023-12-27 19:09
|
libcups2 |
CVE-2024-47175 |
高危 |
2.3.0+deepin2.3-1+security |
|
cups: libppd: remote command injection via attacker controlled data in PPD file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47175
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-09-26 22:15 修改: 2024-09-30 12:46
|
libcurl3-gnutls |
CVE-2024-2398 |
高危 |
7.64.1.6-4+security |
|
curl: HTTP/2 push headers memory-leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15
|
libcurl3-gnutls |
CVE-2024-6197 |
高危 |
7.64.1.6-4+security |
|
curl: freeing stack buffer in utf8asn1str
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6197
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-24 08:15 修改: 2024-08-26 15:25
|
libcurl4 |
CVE-2024-2398 |
高危 |
7.64.1.6-4+security |
|
curl: HTTP/2 push headers memory-leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15
|
libcurl4 |
CVE-2024-6197 |
高危 |
7.64.1.6-4+security |
|
curl: freeing stack buffer in utf8asn1str
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6197
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2024-07-24 08:15 修改: 2024-08-26 15:25
|
busybox |
CVE-2021-42380 |
高危 |
1:1.30.1.2-1+dde |
|
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42380
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
libde265-0 |
CVE-2022-47664 |
高危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u4 |
Libde265 1.0.9 is vulnerable to Buffer Overflow in ff_hevc_put_hevc_qp ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47664
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-03-03 15:15 修改: 2023-03-10 19:20
|
libde265-0 |
CVE-2022-47665 |
高危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u4 |
Libde265 1.0.9 has a heap buffer overflow vulnerability in de265_image ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47665
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-03-03 15:15 修改: 2023-03-10 19:22
|
libde265-0 |
CVE-2023-25221 |
高危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u4 |
Libde265 v1.0.10 was discovered to contain a heap-buffer-overflow vuln ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25221
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-03-01 15:15 修改: 2023-03-10 18:23
|
libde265-0 |
CVE-2023-27103 |
高危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u5 |
Libde265 v1.0.11 was discovered to contain a heap buffer overflow via ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27103
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-03-15 15:15 修改: 2023-11-30 19:15
|
libde265-0 |
CVE-2023-43887 |
高危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u5 |
Libde265 v1.0.12 was discovered to contain multiple buffer overflows v ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43887
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-11-22 18:15 修改: 2023-11-30 19:15
|
libde265-0 |
CVE-2023-49465 |
高危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u6 |
Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vuln ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49465
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-12-07 20:15 修改: 2023-12-30 21:15
|
libde265-0 |
CVE-2023-49467 |
高危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u6 |
Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vuln ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49467
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-12-07 20:15 修改: 2023-12-30 21:15
|
libde265-0 |
CVE-2023-49468 |
高危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u6 |
Libde265 v1.0.14 was discovered to contain a global buffer overflow vu ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49468
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-12-07 20:15 修改: 2024-08-28 17:35
|
busybox |
CVE-2021-42381 |
高危 |
1:1.30.1.2-1+dde |
|
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42381
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2021-42382 |
高危 |
1:1.30.1.2-1+dde |
|
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42382
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2021-42383 |
高危 |
1:1.30.1.2-1+dde |
|
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42383
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2021-42384 |
高危 |
1:1.30.1.2-1+dde |
|
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42384
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2021-42385 |
高危 |
1:1.30.1.2-1+dde |
|
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42385
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2021-42386 |
高危 |
1:1.30.1.2-1+dde |
|
busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42386
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2022-28391 |
高危 |
1:1.30.1.2-1+dde |
|
busybox: remote attackers may execute arbitrary code if netstat is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28391
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-04-03 21:15 修改: 2022-08-11 18:44
|
busybox |
CVE-2023-39810 |
高危 |
1:1.30.1.2-1+dde |
|
busybox: CPIO command of Busybox allows attackers to execute a directory traversal
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39810
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-28 19:15 修改: 2023-09-07 13:48
|
cpp-8 |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
cpp-8 |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
libexpat1 |
CVE-2021-45960 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Large number of prefixed XML attributes on a single tag can crash libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45960
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-01-01 19:15 修改: 2022-10-06 19:08
|
libexpat1 |
CVE-2021-46143 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in doProlog in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46143
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-01-06 04:15 修改: 2022-10-06 19:11
|
libexpat1 |
CVE-2022-22825 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in lookup in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22825
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47
|
libexpat1 |
CVE-2022-22826 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in nextScaffoldPart in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22826
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-01-10 14:12 修改: 2022-10-06 12:44
|
libexpat1 |
CVE-2022-22827 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: Integer overflow in storeAtts in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22827
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-01-10 14:12 修改: 2022-10-06 12:52
|
libexpat1 |
CVE-2022-23990 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u2 |
expat: integer overflow in the doProlog function
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23990
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-01-26 19:15 修改: 2023-11-07 03:44
|
libexpat1 |
CVE-2022-25314 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u3 |
expat: Integer overflow in copyString()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25314
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44
|
libexpat1 |
CVE-2022-40674 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u5 |
expat: a use-after-free in the doContent function in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40674
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-09-14 11:15 修改: 2023-11-07 03:52
|
libexpat1 |
CVE-2022-43680 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u6 |
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43680
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-10-24 14:15 修改: 2024-01-21 02:08
|
libexpat1 |
CVE-2023-52425 |
高危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u7 |
expat: parsing large tokens can trigger a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-02-04 20:15 修改: 2024-08-26 20:35
|
libexpat1 |
CVE-2024-45490 |
高危 |
2.2.6-2+deb10u1 |
|
libexpat: Negative Length Parsing Vulnerability in libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24
|
libext2fs2 |
CVE-2022-1304 |
高危 |
1.44.5-1+deb10u3 |
|
e2fsprogs: out-of-bounds read/write via crafted filesystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-04-14 21:15 修改: 2023-11-07 03:41
|
libfaad2 |
CVE-2018-20196 |
高危 |
2.8.8.2-1+security |
2.10.0-1~deb10u1 |
There is a stack-based buffer overflow in the third instance of the ca ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20196
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-12-18 01:29 修改: 2022-04-22 20:40
|
libfaad2 |
CVE-2019-6956 |
高危 |
2.8.8.2-1+security |
2.10.0-1~deb10u1 |
An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6956
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-01-25 16:29 修改: 2022-04-22 20:40
|
libfaad2 |
CVE-2021-32272 |
高危 |
2.8.8.2-1+security |
2.10.0-1~deb10u1 |
An issue was discovered in faad2 before 2.10.0. A heap-buffer-overflow ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32272
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2022-04-22 16:20
|
libfaad2 |
CVE-2021-32273 |
高危 |
2.8.8.2-1+security |
2.10.0-1~deb10u1 |
An issue was discovered in faad2 through 2.10.0. A stack-buffer-overfl ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32273
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2022-04-22 16:21
|
libfaad2 |
CVE-2021-32274 |
高危 |
2.8.8.2-1+security |
2.10.0-1~deb10u1 |
An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32274
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2022-04-22 16:21
|
libfaad2 |
CVE-2021-32277 |
高危 |
2.8.8.2-1+security |
2.10.0-1~deb10u1 |
An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32277
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2022-04-22 16:21
|
libfaad2 |
CVE-2021-32278 |
高危 |
2.8.8.2-1+security |
2.10.0-1~deb10u1 |
An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32278
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2022-04-22 16:21
|
libfdisk1 |
CVE-2024-28085 |
高危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35
|
curl |
CVE-2024-2398 |
高危 |
7.64.1.6-4+security |
|
curl: HTTP/2 push headers memory-leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15
|
libfreeimage3 |
CVE-2019-12212 |
高危 |
3.18.0+ds2-1+deb10u1 |
|
When FreeImage 3.18.0 reads a special JXR file, the StreamCalcIFDSize ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12212
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2019-05-20 16:29 修改: 2020-08-24 17:37
|
libfreeimage3 |
CVE-2019-12214 |
高危 |
3.18.0+ds2-1+deb10u1 |
|
In FreeImage 3.18.0, an out-of-bounds access occurs because of mishand ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12214
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2019-05-20 16:29 修改: 2019-05-21 13:14
|
libfreeimage3 |
CVE-2020-21426 |
高危 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in function C_IStream::read in PluginEXR ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21426
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19
|
libfreeimage3 |
CVE-2020-21427 |
高危 |
3.18.0+ds2-1+deb10u1 |
3.18.0+ds2-1+deb10u2 |
Buffer Overflow vulnerability in function LoadPixelDataRLE8 in PluginB ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21427
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-22 19:16 修改: 2023-12-18 05:15
|
libfreeimage3 |
CVE-2020-21428 |
高危 |
3.18.0+ds2-1+deb10u1 |
3.18.0+ds2-1+deb10u2 |
Buffer Overflow vulnerability in function LoadRGB in PluginDDS.cpp in ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21428
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-22 19:16 修改: 2023-12-18 05:15
|
libfreeimage3 |
CVE-2020-24292 |
高危 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in load function in PluginICO.cpp in Fre ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24292
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19
|
libfreeimage3 |
CVE-2020-24293 |
高危 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in psdThumbnail::Read in PSDParser.cpp i ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24293
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19
|
libfreeimage3 |
CVE-2020-24295 |
高危 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in PSDParser.cpp::ReadImageLine() in Fre ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24295
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19
|
libfreeimage3 |
CVE-2021-40263 |
高危 |
3.18.0+ds2-1+deb10u1 |
|
A heap overflow vulnerability in FreeImage 1.18.0 via the ofLoad funct ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40263
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:38
|
libfreeimage3 |
CVE-2021-40265 |
高危 |
3.18.0+ds2-1+deb10u1 |
|
A heap overflow bug exists FreeImage before 1.18.0 via ofLoad function ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40265
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-22 19:16 修改: 2023-08-25 18:07
|
libfreeimage3 |
CVE-2023-47992 |
高危 |
3.18.0+ds2-1+deb10u1 |
|
An integer overflow vulnerability in FreeImageIO.cpp::_MemoryReadProc ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47992
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-01-09 23:15 修改: 2024-01-16 21:03
|
libfreeimage3 |
CVE-2023-47994 |
高危 |
3.18.0+ds2-1+deb10u1 |
|
An integer overflow vulnerability in LoadPixelDataRLE4 function in Plu ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47994
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-01-09 23:15 修改: 2024-01-16 21:02
|
curl |
CVE-2024-6197 |
高危 |
7.64.1.6-4+security |
|
curl: freeing stack buffer in utf8asn1str
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6197
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2024-07-24 08:15 修改: 2024-08-26 15:25
|
libfreetype6 |
CVE-2022-27405 |
高危 |
2.9.1-3+deb10u2 |
2.9.1-3+deb10u3 |
FreeType: Segmentation violation via FNT_Size_Request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27405
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34
|
libfreetype6 |
CVE-2022-27406 |
高危 |
2.9.1-3+deb10u2 |
2.9.1-3+deb10u3 |
Freetype: Segmentation violation via FT_Request_Size
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27406
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34
|
libfribidi0 |
CVE-2022-25308 |
高危 |
1.0.5-3.1+deb10u1 |
1.0.5-3.1+deb10u2 |
fribidi: Stack based buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25308
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-09-06 18:15 修改: 2023-02-12 22:15
|
libgail-common |
CVE-2024-6655 |
高危 |
2.24.32.3-1+deepin |
|
gtk3: gtk2: Library injection from CWD
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6655
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-16 15:15 修改: 2024-09-25 01:15
|
libgail18 |
CVE-2024-6655 |
高危 |
2.24.32.3-1+deepin |
|
gtk3: gtk2: Library injection from CWD
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6655
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-16 15:15 修改: 2024-09-25 01:15
|
libgcc-8-dev |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libgcc-8-dev |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
libgcc1 |
CVE-2018-12886 |
高危 |
1:8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libgcc1 |
CVE-2019-15847 |
高危 |
1:8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
libgcrypt20 |
CVE-2021-33560 |
高危 |
1.8.4.2-1+dde |
|
libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33560
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-06-08 11:15 修改: 2023-11-07 03:35
|
libgd3 |
CVE-2017-6363 |
高危 |
2.2.5.3-1+dde |
|
In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap- ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6363
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-02-27 05:15 修改: 2024-08-05 16:15
|
libgdk-pixbuf2.0-0 |
CVE-2022-48622 |
高危 |
2.38.1+dfsg-1 |
|
gnome: heap memory corruption on gdk-pixbuf
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48622
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-01-26 09:15 修改: 2024-08-26 20:35
|
libgdk-pixbuf2.0-common |
CVE-2022-48622 |
高危 |
2.38.1+dfsg-1 |
|
gnome: heap memory corruption on gdk-pixbuf
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48622
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-01-26 09:15 修改: 2024-08-26 20:35
|
libgmp10 |
CVE-2021-43618 |
高危 |
2:6.1.2+dfsg-4 |
2:6.1.2+dfsg-4+deb10u1 |
gmp: Integer overflow and resultant buffer overflow via crafted input
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43618
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-11-15 04:15 修改: 2023-09-29 15:15
|
libgomp1 |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libgomp1 |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
dmidecode |
CVE-2023-30630 |
高危 |
3.2.2-1+eagle |
|
dmidecode: dump-bin to overwrite a local file
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30630
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-13 16:15 修改: 2023-09-28 17:54
|
dnsmasq-base |
CVE-2022-0934 |
高危 |
2.80.4-1+dde |
|
dnsmasq: Heap use after free in dhcp6_no_relay
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0934
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-29 15:15 修改: 2023-03-07 18:12
|
libgroupsock8 |
CVE-2021-28899 |
高危 |
2018.11.26.1-1+eagle |
|
Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileS ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28899
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-04-29 15:15 修改: 2021-05-11 20:07
|
libgroupsock8 |
CVE-2021-38380 |
高危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 mishandles huge requests for the same MP3 stream, ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38380
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 18:15 修改: 2023-11-07 03:37
|
libgroupsock8 |
CVE-2021-39282 |
高危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 has a memory leak in AC3AudioStreamParser for AC3 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39282
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-18 17:15 修改: 2023-11-07 03:37
|
libgroupsock8 |
CVE-2021-41396 |
高危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 does not handle socket connections properly. A hu ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41396
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-07-12 14:15 修改: 2022-07-18 18:59
|
libgsf-1-114 |
CVE-2024-36474 |
高危 |
1.14.45-1 |
|
libgsf: Compound Document Binary File Directory integer overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36474
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-03 16:15 修改: 2024-10-09 16:37
|
libgsf-1-114 |
CVE-2024-42415 |
高危 |
1.14.45-1 |
|
libgsf: Compound Document Binary File Sector Allocation Table integer overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42415
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-03 16:15 修改: 2024-10-09 16:44
|
libgsf-1-common |
CVE-2024-36474 |
高危 |
1.14.45-1 |
|
libgsf: Compound Document Binary File Directory integer overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36474
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-03 16:15 修改: 2024-10-09 16:37
|
libgsf-1-common |
CVE-2024-42415 |
高危 |
1.14.45-1 |
|
libgsf: Compound Document Binary File Sector Allocation Table integer overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42415
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-03 16:15 修改: 2024-10-09 16:44
|
libgsf-1-dev |
CVE-2024-36474 |
高危 |
1.14.45-1 |
|
libgsf: Compound Document Binary File Directory integer overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36474
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-03 16:15 修改: 2024-10-09 16:37
|
libgsf-1-dev |
CVE-2024-42415 |
高危 |
1.14.45-1 |
|
libgsf: Compound Document Binary File Sector Allocation Table integer overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42415
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-03 16:15 修改: 2024-10-09 16:44
|
dnsmasq-base |
CVE-2023-28450 |
高危 |
2.80.4-1+dde |
|
dnsmasq: default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28450
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-15 21:15 修改: 2023-11-07 04:10
|
libgssapi-krb5-2 |
CVE-2024-37370 |
高危 |
1.17.4-1+eagle |
|
krb5: GSS message token handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48
|
libgtk-3-0 |
CVE-2024-6655 |
高危 |
3.24.5.7-1+deepin |
|
gtk3: gtk2: Library injection from CWD
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6655
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-16 15:15 修改: 2024-09-25 01:15
|
libgtk-3-common |
CVE-2024-6655 |
高危 |
3.24.5.7-1+deepin |
|
gtk3: gtk2: Library injection from CWD
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6655
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-16 15:15 修改: 2024-09-25 01:15
|
libgtk2.0-0 |
CVE-2024-6655 |
高危 |
2.24.32.3-1+deepin |
|
gtk3: gtk2: Library injection from CWD
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6655
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-16 15:15 修改: 2024-09-25 01:15
|
libgtk2.0-bin |
CVE-2024-6655 |
高危 |
2.24.32.3-1+deepin |
|
gtk3: gtk2: Library injection from CWD
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6655
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-16 15:15 修改: 2024-09-25 01:15
|
libgtk2.0-common |
CVE-2024-6655 |
高危 |
2.24.32.3-1+deepin |
|
gtk3: gtk2: Library injection from CWD
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6655
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-16 15:15 修改: 2024-09-25 01:15
|
libgupnp-1.0-4 |
CVE-2021-33516 |
高危 |
1.0.5-0+deb10u1+rebuild |
|
gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33516
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2021-05-24 15:15 修改: 2021-05-28 15:41
|
libharfbuzz-icu0 |
CVE-2023-25193 |
高危 |
2.3.1-1 |
|
harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25193
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-02-04 20:15 修改: 2023-11-07 04:08
|
libharfbuzz0b |
CVE-2023-25193 |
高危 |
2.3.1-1 |
|
harfbuzz: allows attackers to trigger O(n^2) growth via consecutive marks
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25193
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-02-04 20:15 修改: 2023-11-07 04:08
|
libidn2-0 |
CVE-2019-12290 |
高危 |
2.0.5-1+deb10u1 |
|
GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specifi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12290
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-10-22 16:15 修改: 2023-11-07 03:03
|
libinput-bin |
CVE-2022-1215 |
高危 |
1.12.6.1-1+deepin |
|
libinput: format string vulnerability may lead to privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1215
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-06-02 14:15 修改: 2023-11-09 20:56
|
libinput10 |
CVE-2022-1215 |
高危 |
1.12.6.1-1+deepin |
|
libinput: format string vulnerability may lead to privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1215
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-06-02 14:15 修改: 2023-11-09 20:56
|
libitm1 |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libitm1 |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
dnsmasq-base |
CVE-2023-50387 |
高危 |
2.80.4-1+dde |
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16
|
libixml10 |
CVE-2020-12695 |
高危 |
1:1.8.4-2 |
|
hostapd: UPnP SUBSCRIBE misbehavior in WPS AP
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12695
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-08 17:15 修改: 2024-04-08 22:50
|
libixml10 |
CVE-2020-13848 |
高危 |
1:1.8.4-2 |
|
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attac ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13848
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-04 20:15 修改: 2021-03-08 01:15
|
libixml10 |
CVE-2021-28302 |
高危 |
1:1.8.4-2 |
|
A stack overflow in pupnp before version 1.14.5 can cause the denial o ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28302
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-03-12 15:15 修改: 2022-04-22 18:55
|
dnsmasq-base |
CVE-2023-50868 |
高危 |
2.80.4-1+dde |
|
bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16
|
bluez-obexd |
CVE-2023-50230 |
高危 |
5.50.22-1+dde |
|
bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50230
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48
|
libjavascriptcoregtk-4.0-18 |
CVE-2014-1745 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-1745
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2014-05-21 11:14 修改: 2024-02-06 02:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-22624 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.36.0-3~deb10u1 |
webkitgtk: Use-after-free leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22624
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-09-23 19:15 修改: 2022-09-28 12:03
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-22628 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.36.0-3~deb10u1 |
webkitgtk: Use-after-free leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22628
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-09-23 19:15 修改: 2022-09-28 12:06
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-22629 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.36.0-3~deb10u1 |
webkitgtk: Buffer overflow leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22629
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-09-23 20:15 修改: 2022-09-27 04:48
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-22637 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.34.4-1~deb10u1 |
webkitgtk: logic issue was addressed with improved state management
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22637
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-09-23 19:15 修改: 2022-09-28 12:21
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-32886 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.38.0-1~deb10u1 |
webkitgtk: buffer overflow issue was addressed with improved memory handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32886
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-09-20 21:15 修改: 2023-05-30 06:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-42823 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.38.2-1~deb10u1 |
webkitgtk: type confusion issue leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42823
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-11-01 20:15 修改: 2023-11-07 03:53
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-48503 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.38.0-1 |
webkitgtk: improper bounds checking leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48503
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-08-14 23:15 修改: 2023-08-19 00:42
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-28198 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: use after free vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28198
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-08-14 23:15 修改: 2024-01-05 14:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-32359 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: User password may be read aloud by a text-to-speech accessibility feature
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32359
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-10-25 19:15 修改: 2024-01-31 15:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-32393 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32393
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 01:15 修改: 2024-01-05 14:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-32435 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: memory corruption issue leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32435
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-06-23 18:15 修改: 2024-06-27 19:03
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-32439 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: type confusion issue leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32439
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-06-23 18:15 修改: 2024-01-12 22:08
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-35074 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-35074
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-09-27 15:18 修改: 2024-01-31 15:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-37450 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37450
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 00:15 修改: 2024-06-27 18:51
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-38572 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: bypass Same Origin Policy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38572
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 01:15 修改: 2024-01-05 14:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-38592 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38592
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-28 05:15 修改: 2024-01-05 14:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-38594 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38594
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 00:15 修改: 2024-01-05 14:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-38595 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38595
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 01:15 修改: 2024-01-05 14:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-38597 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38597
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 00:15 修改: 2024-01-05 14:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-38600 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38600
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 01:15 修改: 2024-01-05 14:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-38611 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38611
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 01:15 修改: 2024-01-05 14:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-39434 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39434
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-09-27 15:18 修改: 2024-01-31 15:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-39928 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39928
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-10-06 16:15 修改: 2024-01-31 15:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-40451 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40451
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-09-27 15:19 修改: 2024-01-31 15:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-41074 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41074
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-09-27 15:19 修改: 2024-01-31 15:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-41993 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: processing malicious web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41993
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-09-21 19:15 修改: 2024-09-03 20:19
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-42833 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.38.0-1~deb10u1 |
webkitgtk: Processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42833
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-01-10 22:15 修改: 2024-02-06 02:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-42852 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42852
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-10-25 19:15 修改: 2024-02-16 15:24
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-42890 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: processing malicious web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42890
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-12-12 01:15 修改: 2024-08-28 15:35
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-42917 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Arbitrary Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42917
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-11-30 23:15 修改: 2024-06-26 20:01
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-42950 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: heap use-after-free may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42950
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-03-28 16:15 修改: 2024-08-09 16:35
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-23213 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23213
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-01-23 01:15 修改: 2024-06-12 10:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-23222 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: type confusion may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23222
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-01-23 01:15 修改: 2024-08-14 17:00
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-27808 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27808
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-06-10 21:15 修改: 2024-07-03 01:50
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-27820 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27820
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-06-10 21:15 修改: 2024-07-03 01:50
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-27833 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27833
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-06-10 21:15 修改: 2024-07-03 01:51
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-27834 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: pointer authentication bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27834
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-05-14 15:13 修改: 2024-07-03 01:51
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-27851 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27851
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-06-10 21:15 修改: 2024-07-03 16:13
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-4558 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
chromium-browser: Use after free in ANGLE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4558
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-05-07 19:15 修改: 2024-07-30 02:15
|
bluez-obexd |
CVE-2023-51596 |
高危 |
5.50.22-1+dde |
|
bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51596
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48
|
libk5crypto3 |
CVE-2024-37370 |
高危 |
1.17.4-1+eagle |
|
krb5: GSS message token handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48
|
e2fsprogs |
CVE-2022-1304 |
高危 |
1.44.5-1+deb10u3 |
|
e2fsprogs: out-of-bounds read/write via crafted filesystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-04-14 21:15 修改: 2023-11-07 03:41
|
libkrb5-3 |
CVE-2024-37370 |
高危 |
1.17.4-1+eagle |
|
krb5: GSS message token handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48
|
fdisk |
CVE-2024-28085 |
高危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35
|
libkrb5support0 |
CVE-2024-37370 |
高危 |
1.17.4-1+eagle |
|
krb5: GSS message token handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48
|
g++-8 |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
g++-8 |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
libldap-2.4-2 |
CVE-2023-2953 |
高危 |
2.4.47+dfsg.4-1+eagle |
|
openldap: null pointer dereference in ber_memalloc_x function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2953
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-05-30 22:15 修改: 2023-08-02 16:46
|
libldap-common |
CVE-2023-2953 |
高危 |
2.4.47+dfsg.4-1+eagle |
|
openldap: null pointer dereference in ber_memalloc_x function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2953
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-05-30 22:15 修改: 2023-08-02 16:46
|
gcc-8 |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
gcc-8 |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
liblivemedia64 |
CVE-2021-28899 |
高危 |
2018.11.26.1-1+eagle |
|
Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileS ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28899
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-04-29 15:15 修改: 2021-05-11 20:07
|
liblivemedia64 |
CVE-2021-38380 |
高危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 mishandles huge requests for the same MP3 stream, ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38380
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 18:15 修改: 2023-11-07 03:37
|
liblivemedia64 |
CVE-2021-39282 |
高危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 has a memory leak in AC3AudioStreamParser for AC3 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39282
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-18 17:15 修改: 2023-11-07 03:37
|
liblivemedia64 |
CVE-2021-41396 |
高危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 does not handle socket connections properly. A hu ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41396
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-07-12 14:15 修改: 2022-07-18 18:59
|
liblsan0 |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
liblsan0 |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
liblzma5 |
CVE-2022-1271 |
高危 |
5.2.4-1 |
5.2.4-1+deb10u1 |
gzip: arbitrary-file-write vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1271
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-08-31 16:15 修改: 2024-08-26 10:47
|
libmediainfo0v5 |
CVE-2020-26797 |
高危 |
18.12.2-1+security |
|
Mediainfo before version 20.08 has a heap buffer overflow vulnerabilit ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26797
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-03-18 20:15 修改: 2023-11-07 03:20
|
libmount-dev |
CVE-2024-28085 |
高危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35
|
libmount1 |
CVE-2024-28085 |
高危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35
|
libmpv1 |
CVE-2021-30145 |
高危 |
0.29.1.34-1+eagle |
|
A format string vulnerability in mpv through 0.33.0 allows user-assist ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30145
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-18 14:15 修改: 2022-05-20 20:45
|
libmpx2 |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libmpx2 |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
gcc-8-base |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libmysofa0 |
CVE-2020-36152 |
高危 |
0.6~dfsg0.2-1+security |
|
Buffer overflow in readDataVar in hdf/dataobject.c in Symonics libmyso ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36152
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-02-08 21:15 修改: 2023-11-07 03:22
|
libmysofa0 |
CVE-2020-6860 |
高危 |
0.6~dfsg0.2-1+security |
|
libmysofa 0.9.1 has a stack-based buffer overflow in readDataVar in hd ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-6860
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-01-13 07:15 修改: 2023-11-07 03:25
|
libnss3 |
CVE-2024-6609 |
高危 |
2:3.42.1.4-1+dde |
|
When almost out-of-memory an elliptic curve key which was never alloca ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6609
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-09 15:15 修改: 2024-08-29 18:32
|
libopenjp2-7 |
CVE-2021-3575 |
高危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: heap-buffer-overflow in color.c may lead to DoS or arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3575
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-03-04 18:15 修改: 2023-02-12 23:41
|
libpam-systemd |
CVE-2019-3843 |
高危 |
241.26-1+dde |
|
systemd: services with DynamicUser can create SUID/SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3843
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10
|
libpam-systemd |
CVE-2019-3844 |
高危 |
241.26-1+dde |
|
systemd: services with DynamicUser can get new privileges and create SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3844
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10
|
libpam-systemd |
CVE-2023-50387 |
高危 |
241.26-1+dde |
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16
|
libpam-systemd |
CVE-2023-50868 |
高危 |
241.26-1+dde |
|
bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16
|
libperl5.28 |
CVE-2020-16156 |
高危 |
5.28.1.2-6+deb10u1 |
|
perl-CPAN: Bypass of verification of signatures in CHECKSUMS files
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18
|
libperl5.28 |
CVE-2023-31484 |
高危 |
5.28.1.2-6+deb10u1 |
|
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43
|
libpixman-1-0 |
CVE-2022-44638 |
高危 |
0.36.0-1 |
0.36.0-1+deb10u1 |
pixman: Integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44638
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-11-03 06:15 修改: 2023-11-07 03:54
|
libpostproc55 |
CVE-2020-20891 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Buffer Overflow vulnerability in function config_input in libavfilter/ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20891
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:49
|
libpostproc55 |
CVE-2020-20892 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function filter_frame in libavfilter/vf_len ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20892
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2023-11-07 03:19
|
libpostproc55 |
CVE-2020-20896 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function latm_write_packet in libavformat/l ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20896
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:46
|
libpostproc55 |
CVE-2020-21688 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the av_freep function in libavutil/mem.c of F ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21688
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libpostproc55 |
CVE-2022-3109 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
An issue was discovered in the FFmpeg package, where vp3_decode_frame ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3109
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-16 15:15 修改: 2023-11-07 03:50
|
libpostproc55 |
CVE-2022-48434 |
高危 |
7:4.1.8.1-1+dde |
|
libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48434
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-29 17:15 修改: 2024-10-21 16:35
|
libpostproc55 |
CVE-2024-32230 |
高危 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size- ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32230
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-08-22 13:24
|
libpostproc55 |
CVE-2024-7272 |
高危 |
7:4.1.8.1-1+dde |
|
A vulnerability, which was classified as critical, was found in FFmpeg ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7272
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-12 13:38 修改: 2024-08-13 15:16
|
libprotobuf-lite17 |
CVE-2022-1941 |
高危 |
3.6.1.3-2 |
3.6.1.3-2+deb10u1 |
protobuf: message parsing vulnerability in ProtocolBuffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1941
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-09-22 15:15 修改: 2024-08-01 13:42
|
libprotobuf-lite17 |
CVE-2022-3171 |
高危 |
3.6.1.3-2 |
|
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
libprotobuf-lite17 |
CVE-2022-3509 |
高危 |
3.6.1.3-2 |
|
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
libprotobuf-lite17 |
CVE-2022-3510 |
高危 |
3.6.1.3-2 |
|
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
libprotobuf-lite17 |
CVE-2024-7254 |
高危 |
3.6.1.3-2 |
|
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-09-19 01:15 修改: 2024-09-20 12:30
|
libpython2.7 |
CVE-2020-10735 |
高危 |
2.7.16.2-1+eagle |
|
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15
|
libpython2.7 |
CVE-2024-6232 |
高危 |
2.7.16.2-1+eagle |
|
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15
|
libpython2.7-minimal |
CVE-2020-10735 |
高危 |
2.7.16.2-1+eagle |
|
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15
|
libpython2.7-minimal |
CVE-2024-6232 |
高危 |
2.7.16.2-1+eagle |
|
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15
|
libpython2.7-stdlib |
CVE-2020-10735 |
高危 |
2.7.16.2-1+eagle |
|
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15
|
libpython2.7-stdlib |
CVE-2024-6232 |
高危 |
2.7.16.2-1+eagle |
|
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15
|
libpython3.7-minimal |
CVE-2022-0391 |
高危 |
3.7.3.6-1+eagle |
|
python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41
|
libpython3.7-minimal |
CVE-2023-24329 |
高危 |
3.7.3.6-1+eagle |
|
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
libpython3.7-stdlib |
CVE-2022-0391 |
高危 |
3.7.3.6-1+eagle |
|
python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41
|
libpython3.7-stdlib |
CVE-2023-24329 |
高危 |
3.7.3.6-1+eagle |
|
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
libqt5concurrent5 |
CVE-2022-25255 |
高危 |
5.15.1.8-1+dde |
|
qt: QProcess could execute a binary from the current working directory when not found in the PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25255
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-16 19:15 修改: 2022-02-28 16:18
|
libqt5core5a |
CVE-2022-25255 |
高危 |
5.15.1.8-1+dde |
|
qt: QProcess could execute a binary from the current working directory when not found in the PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25255
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-16 19:15 修改: 2022-02-28 16:18
|
libqt5dbus5 |
CVE-2022-25255 |
高危 |
5.15.1.8-1+dde |
|
qt: QProcess could execute a binary from the current working directory when not found in the PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25255
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-16 19:15 修改: 2022-02-28 16:18
|
libqt5gui5 |
CVE-2022-25255 |
高危 |
5.15.1.8-1+dde |
|
qt: QProcess could execute a binary from the current working directory when not found in the PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25255
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-16 19:15 修改: 2022-02-28 16:18
|
libqt5network5 |
CVE-2022-25255 |
高危 |
5.15.1.8-1+dde |
|
qt: QProcess could execute a binary from the current working directory when not found in the PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25255
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-16 19:15 修改: 2022-02-28 16:18
|
libqt5opengl5 |
CVE-2022-25255 |
高危 |
5.15.1.8-1+dde |
|
qt: QProcess could execute a binary from the current working directory when not found in the PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25255
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-16 19:15 修改: 2022-02-28 16:18
|
libqt5printsupport5 |
CVE-2022-25255 |
高危 |
5.15.1.8-1+dde |
|
qt: QProcess could execute a binary from the current working directory when not found in the PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25255
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-16 19:15 修改: 2022-02-28 16:18
|
libqt5sql5 |
CVE-2022-25255 |
高危 |
5.15.1.8-1+dde |
|
qt: QProcess could execute a binary from the current working directory when not found in the PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25255
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-16 19:15 修改: 2022-02-28 16:18
|
libqt5sql5-sqlite |
CVE-2022-25255 |
高危 |
5.15.1.8-1+dde |
|
qt: QProcess could execute a binary from the current working directory when not found in the PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25255
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2022-02-16 19:15 修改: 2022-02-28 16:18
|
libqt5svg5 |
CVE-2021-3481 |
高危 |
5.15.1.2+dde-1+eagle |
|
qt: Out of bounds read in function QRadialFetchSimd from crafted svg file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3481
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-22 15:15 修改: 2023-08-23 01:15
|
libqt5test5 |
CVE-2022-25255 |
高危 |
5.15.1.8-1+dde |
|
qt: QProcess could execute a binary from the current working directory when not found in the PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25255
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2022-02-16 19:15 修改: 2022-02-28 16:18
|
libqt5widgets5 |
CVE-2022-25255 |
高危 |
5.15.1.8-1+dde |
|
qt: QProcess could execute a binary from the current working directory when not found in the PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25255
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-16 19:15 修改: 2022-02-28 16:18
|
libqt5xml5 |
CVE-2022-25255 |
高危 |
5.15.1.8-1+dde |
|
qt: QProcess could execute a binary from the current working directory when not found in the PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25255
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-16 19:15 修改: 2022-02-28 16:18
|
libquadmath0 |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libquadmath0 |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
libraw19 |
CVE-2020-15503 |
高危 |
0.19.2-2 |
0.19.2-2+deb10u2 |
LibRaw: lack of thumbnail size range check can lead to buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15503
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2020-07-02 14:15 修改: 2023-11-07 03:17
|
libraw19 |
CVE-2021-32142 |
高危 |
0.19.2-2 |
0.19.2-2+deb10u3 |
LibRaw: stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32142
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-02-17 18:15 修改: 2023-11-07 03:35
|
libsasl2-2 |
CVE-2022-24407 |
高危 |
2.1.27+dfsg-1+deb10u1 |
2.1.27+dfsg-1+deb10u2 |
cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24407
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-02-24 15:15 修改: 2023-11-07 03:44
|
libsasl2-modules-db |
CVE-2022-24407 |
高危 |
2.1.27+dfsg-1+deb10u1 |
2.1.27+dfsg-1+deb10u2 |
cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24407
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-02-24 15:15 修改: 2023-11-07 03:44
|
libsdl-image1.2 |
CVE-2019-13616 |
高危 |
1.2.12.1-1+eagle |
|
SDL: heap-based buffer overflow in SDL blit functions in video/SDL_blit*.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13616
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-07-16 17:15 修改: 2023-11-07 03:03
|
libsdl-image1.2 |
CVE-2019-5059 |
高危 |
1.2.12.1-1+eagle |
|
An exploitable code execution vulnerability exists in the XPM image re ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5059
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-07-31 17:15 修改: 2022-06-27 17:29
|
libsdl-image1.2 |
CVE-2019-5060 |
高危 |
1.2.12.1-1+eagle |
|
An exploitable code execution vulnerability exists in the XPM image re ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5060
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-07-31 17:15 修改: 2022-06-27 17:29
|
libsdl1.2debian |
CVE-2021-33657 |
高危 |
1.2.15+dfsg2.1-1+dde |
|
There is a heap overflow problem in video/SDL_pixels.c in SDL (Simple ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33657
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-04-01 23:15 修改: 2023-05-03 12:15
|
libsdl1.2debian |
CVE-2022-34568 |
高危 |
1.2.15+dfsg2.1-1+dde |
|
SDL v1.2 was discovered to contain a use-after-free via the XFree func ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34568
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-07-28 22:15 修改: 2023-08-08 14:21
|
libsmartcols1 |
CVE-2024-28085 |
高危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35
|
gcc-8-base |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
gir1.2-gsf-1 |
CVE-2024-36474 |
高危 |
1.14.45-1 |
|
libgsf: Compound Document Binary File Directory integer overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36474
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-03 16:15 修改: 2024-10-09 16:37
|
gir1.2-gsf-1 |
CVE-2024-42415 |
高危 |
1.14.45-1 |
|
libgsf: Compound Document Binary File Sector Allocation Table integer overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42415
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-03 16:15 修改: 2024-10-09 16:44
|
libsmbclient |
CVE-2020-10704 |
高危 |
2:4.9.5.18-1+dde |
|
samba: LDAP Denial of Service (stack overflow) in Samba AD DC
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10704
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-05-06 14:15 修改: 2023-11-07 03:14
|
libsmbclient |
CVE-2020-10745 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Parsing and packing of NBT and DNS packets can consume excessive CPU
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10745
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-07-07 14:15 修改: 2023-11-07 03:14
|
libsmbclient |
CVE-2020-14303 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Empty UDP packet DoS in Samba AD DC nbtd
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14303
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-07-06 18:15 修改: 2023-11-07 03:17
|
libsmbclient |
CVE-2020-25718 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2020-25719 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2020-25720 |
高危 |
2:4.9.5.18-1+dde |
|
samba: check attribute access rights for LDAP adds of computers
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25720
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libsmbclient |
CVE-2020-25721 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2020-25722 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Samba AD DC did not do sufficient access and conformance checking of data stored
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2021-3738 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Use after free in Samba AD DC RPC server
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2022-0336 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Samba AD users with permission to write to an account can impersonate arbitrary services
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0336
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-29 15:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2022-2031 |
高危 |
2:4.9.5.18-1+dde |
|
samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2022-32743 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Validated dnsHostname write right needs to be implemented
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48
|
libsmbclient |
CVE-2022-32744 |
高危 |
2:4.9.5.18-1+dde |
|
samba: AD users can forge password change requests for any user
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32744
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2022-37966 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37966
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-11-09 22:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2022-37967 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Kerberos constrained delegation ticket forgery possible against Samba AD DC
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37967
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-11-09 22:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2022-38023 |
高危 |
2:4.9.5.18-1+dde |
|
samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38023
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-11-09 22:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2022-42898 |
高危 |
2:4.9.5.18-1+dde |
|
krb5: integer overflow vulnerabilities in PAC parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15
|
libsmbclient |
CVE-2023-34966 |
高危 |
2:4.9.5.18-1+dde |
|
samba: infinite loop in mdssvc RPC service for spotlight
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34966
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-07-20 15:15 修改: 2024-09-16 13:15
|
libsndfile1 |
CVE-2022-33064 |
高危 |
1.0.28.2-1+dde |
|
libsndfile: off-by-one error in function wav_read_header in src/wav.c leads to code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33064
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-07-18 14:15 修改: 2023-07-27 15:14
|
libsndfile1 |
CVE-2022-33065 |
高危 |
1.0.28.2-1+dde |
|
libsndfile: integer overflow in src/mat4.c and src/au.c leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33065
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-07-18 14:15 修改: 2023-08-02 17:19
|
libsqlite3-0 |
CVE-2019-19603 |
高危 |
3.27.2.3-1+security |
|
sqlite: mishandling of certain SELECT statements with non-existent VIEW can lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19603
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-12-09 19:15 修改: 2023-11-07 03:07
|
libsqlite3-0 |
CVE-2023-7104 |
高危 |
3.27.2.3-1+security |
|
sqlite: heap-buffer-overflow at sessionfuzz
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7104
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-12-29 10:15 修改: 2024-05-17 02:34
|
libss2 |
CVE-2022-1304 |
高危 |
1.44.5-1+deb10u3 |
|
e2fsprogs: out-of-bounds read/write via crafted filesystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-04-14 21:15 修改: 2023-11-07 03:41
|
gtk-update-icon-cache |
CVE-2024-6655 |
高危 |
3.24.5.7-1+deepin |
|
gtk3: gtk2: Library injection from CWD
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6655
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-16 15:15 修改: 2024-09-25 01:15
|
gzip |
CVE-2022-1271 |
高危 |
1.9-3 |
1.9-3+deb10u1 |
gzip: arbitrary-file-write vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1271
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-08-31 16:15 修改: 2024-08-26 10:47
|
libssl1.1 |
CVE-2022-4450 |
高危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u4 |
openssl: double free after calling PEM_read_bio_ex
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2023-0215 |
高危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u4 |
openssl: use-after-free following BIO_new_NDEF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2023-0286 |
高危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u4 |
openssl: X.400 address type confusion in X.509 GeneralName
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2023-0464 |
高危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u5 |
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15
|
libstdc++-8-dev |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libstdc++-8-dev |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
libstdc++6 |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libstdc++6 |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
libswresample3 |
CVE-2020-20891 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Buffer Overflow vulnerability in function config_input in libavfilter/ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20891
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:49
|
libswresample3 |
CVE-2020-20892 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function filter_frame in libavfilter/vf_len ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20892
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2023-11-07 03:19
|
libswresample3 |
CVE-2020-20896 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function latm_write_packet in libavformat/l ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20896
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:46
|
libswresample3 |
CVE-2020-21688 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the av_freep function in libavutil/mem.c of F ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21688
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libswresample3 |
CVE-2022-3109 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
An issue was discovered in the FFmpeg package, where vp3_decode_frame ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3109
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-16 15:15 修改: 2023-11-07 03:50
|
libswresample3 |
CVE-2022-48434 |
高危 |
7:4.1.8.1-1+dde |
|
libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48434
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-29 17:15 修改: 2024-10-21 16:35
|
libswresample3 |
CVE-2024-32230 |
高危 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size- ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32230
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-08-22 13:24
|
libswresample3 |
CVE-2024-7272 |
高危 |
7:4.1.8.1-1+dde |
|
A vulnerability, which was classified as critical, was found in FFmpeg ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7272
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-12 13:38 修改: 2024-08-13 15:16
|
libswscale5 |
CVE-2020-20891 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Buffer Overflow vulnerability in function config_input in libavfilter/ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20891
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:49
|
libswscale5 |
CVE-2020-20892 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function filter_frame in libavfilter/vf_len ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20892
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2023-11-07 03:19
|
libswscale5 |
CVE-2020-20896 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function latm_write_packet in libavformat/l ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20896
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:46
|
libswscale5 |
CVE-2020-21688 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the av_freep function in libavutil/mem.c of F ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21688
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libswscale5 |
CVE-2022-3109 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
An issue was discovered in the FFmpeg package, where vp3_decode_frame ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3109
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-16 15:15 修改: 2023-11-07 03:50
|
libswscale5 |
CVE-2022-48434 |
高危 |
7:4.1.8.1-1+dde |
|
libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48434
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-29 17:15 修改: 2024-10-21 16:35
|
libswscale5 |
CVE-2024-32230 |
高危 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size- ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32230
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-08-22 13:24
|
libswscale5 |
CVE-2024-7272 |
高危 |
7:4.1.8.1-1+dde |
|
A vulnerability, which was classified as critical, was found in FFmpeg ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7272
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-12 13:38 修改: 2024-08-13 15:16
|
libsystemd0 |
CVE-2019-3843 |
高危 |
241.26-1+dde |
|
systemd: services with DynamicUser can create SUID/SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3843
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10
|
libsystemd0 |
CVE-2019-3844 |
高危 |
241.26-1+dde |
|
systemd: services with DynamicUser can get new privileges and create SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3844
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10
|
libsystemd0 |
CVE-2023-50387 |
高危 |
241.26-1+dde |
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16
|
libsystemd0 |
CVE-2023-50868 |
高危 |
241.26-1+dde |
|
bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16
|
bsdutils |
CVE-2024-28085 |
高危 |
1:2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35
|
libtiff5 |
CVE-2023-52355 |
高危 |
4.1.0+git191117.1-1+security |
|
libtiff: TIFFRasterScanlineSize64 produce too-big size and could cause OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52355
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-01-25 20:15 修改: 2024-05-17 17:37
|
libtiff5 |
CVE-2024-7006 |
高危 |
4.1.0+git191117.1-1+security |
|
libtiff: NULL pointer dereference in tif_dirinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7006
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-12 13:38 修改: 2024-10-11 14:39
|
libtinyxml2.6.2v5 |
CVE-2021-42260 |
高危 |
2.6.2-4+apricot |
2.6.2-4+deb10u1 |
TinyXML through 2.6.2 has an infinite loop in TiXmlParsingData::Stamp ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42260
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2021-10-11 20:15 修改: 2024-01-12 03:15
|
libtinyxml2.6.2v5 |
CVE-2023-34194 |
高危 |
2.6.2-4+apricot |
2.6.2-4+deb10u2 |
StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in TinyXML ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34194
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-12-13 14:15 修改: 2024-01-12 03:15
|
libtsan0 |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libtsan0 |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
libubsan1 |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libubsan1 |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
libudev1 |
CVE-2019-3843 |
高危 |
241.26-1+dde |
|
systemd: services with DynamicUser can create SUID/SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3843
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10
|
libudev1 |
CVE-2019-3844 |
高危 |
241.26-1+dde |
|
systemd: services with DynamicUser can get new privileges and create SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3844
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10
|
libudev1 |
CVE-2023-50387 |
高危 |
241.26-1+dde |
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16
|
libudev1 |
CVE-2023-50868 |
高危 |
241.26-1+dde |
|
bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16
|
bluez-obexd |
CVE-2023-44431 |
高危 |
5.50.22-1+dde |
|
bluez: AVRCP stack-based buffer overflow remote code execution vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44431
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:15 修改: 2024-05-03 12:48
|
libupnp13 |
CVE-2020-12695 |
高危 |
1:1.8.4-2 |
|
hostapd: UPnP SUBSCRIBE misbehavior in WPS AP
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12695
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-08 17:15 修改: 2024-04-08 22:50
|
libupnp13 |
CVE-2020-13848 |
高危 |
1:1.8.4-2 |
|
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attac ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13848
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-04 20:15 修改: 2021-03-08 01:15
|
libupnp13 |
CVE-2021-28302 |
高危 |
1:1.8.4-2 |
|
A stack overflow in pupnp before version 1.14.5 can cause the denial o ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28302
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-03-12 15:15 修改: 2022-04-22 18:55
|
libaom0 |
CVE-2020-0478 |
高危 |
1.0.0.1-1+dde |
|
In extend_frame_lowbd of restoration.c, there is a possible out of bou ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-0478
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-12-15 16:15 修改: 2020-12-16 15:09
|
bluez-obexd |
CVE-2023-50229 |
高危 |
5.50.22-1+dde |
|
bluez: phone book access profile heap-based buffer overflow remote code execution vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50229
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48
|
libusageenvironment3 |
CVE-2021-28899 |
高危 |
2018.11.26.1-1+eagle |
|
Vulnerability in the AC3AudioFileServerMediaSubsession, ADTSAudioFileS ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28899
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-04-29 15:15 修改: 2021-05-11 20:07
|
libusageenvironment3 |
CVE-2021-38380 |
高危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 mishandles huge requests for the same MP3 stream, ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38380
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 18:15 修改: 2023-11-07 03:37
|
libusageenvironment3 |
CVE-2021-39282 |
高危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 has a memory leak in AC3AudioStreamParser for AC3 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39282
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-18 17:15 修改: 2023-11-07 03:37
|
libusageenvironment3 |
CVE-2021-41396 |
高危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 does not handle socket connections properly. A hu ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41396
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-07-12 14:15 修改: 2022-07-18 18:59
|
libuuid1 |
CVE-2024-28085 |
高危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35
|
libarchive13 |
CVE-2021-23177 |
高危 |
3.3.3-4+deb10u1 |
3.3.3-4+deb10u2 |
libarchive: extracting a symlink with ACLs modifies ACLs of target
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23177
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 16:15 修改: 2022-12-03 14:16
|
libvlc5 |
CVE-2020-26664 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A vulnerability in EbmlTypeDispatcher::send in VideoLAN VLC media play ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26664
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-01-08 18:15 修改: 2023-02-03 18:49
|
libvlc5 |
CVE-2021-25801 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the __Parse_indx component of Video ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25801
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
libvlc5 |
CVE-2021-25802 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the AVI_ExtractSubtitle component o ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25802
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
libvlc5 |
CVE-2021-25803 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the vlc_input_attachment_New compon ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25803
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
libvlc5 |
CVE-2021-25804 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A NULL-pointer dereference in "Open" in avi.c of VideoLAN VLC Media Pl ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25804
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2021-08-04 02:11
|
libvlc5 |
CVE-2022-41325 |
高危 |
3.0.11.2-1 |
3.0.17.4-0+deb10u2 |
An integer overflow in the VNC module in VideoLAN VLC Media Player thr ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41325
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-06 16:15 修改: 2022-12-08 16:44
|
libvlc5 |
CVE-2023-47360 |
高危 |
3.0.11.2-1 |
3.0.20-0+deb10u1 |
Videolan VLC prior to version 3.0.20 contains an Integer underflow tha ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47360
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-07 16:15 修改: 2023-12-01 02:15
|
libarchive13 |
CVE-2021-31566 |
高危 |
3.3.3-4+deb10u1 |
3.3.3-4+deb10u2 |
libarchive: symbolic links incorrectly followed when changing modes, times, ACL and flags of a file while extracting an archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31566
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 16:15 修改: 2024-03-27 16:04
|
libvlccore9 |
CVE-2020-26664 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A vulnerability in EbmlTypeDispatcher::send in VideoLAN VLC media play ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26664
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-01-08 18:15 修改: 2023-02-03 18:49
|
libvlccore9 |
CVE-2021-25801 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the __Parse_indx component of Video ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25801
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
libvlccore9 |
CVE-2021-25802 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the AVI_ExtractSubtitle component o ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25802
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
libvlccore9 |
CVE-2021-25803 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the vlc_input_attachment_New compon ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25803
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
libvlccore9 |
CVE-2021-25804 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A NULL-pointer dereference in "Open" in avi.c of VideoLAN VLC Media Pl ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25804
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2021-08-04 02:11
|
libvlccore9 |
CVE-2022-41325 |
高危 |
3.0.11.2-1 |
3.0.17.4-0+deb10u2 |
An integer overflow in the VNC module in VideoLAN VLC Media Player thr ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41325
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-06 16:15 修改: 2022-12-08 16:44
|
libvlccore9 |
CVE-2023-47360 |
高危 |
3.0.11.2-1 |
3.0.20-0+deb10u1 |
Videolan VLC prior to version 3.0.20 contains an Integer underflow tha ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47360
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-07 16:15 修改: 2023-12-01 02:15
|
libarchive13 |
CVE-2024-48957 |
高危 |
3.3.3-4+deb10u1 |
|
libarchive: Out-of-bounds access in libarchive's archive file handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48957
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-10 02:15 修改: 2024-10-11 21:36
|
libarchive13 |
CVE-2024-48958 |
高危 |
3.3.3-4+deb10u1 |
|
libarchive: Out-of-bounds access in libarchive's RAR file handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48958
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-10 02:15 修改: 2024-10-11 21:36
|
libasan5 |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libwbclient0 |
CVE-2020-10704 |
高危 |
2:4.9.5.18-1+dde |
|
samba: LDAP Denial of Service (stack overflow) in Samba AD DC
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10704
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-05-06 14:15 修改: 2023-11-07 03:14
|
libwbclient0 |
CVE-2020-10745 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Parsing and packing of NBT and DNS packets can consume excessive CPU
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10745
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-07-07 14:15 修改: 2023-11-07 03:14
|
libwbclient0 |
CVE-2020-14303 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Empty UDP packet DoS in Samba AD DC nbtd
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14303
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-07-06 18:15 修改: 2023-11-07 03:17
|
libwbclient0 |
CVE-2020-25718 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2020-25719 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2020-25720 |
高危 |
2:4.9.5.18-1+dde |
|
samba: check attribute access rights for LDAP adds of computers
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25720
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libwbclient0 |
CVE-2020-25721 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2020-25722 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Samba AD DC did not do sufficient access and conformance checking of data stored
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2021-3738 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Use after free in Samba AD DC RPC server
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2022-0336 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Samba AD users with permission to write to an account can impersonate arbitrary services
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0336
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-29 15:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2022-2031 |
高危 |
2:4.9.5.18-1+dde |
|
samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2022-32743 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Validated dnsHostname write right needs to be implemented
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48
|
libwbclient0 |
CVE-2022-32744 |
高危 |
2:4.9.5.18-1+dde |
|
samba: AD users can forge password change requests for any user
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32744
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2022-37966 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37966
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-11-09 22:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2022-37967 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Kerberos constrained delegation ticket forgery possible against Samba AD DC
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37967
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-11-09 22:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2022-38023 |
高危 |
2:4.9.5.18-1+dde |
|
samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38023
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-11-09 22:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2022-42898 |
高危 |
2:4.9.5.18-1+dde |
|
krb5: integer overflow vulnerabilities in PAC parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15
|
libwbclient0 |
CVE-2023-34966 |
高危 |
2:4.9.5.18-1+dde |
|
samba: infinite loop in mdssvc RPC service for spotlight
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34966
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-07-20 15:15 修改: 2024-09-16 13:15
|
libasan5 |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
busybox |
CVE-2021-28831 |
高危 |
1:1.30.1.2-1+dde |
|
busybox: invalid free or segmentation fault via malformed gzip data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28831
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-03-19 05:15 修改: 2023-11-07 03:32
|
libwebkit2gtk-4.0-37 |
CVE-2014-1745 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-1745
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2014-05-21 11:14 修改: 2024-02-06 02:15
|
libwebkit2gtk-4.0-37 |
CVE-2022-22624 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.36.0-3~deb10u1 |
webkitgtk: Use-after-free leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22624
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-09-23 19:15 修改: 2022-09-28 12:03
|
libwebkit2gtk-4.0-37 |
CVE-2022-22628 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.36.0-3~deb10u1 |
webkitgtk: Use-after-free leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22628
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-09-23 19:15 修改: 2022-09-28 12:06
|
libwebkit2gtk-4.0-37 |
CVE-2022-22629 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.36.0-3~deb10u1 |
webkitgtk: Buffer overflow leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22629
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-09-23 20:15 修改: 2022-09-27 04:48
|
libwebkit2gtk-4.0-37 |
CVE-2022-22637 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.34.4-1~deb10u1 |
webkitgtk: logic issue was addressed with improved state management
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22637
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-09-23 19:15 修改: 2022-09-28 12:21
|
libwebkit2gtk-4.0-37 |
CVE-2022-32886 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.38.0-1~deb10u1 |
webkitgtk: buffer overflow issue was addressed with improved memory handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32886
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-09-20 21:15 修改: 2023-05-30 06:15
|
libwebkit2gtk-4.0-37 |
CVE-2022-42823 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.38.2-1~deb10u1 |
webkitgtk: type confusion issue leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42823
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-11-01 20:15 修改: 2023-11-07 03:53
|
libwebkit2gtk-4.0-37 |
CVE-2022-48503 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.38.0-1 |
webkitgtk: improper bounds checking leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48503
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-08-14 23:15 修改: 2023-08-19 00:42
|
libwebkit2gtk-4.0-37 |
CVE-2023-28198 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: use after free vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28198
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-08-14 23:15 修改: 2024-01-05 14:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-32359 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: User password may be read aloud by a text-to-speech accessibility feature
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32359
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-10-25 19:15 修改: 2024-01-31 15:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-32393 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32393
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 01:15 修改: 2024-01-05 14:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-32435 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: memory corruption issue leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32435
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-06-23 18:15 修改: 2024-06-27 19:03
|
libwebkit2gtk-4.0-37 |
CVE-2023-32439 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: type confusion issue leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32439
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-06-23 18:15 修改: 2024-01-12 22:08
|
libwebkit2gtk-4.0-37 |
CVE-2023-35074 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-35074
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-09-27 15:18 修改: 2024-01-31 15:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-37450 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37450
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 00:15 修改: 2024-06-27 18:51
|
libwebkit2gtk-4.0-37 |
CVE-2023-38572 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: bypass Same Origin Policy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38572
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 01:15 修改: 2024-01-05 14:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-38592 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38592
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-28 05:15 修改: 2024-01-05 14:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-38594 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38594
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 00:15 修改: 2024-01-05 14:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-38595 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38595
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 01:15 修改: 2024-01-05 14:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-38597 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38597
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 00:15 修改: 2024-01-05 14:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-38600 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38600
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 01:15 修改: 2024-01-05 14:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-38611 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38611
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 01:15 修改: 2024-01-05 14:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-39434 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39434
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-09-27 15:18 修改: 2024-01-31 15:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-39928 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39928
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-10-06 16:15 修改: 2024-01-31 15:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-40451 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40451
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-09-27 15:19 修改: 2024-01-31 15:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-41074 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41074
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-09-27 15:19 修改: 2024-01-31 15:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-41993 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: processing malicious web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41993
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-09-21 19:15 修改: 2024-09-03 20:19
|
libwebkit2gtk-4.0-37 |
CVE-2023-42833 |
高危 |
2.32.4.1-1~deb10u1.1 |
2.38.0-1~deb10u1 |
webkitgtk: Processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42833
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-01-10 22:15 修改: 2024-02-06 02:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-42852 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42852
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-10-25 19:15 修改: 2024-02-16 15:24
|
libwebkit2gtk-4.0-37 |
CVE-2023-42890 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: processing malicious web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42890
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-12-12 01:15 修改: 2024-08-28 15:35
|
libwebkit2gtk-4.0-37 |
CVE-2023-42917 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Arbitrary Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42917
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-11-30 23:15 修改: 2024-06-26 20:01
|
libwebkit2gtk-4.0-37 |
CVE-2023-42950 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: heap use-after-free may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42950
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-03-28 16:15 修改: 2024-08-09 16:35
|
libwebkit2gtk-4.0-37 |
CVE-2024-23213 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23213
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-01-23 01:15 修改: 2024-06-12 10:15
|
libwebkit2gtk-4.0-37 |
CVE-2024-23222 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: type confusion may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23222
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-01-23 01:15 修改: 2024-08-14 17:00
|
libwebkit2gtk-4.0-37 |
CVE-2024-27808 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27808
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-06-10 21:15 修改: 2024-07-03 01:50
|
libwebkit2gtk-4.0-37 |
CVE-2024-27820 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27820
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-06-10 21:15 修改: 2024-07-03 01:50
|
libwebkit2gtk-4.0-37 |
CVE-2024-27833 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27833
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-06-10 21:15 修改: 2024-07-03 01:51
|
libwebkit2gtk-4.0-37 |
CVE-2024-27834 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: pointer authentication bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27834
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-05-14 15:13 修改: 2024-07-03 01:51
|
libwebkit2gtk-4.0-37 |
CVE-2024-27851 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27851
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-06-10 21:15 修改: 2024-07-03 16:13
|
libwebkit2gtk-4.0-37 |
CVE-2024-4558 |
高危 |
2.32.4.1-1~deb10u1.1 |
|
chromium-browser: Use after free in ANGLE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4558
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-05-07 19:15 修改: 2024-07-30 02:15
|
libxml2 |
CVE-2017-16932 |
高危 |
2.9.4.5-1+dde |
|
libxml2: Infinite recursion in parameter entities
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16932
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2017-11-23 21:29 修改: 2023-11-07 02:40
|
libxml2 |
CVE-2022-2309 |
高危 |
2.9.4.5-1+dde |
|
lxml: NULL Pointer Dereference in lxml
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2309
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-07-05 10:15 修改: 2023-11-07 03:46
|
libxml2 |
CVE-2024-25062 |
高危 |
2.9.4.5-1+dde |
|
libxml2: use-after-free in XMLReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25062
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2024-02-04 16:15 修改: 2024-02-13 00:40
|
libxml2-dev |
CVE-2017-16932 |
高危 |
2.9.4.5-1+dde |
|
libxml2: Infinite recursion in parameter entities
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16932
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-11-23 21:29 修改: 2023-11-07 02:40
|
libxml2-dev |
CVE-2022-2309 |
高危 |
2.9.4.5-1+dde |
|
lxml: NULL Pointer Dereference in lxml
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2309
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-07-05 10:15 修改: 2023-11-07 03:46
|
libxml2-dev |
CVE-2024-25062 |
高危 |
2.9.4.5-1+dde |
|
libxml2: use-after-free in XMLReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25062
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-02-04 16:15 修改: 2024-02-13 00:40
|
libxpm4 |
CVE-2022-44617 |
高危 |
1:3.5.12-1 |
1:3.5.12-1+deb10u1 |
libXpm: Runaway loop on width of 0 and enormous height
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44617
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-06 23:15 修改: 2023-11-07 03:54
|
libxpm4 |
CVE-2022-46285 |
高危 |
1:3.5.12-1 |
1:3.5.12-1+deb10u1 |
libXpm: Infinite loop on unclosed comments
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46285
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-07 19:15 修改: 2023-10-17 15:55
|
libxpm4 |
CVE-2022-4883 |
高危 |
1:3.5.12-1 |
1:3.5.12-1+deb10u1 |
libXpm: compression commands depend on $PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4883
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-07 19:15 修改: 2023-10-17 15:55
|
libass9 |
CVE-2020-24994 |
高危 |
1:0.14.0-2 |
|
Stack overflow in the parse_tag function in libass/ass_parse.c in liba ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24994
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-03-23 20:15 修改: 2022-07-22 13:19
|
libass9 |
CVE-2020-26682 |
高危 |
1:0.14.0-2 |
|
In libass 0.14.0, the `ass_outline_construct`'s call to `outline_strok ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26682
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-10-16 14:15 修改: 2022-06-15 03:12
|
libzen0v5 |
CVE-2020-36646 |
高危 |
0.4.37-1 |
0.4.37-1+deb10u1 |
A vulnerability classified as problematic has been found in MediaArea ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36646
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-07 20:15 修改: 2024-05-17 01:48
|
libatomic1 |
CVE-2018-12886 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libzmq5 |
CVE-2021-20235 |
高危 |
4.3.1.2-1 |
|
zeromq: Heap overflow when receiving malformed ZMTP v1 packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20235
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-04-01 14:15 修改: 2023-11-07 03:29
|
libzmq5 |
CVE-2021-20237 |
高危 |
4.3.1.2-1 |
|
zeromq: Memory leaks via metadata messages processed by PUB sockets
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20237
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-28 11:15 修改: 2022-08-05 15:20
|
locales |
CVE-2020-1751 |
高危 |
2.28.17-1+eagle |
|
glibc: array overflow in backtrace functions for powerpc
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-04-17 19:15 修改: 2023-11-07 03:19
|
locales-all |
CVE-2020-1751 |
高危 |
2.28.17-1+eagle |
|
glibc: array overflow in backtrace functions for powerpc
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1751
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-04-17 19:15 修改: 2023-11-07 03:19
|
mount |
CVE-2024-28085 |
高危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35
|
openssh-client |
CVE-2024-6387 |
高危 |
1:7.9p1.6-1+dde |
|
openssh: regreSSHion - race condition in SSH allows RCE/DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6387
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-07-01 13:15 修改: 2024-09-14 03:15
|
libatomic1 |
CVE-2019-15847 |
高危 |
8.3.0.3-3+rebuild |
|
gcc: POWER9 "DARN" RNG intrinsic produces repeated output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15847
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-09-02 23:15 修改: 2020-09-17 13:38
|
libavcodec58 |
CVE-2020-20891 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Buffer Overflow vulnerability in function config_input in libavfilter/ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20891
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:49
|
openssl |
CVE-2022-4450 |
高危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u4 |
openssl: double free after calling PEM_read_bio_ex
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2023-0215 |
高危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u4 |
openssl: use-after-free following BIO_new_NDEF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2023-0286 |
高危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u4 |
openssl: X.400 address type confusion in X.509 GeneralName
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2023-0464 |
高危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u5 |
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15
|
perl |
CVE-2020-16156 |
高危 |
5.28.1.2-6+deb10u1 |
|
perl-CPAN: Bypass of verification of signatures in CHECKSUMS files
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18
|
perl |
CVE-2023-31484 |
高危 |
5.28.1.2-6+deb10u1 |
|
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43
|
perl-base |
CVE-2020-16156 |
高危 |
5.28.1.2-6+deb10u1 |
|
perl-CPAN: Bypass of verification of signatures in CHECKSUMS files
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18
|
perl-base |
CVE-2023-31484 |
高危 |
5.28.1.2-6+deb10u1 |
|
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43
|
perl-modules-5.28 |
CVE-2020-16156 |
高危 |
5.28.1.2-6+deb10u1 |
|
perl-CPAN: Bypass of verification of signatures in CHECKSUMS files
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18
|
perl-modules-5.28 |
CVE-2023-31484 |
高危 |
5.28.1.2-6+deb10u1 |
|
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43
|
python2.7 |
CVE-2020-10735 |
高危 |
2.7.16.2-1+eagle |
|
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15
|
python2.7 |
CVE-2024-6232 |
高危 |
2.7.16.2-1+eagle |
|
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15
|
python2.7-minimal |
CVE-2020-10735 |
高危 |
2.7.16.2-1+eagle |
|
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10735
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-09-09 14:15 修改: 2023-06-30 23:15
|
python2.7-minimal |
CVE-2024-6232 |
高危 |
2.7.16.2-1+eagle |
|
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15
|
python3.7 |
CVE-2022-0391 |
高危 |
3.7.3.6-1+eagle |
|
python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41
|
python3.7 |
CVE-2023-24329 |
高危 |
3.7.3.6-1+eagle |
|
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
python3.7-minimal |
CVE-2022-0391 |
高危 |
3.7.3.6-1+eagle |
|
python: urllib.parse does not sanitize URLs containing ASCII newline and tabs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0391
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-09 23:15 修改: 2023-11-07 03:41
|
python3.7-minimal |
CVE-2023-24329 |
高危 |
3.7.3.6-1+eagle |
|
python: urllib.parse url blocklisting bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08
|
rfkill |
CVE-2024-28085 |
高危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35
|
libavcodec58 |
CVE-2020-20892 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function filter_frame in libavfilter/vf_len ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20892
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2023-11-07 03:19
|
libavcodec58 |
CVE-2020-20896 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function latm_write_packet in libavformat/l ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20896
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:46
|
libavcodec58 |
CVE-2020-21688 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the av_freep function in libavutil/mem.c of F ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21688
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
samba-libs |
CVE-2020-10704 |
高危 |
2:4.9.5.18-1+dde |
|
samba: LDAP Denial of Service (stack overflow) in Samba AD DC
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10704
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-05-06 14:15 修改: 2023-11-07 03:14
|
samba-libs |
CVE-2020-10745 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Parsing and packing of NBT and DNS packets can consume excessive CPU
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10745
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-07-07 14:15 修改: 2023-11-07 03:14
|
samba-libs |
CVE-2020-14303 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Empty UDP packet DoS in Samba AD DC nbtd
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14303
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-07-06 18:15 修改: 2023-11-07 03:17
|
samba-libs |
CVE-2020-25718 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Samba AD DC did not correctly sandbox Kerberos tickets issues by an RODC
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25718
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2020-25719 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25719
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2020-25720 |
高危 |
2:4.9.5.18-1+dde |
|
samba: check attribute access rights for LDAP adds of computers
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25720
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
samba-libs |
CVE-2020-25721 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Kerberos acceptors need easy access to stableAD identifiers (eg objectSid)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25721
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-03-16 15:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2020-25722 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Samba AD DC did not do sufficient access and conformance checking of data stored
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25722
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-18 18:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2021-3738 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Use after free in Samba AD DC RPC server
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3738
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-03-02 23:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2022-0336 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Samba AD users with permission to write to an account can impersonate arbitrary services
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0336
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-29 15:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2022-2031 |
高危 |
2:4.9.5.18-1+dde |
|
samba: kpasswd authentication with canonicalization enabled against Samba AD DC with Heimdal returns a krbtgt
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2031
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2022-32743 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Validated dnsHostname write right needs to be implemented
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32743
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-09-01 21:15 修改: 2023-11-07 03:48
|
samba-libs |
CVE-2022-32744 |
高危 |
2:4.9.5.18-1+dde |
|
samba: AD users can forge password change requests for any user
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32744
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2022-37966 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37966
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-11-09 22:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2022-37967 |
高危 |
2:4.9.5.18-1+dde |
|
samba: Kerberos constrained delegation ticket forgery possible against Samba AD DC
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37967
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-11-09 22:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2022-38023 |
高危 |
2:4.9.5.18-1+dde |
|
samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38023
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-11-09 22:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2022-42898 |
高危 |
2:4.9.5.18-1+dde |
|
krb5: integer overflow vulnerabilities in PAC parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42898
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-25 06:15 修改: 2023-10-08 09:15
|
samba-libs |
CVE-2023-34966 |
高危 |
2:4.9.5.18-1+dde |
|
samba: infinite loop in mdssvc RPC service for spotlight
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34966
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-07-20 15:15 修改: 2024-09-16 13:15
|
sudo |
CVE-2023-42465 |
高危 |
1.8.27.6-1+security |
|
sudo: Targeted Corruption of Register and Stack Variables
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42465
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-12-22 16:15 修改: 2024-02-18 03:15
|
systemd |
CVE-2019-3843 |
高危 |
241.26-1+dde |
|
systemd: services with DynamicUser can create SUID/SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3843
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10
|
systemd |
CVE-2019-3844 |
高危 |
241.26-1+dde |
|
systemd: services with DynamicUser can get new privileges and create SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3844
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10
|
systemd |
CVE-2023-50387 |
高危 |
241.26-1+dde |
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16
|
systemd |
CVE-2023-50868 |
高危 |
241.26-1+dde |
|
bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16
|
systemd-sysv |
CVE-2019-3843 |
高危 |
241.26-1+dde |
|
systemd: services with DynamicUser can create SUID/SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3843
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10
|
systemd-sysv |
CVE-2019-3844 |
高危 |
241.26-1+dde |
|
systemd: services with DynamicUser can get new privileges and create SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3844
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10
|
systemd-sysv |
CVE-2023-50387 |
高危 |
241.26-1+dde |
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16
|
systemd-sysv |
CVE-2023-50868 |
高危 |
241.26-1+dde |
|
bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16
|
udev |
CVE-2019-3843 |
高危 |
241.26-1+dde |
|
systemd: services with DynamicUser can create SUID/SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3843
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10
|
udev |
CVE-2019-3844 |
高危 |
241.26-1+dde |
|
systemd: services with DynamicUser can get new privileges and create SGID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3844
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-04-26 21:29 修改: 2023-11-07 03:10
|
udev |
CVE-2023-50387 |
高危 |
241.26-1+dde |
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16
|
udev |
CVE-2023-50868 |
高危 |
241.26-1+dde |
|
bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16
|
util-linux |
CVE-2024-28085 |
高危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35
|
uuid-dev |
CVE-2024-28085 |
高危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: CVE-2024-28085: wall: escape sequence injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35
|
libavcodec58 |
CVE-2022-3109 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
An issue was discovered in the FFmpeg package, where vp3_decode_frame ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3109
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-16 15:15 修改: 2023-11-07 03:50
|
vlc-data |
CVE-2020-26664 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A vulnerability in EbmlTypeDispatcher::send in VideoLAN VLC media play ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26664
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-01-08 18:15 修改: 2023-02-03 18:49
|
vlc-data |
CVE-2021-25801 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the __Parse_indx component of Video ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25801
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
vlc-data |
CVE-2021-25802 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the AVI_ExtractSubtitle component o ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25802
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
vlc-data |
CVE-2021-25803 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the vlc_input_attachment_New compon ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25803
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
vlc-data |
CVE-2021-25804 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A NULL-pointer dereference in "Open" in avi.c of VideoLAN VLC Media Pl ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25804
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2021-08-04 02:11
|
vlc-data |
CVE-2022-41325 |
高危 |
3.0.11.2-1 |
3.0.17.4-0+deb10u2 |
An integer overflow in the VNC module in VideoLAN VLC Media Player thr ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41325
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-06 16:15 修改: 2022-12-08 16:44
|
vlc-data |
CVE-2023-47360 |
高危 |
3.0.11.2-1 |
3.0.20-0+deb10u1 |
Videolan VLC prior to version 3.0.20 contains an Integer underflow tha ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47360
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-07 16:15 修改: 2023-12-01 02:15
|
libavcodec58 |
CVE-2022-48434 |
高危 |
7:4.1.8.1-1+dde |
|
libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48434
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-29 17:15 修改: 2024-10-21 16:35
|
vlc-plugin-base |
CVE-2020-26664 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A vulnerability in EbmlTypeDispatcher::send in VideoLAN VLC media play ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26664
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-01-08 18:15 修改: 2023-02-03 18:49
|
vlc-plugin-base |
CVE-2021-25801 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the __Parse_indx component of Video ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25801
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
vlc-plugin-base |
CVE-2021-25802 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the AVI_ExtractSubtitle component o ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25802
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
vlc-plugin-base |
CVE-2021-25803 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the vlc_input_attachment_New compon ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25803
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
vlc-plugin-base |
CVE-2021-25804 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A NULL-pointer dereference in "Open" in avi.c of VideoLAN VLC Media Pl ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25804
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2021-08-04 02:11
|
vlc-plugin-base |
CVE-2022-41325 |
高危 |
3.0.11.2-1 |
3.0.17.4-0+deb10u2 |
An integer overflow in the VNC module in VideoLAN VLC Media Player thr ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41325
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-06 16:15 修改: 2022-12-08 16:44
|
vlc-plugin-base |
CVE-2023-47360 |
高危 |
3.0.11.2-1 |
3.0.20-0+deb10u1 |
Videolan VLC prior to version 3.0.20 contains an Integer underflow tha ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47360
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-07 16:15 修改: 2023-12-01 02:15
|
libavcodec58 |
CVE-2024-32230 |
高危 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size- ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32230
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-08-22 13:24
|
vlc-plugin-video-output |
CVE-2020-26664 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A vulnerability in EbmlTypeDispatcher::send in VideoLAN VLC media play ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26664
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-01-08 18:15 修改: 2023-02-03 18:49
|
vlc-plugin-video-output |
CVE-2021-25801 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the __Parse_indx component of Video ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25801
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
vlc-plugin-video-output |
CVE-2021-25802 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the AVI_ExtractSubtitle component o ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25802
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
vlc-plugin-video-output |
CVE-2021-25803 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A buffer overflow vulnerability in the vlc_input_attachment_New compon ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25803
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2022-05-03 16:04
|
vlc-plugin-video-output |
CVE-2021-25804 |
高危 |
3.0.11.2-1 |
3.0.12-0+deb10u1 |
A NULL-pointer dereference in "Open" in avi.c of VideoLAN VLC Media Pl ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25804
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-26 17:15 修改: 2021-08-04 02:11
|
vlc-plugin-video-output |
CVE-2022-41325 |
高危 |
3.0.11.2-1 |
3.0.17.4-0+deb10u2 |
An integer overflow in the VNC module in VideoLAN VLC Media Player thr ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41325
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-12-06 16:15 修改: 2022-12-08 16:44
|
vlc-plugin-video-output |
CVE-2023-47360 |
高危 |
3.0.11.2-1 |
3.0.20-0+deb10u1 |
Videolan VLC prior to version 3.0.20 contains an Integer underflow tha ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47360
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-07 16:15 修改: 2023-12-01 02:15
|
libavcodec58 |
CVE-2024-7272 |
高危 |
7:4.1.8.1-1+dde |
|
A vulnerability, which was classified as critical, was found in FFmpeg ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7272
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-12 13:38 修改: 2024-08-13 15:16
|
libavdevice58 |
CVE-2020-20891 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Buffer Overflow vulnerability in function config_input in libavfilter/ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20891
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:49
|
wpasupplicant |
CVE-2024-5290 |
高危 |
2:2.7.5-1+dde |
|
wpa_supplicant: wpa_supplicant loading arbitrary shared objects allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5290
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-07 09:16 修改: 2024-09-17 13:09
|
xdg-utils |
CVE-2022-4055 |
高危 |
1.1.3+deepin-1+deepin |
|
xdg-utils: improper parse of mailto URIs allows bypass of Thunderbird security mechanism for attachments
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4055
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-11-19 00:15 修改: 2022-11-26 03:18
|
xz-utils |
CVE-2022-1271 |
高危 |
5.2.4-1 |
5.2.4-1+deb10u1 |
gzip: arbitrary-file-write vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1271
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-08-31 16:15 修改: 2024-08-26 10:47
|
libavdevice58 |
CVE-2020-20892 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function filter_frame in libavfilter/vf_len ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20892
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2023-11-07 03:19
|
libavdevice58 |
CVE-2020-20896 |
高危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
An issue was discovered in function latm_write_packet in libavformat/l ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20896
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:46
|
libarchive13 |
CVE-2023-30571 |
中危 |
3.3.3-4+deb10u1 |
|
libarchive: Race condition in multi-threaded use of archive_write_disk_header() on posix based systems
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30571
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-05-29 20:15 修改: 2023-06-05 16:40
|
libpython2.7-stdlib |
CVE-2023-27043 |
中危 |
2.7.16.2-1+eagle |
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
libpython2.7-stdlib |
CVE-2024-0397 |
中危 |
2.7.16.2-1+eagle |
|
cpython: python: Memory race condition in ssl.SSLContext certificate store methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44
|
libpython2.7-stdlib |
CVE-2024-6923 |
中危 |
2.7.16.2-1+eagle |
|
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15
|
libpython2.7-stdlib |
CVE-2024-9287 |
中危 |
2.7.16.2-1+eagle |
|
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-22 17:15 修改: 2024-10-23 15:12
|
bluez-obexd |
CVE-2023-51589 |
中危 |
5.50.22-1+dde |
|
bluez: audio profile avrcp parse_media_element out-of-bounds read information disclosure vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51589
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48
|
bluez-obexd |
CVE-2023-51592 |
中危 |
5.50.22-1+dde |
|
bluez: audio profile avrcp parse_media_folder out-of-bounds read information disclosure vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51592
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48
|
libpython3.7-minimal |
CVE-2021-23336 |
中危 |
3.7.3.6-1+eagle |
|
python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30
|
libpython3.7-minimal |
CVE-2023-27043 |
中危 |
3.7.3.6-1+eagle |
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
libpython3.7-minimal |
CVE-2024-0397 |
中危 |
3.7.3.6-1+eagle |
|
cpython: python: Memory race condition in ssl.SSLContext certificate store methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44
|
libfaad2 |
CVE-2018-20199 |
中危 |
2.8.8.2-1+security |
2.10.0-1~deb10u1 |
A NULL pointer dereference was discovered in ifilter_bank of libfaad/f ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20199
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-12-18 01:29 修改: 2022-04-22 20:40
|
libfaad2 |
CVE-2018-20360 |
中危 |
2.8.8.2-1+security |
2.10.0-1~deb10u1 |
An invalid memory address dereference was discovered in the sbr_proces ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20360
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-12-22 15:29 修改: 2022-04-22 20:40
|
libpython3.7-stdlib |
CVE-2021-23336 |
中危 |
3.7.3.6-1+eagle |
|
python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30
|
libpython3.7-stdlib |
CVE-2023-27043 |
中危 |
3.7.3.6-1+eagle |
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
libpython3.7-stdlib |
CVE-2024-0397 |
中危 |
3.7.3.6-1+eagle |
|
cpython: python: Memory race condition in ssl.SSLContext certificate store methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44
|
libqt4-dbus |
CVE-2021-28025 |
中危 |
4:4.8.7.1+dfsg-1+dde |
|
qt-qtsvg: Out of bounds read in function `QRadialFetchSimd<QSimdSse2>::fetch` when input craft svg file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28025
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-08-11 14:15 修改: 2023-08-21 15:41
|
libqt4-xml |
CVE-2021-28025 |
中危 |
4:4.8.7.1+dfsg-1+dde |
|
qt-qtsvg: Out of bounds read in function `QRadialFetchSimd<QSimdSse2>::fetch` when input craft svg file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28025
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-08-11 14:15 修改: 2023-08-21 15:41
|
libfaad2 |
CVE-2021-32276 |
中危 |
2.8.8.2-1+security |
2.10.0-1~deb10u1 |
An issue was discovered in faad2 through 2.10.0. A NULL pointer derefe ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32276
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2022-04-22 16:21
|
libqt5concurrent5 |
CVE-2023-34410 |
中危 |
5.15.1.8-1+dde |
|
qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34410
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-05 03:15 修改: 2023-11-07 04:15
|
libqt5concurrent5 |
CVE-2024-39936 |
中危 |
5.15.1.8-1+dde |
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39936
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-04 21:15 修改: 2024-07-08 16:41
|
libfaad2 |
CVE-2023-38857 |
中危 |
2.8.8.2-1+security |
|
Buffer Overflow vulnerability infaad2 v.2.10.1 allows a remote attacke ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38857
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-15 17:15 修改: 2024-01-10 13:15
|
libqt5core5a |
CVE-2023-34410 |
中危 |
5.15.1.8-1+dde |
|
qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34410
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-05 03:15 修改: 2023-11-07 04:15
|
libqt5core5a |
CVE-2024-39936 |
中危 |
5.15.1.8-1+dde |
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39936
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-04 21:15 修改: 2024-07-08 16:41
|
libfaad2 |
CVE-2023-38858 |
中危 |
2.8.8.2-1+security |
|
Buffer Overflow vulnerability infaad2 v.2.10.1 allows a remote attacke ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38858
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-15 17:15 修改: 2024-01-10 13:15
|
libqt5dbus5 |
CVE-2023-34410 |
中危 |
5.15.1.8-1+dde |
|
qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34410
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-05 03:15 修改: 2023-11-07 04:15
|
libqt5dbus5 |
CVE-2024-39936 |
中危 |
5.15.1.8-1+dde |
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39936
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-04 21:15 修改: 2024-07-08 16:41
|
curl |
CVE-2024-6874 |
中危 |
7.64.1.6-4+security |
|
curl: macidn punycode buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6874
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2024-07-24 08:15 修改: 2024-09-10 15:27
|
libqt5gui5 |
CVE-2023-34410 |
中危 |
5.15.1.8-1+dde |
|
qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34410
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-05 03:15 修改: 2023-11-07 04:15
|
libqt5gui5 |
CVE-2024-39936 |
中危 |
5.15.1.8-1+dde |
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39936
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-04 21:15 修改: 2024-07-08 16:41
|
libfdisk1 |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libqt5network5 |
CVE-2023-34410 |
中危 |
5.15.1.8-1+dde |
|
qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34410
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-05 03:15 修改: 2023-11-07 04:15
|
libqt5network5 |
CVE-2024-39936 |
中危 |
5.15.1.8-1+dde |
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39936
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-04 21:15 修改: 2024-07-08 16:41
|
libavformat58 |
CVE-2020-21697 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the mpeg_mux_write_packet function in libavfo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21697
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libqt5opengl5 |
CVE-2023-34410 |
中危 |
5.15.1.8-1+dde |
|
qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34410
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-05 03:15 修改: 2023-11-07 04:15
|
libqt5opengl5 |
CVE-2024-39936 |
中危 |
5.15.1.8-1+dde |
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39936
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-04 21:15 修改: 2024-07-08 16:41
|
libavformat58 |
CVE-2021-3566 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Prior to ffmpeg version 4.3, the tty demuxer did not have a 'read_prob ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3566
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-05 21:15 修改: 2022-12-21 15:01
|
libqt5printsupport5 |
CVE-2023-34410 |
中危 |
5.15.1.8-1+dde |
|
qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34410
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-05 03:15 修改: 2023-11-07 04:15
|
libqt5printsupport5 |
CVE-2024-39936 |
中危 |
5.15.1.8-1+dde |
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39936
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-04 21:15 修改: 2024-07-08 16:41
|
libavformat58 |
CVE-2022-3341 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
A null pointer dereference issue was discovered in 'FFmpeg' in decode_ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3341
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 15:15 修改: 2023-06-13 17:15
|
libqt5sql5 |
CVE-2023-34410 |
中危 |
5.15.1.8-1+dde |
|
qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34410
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-05 03:15 修改: 2023-11-07 04:15
|
libqt5sql5 |
CVE-2024-39936 |
中危 |
5.15.1.8-1+dde |
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39936
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-04 21:15 修改: 2024-07-08 16:41
|
libavformat58 |
CVE-2023-49502 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49502
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libqt5sql5-sqlite |
CVE-2023-34410 |
中危 |
5.15.1.8-1+dde |
|
qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34410
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-06-05 03:15 修改: 2023-11-07 04:15
|
libqt5sql5-sqlite |
CVE-2024-39936 |
中危 |
5.15.1.8-1+dde |
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39936
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-07-04 21:15 修改: 2024-07-08 16:41
|
libavformat58 |
CVE-2023-50010 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50010
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libqt5svg5 |
CVE-2021-28025 |
中危 |
5.15.1.2+dde-1+eagle |
|
qt-qtsvg: Out of bounds read in function `QRadialFetchSimd<QSimdSse2>::fetch` when input craft svg file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28025
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-11 14:15 修改: 2023-08-21 15:41
|
libqt5svg5 |
CVE-2021-45930 |
中危 |
5.15.1.2+dde-1+eagle |
|
qt: out-of-bounds write may lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45930
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-01 01:15 修改: 2023-11-07 03:39
|
libqt5svg5 |
CVE-2023-32573 |
中危 |
5.15.1.2+dde-1+eagle |
|
qt: Uninitialized variable usage in m_unitsPerEm
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32573
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-05-10 06:15 修改: 2023-11-07 04:14
|
libavformat58 |
CVE-2023-51793 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51793
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libqt5test5 |
CVE-2023-34410 |
中危 |
5.15.1.8-1+dde |
|
qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34410
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-06-05 03:15 修改: 2023-11-07 04:15
|
libqt5test5 |
CVE-2024-39936 |
中危 |
5.15.1.8-1+dde |
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39936
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-07-04 21:15 修改: 2024-07-08 16:41
|
libavformat58 |
CVE-2023-51794 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51794
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-26 15:15 修改: 2024-08-01 13:45
|
libqt5widgets5 |
CVE-2023-34410 |
中危 |
5.15.1.8-1+dde |
|
qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34410
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-05 03:15 修改: 2023-11-07 04:15
|
libqt5widgets5 |
CVE-2024-39936 |
中危 |
5.15.1.8-1+dde |
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39936
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-04 21:15 修改: 2024-07-08 16:41
|
libavformat58 |
CVE-2023-51798 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51798
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libqt5xml5 |
CVE-2023-34410 |
中危 |
5.15.1.8-1+dde |
|
qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34410
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-05 03:15 修改: 2023-11-07 04:15
|
libqt5xml5 |
CVE-2024-39936 |
中危 |
5.15.1.8-1+dde |
|
qtbase: qtbase: Delay any communication until encrypted() can be responded to
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39936
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-04 21:15 修改: 2024-07-08 16:41
|
libqtcore4 |
CVE-2021-28025 |
中危 |
4:4.8.7.1+dfsg-1+dde |
|
qt-qtsvg: Out of bounds read in function `QRadialFetchSimd<QSimdSse2>::fetch` when input craft svg file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28025
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-08-11 14:15 修改: 2023-08-21 15:41
|
libqtdbus4 |
CVE-2021-28025 |
中危 |
4:4.8.7.1+dfsg-1+dde |
|
qt-qtsvg: Out of bounds read in function `QRadialFetchSimd<QSimdSse2>::fetch` when input craft svg file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28025
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-08-11 14:15 修改: 2023-08-21 15:41
|
libqtgui4 |
CVE-2021-28025 |
中危 |
4:4.8.7.1+dfsg-1+dde |
|
qt-qtsvg: Out of bounds read in function `QRadialFetchSimd<QSimdSse2>::fetch` when input craft svg file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28025
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-08-11 14:15 修改: 2023-08-21 15:41
|
libavformat58 |
CVE-2024-31578 |
中危 |
7:4.1.8.1-1+dde |
|
FFmpeg version n6.1.1 was discovered to contain a heap use-after-free ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31578
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-17 14:15 修改: 2024-07-03 01:55
|
libavformat58 |
CVE-2024-7055 |
中危 |
7:4.1.8.1-1+dde |
|
A vulnerability was found in FFmpeg up to 7.0.1. It has been classifie ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7055
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-06 06:15 修改: 2024-08-06 16:30
|
fdisk |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
curl |
CVE-2024-7264 |
中危 |
7.64.1.6-4+security |
|
curl: libcurl: ASN.1 date parser overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2024-07-31 08:15 修改: 2024-08-12 17:30
|
libraw19 |
CVE-2020-22628 |
中危 |
0.19.2-2 |
0.19.2-2+deb10u4 |
libraw: Out of bounds read in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22628
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-22 19:16 修改: 2024-07-10 14:32
|
libraw19 |
CVE-2020-35530 |
中危 |
0.19.2-2 |
0.19.2-2+deb10u1 |
LibRaw: Out of bounds write in new_node() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35530
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2022-09-01 18:15 修改: 2022-09-29 16:33
|
libraw19 |
CVE-2020-35531 |
中危 |
0.19.2-2 |
0.19.2-2+deb10u1 |
LibRaw: Out-of-bounds read in get_huffman_diff() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35531
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2022-09-01 18:15 修改: 2022-09-29 16:31
|
libraw19 |
CVE-2020-35532 |
中危 |
0.19.2-2 |
0.19.2-2+deb10u1 |
LibRaw: Out-of-bounds read in simple_decode_row() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35532
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2022-09-01 18:15 修改: 2022-09-29 16:29
|
libraw19 |
CVE-2020-35533 |
中危 |
0.19.2-2 |
0.19.2-2+deb10u1 |
LibRaw: Out-of-bounds read in LibRaw::adobe_copy_pixel() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35533
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2022-09-01 18:15 修改: 2022-09-21 20:26
|
libraw19 |
CVE-2023-1729 |
中危 |
0.19.2-2 |
0.19.2-2+deb10u3 |
LibRaw: a heap-buffer-overflow in raw2image_ex()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1729
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-05-15 22:15 修改: 2024-07-10 14:27
|
librsvg2-2 |
CVE-2019-20446 |
中危 |
2.44.10-2.1 |
2.44.10-2.1+deb10u1 |
librsvg: Resource exhaustion via crafted SVG file with nested patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20446
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-02-02 14:15 修改: 2023-11-07 03:09
|
librsvg2-bin |
CVE-2019-20446 |
中危 |
2.44.10-2.1 |
2.44.10-2.1+deb10u1 |
librsvg: Resource exhaustion via crafted SVG file with nested patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20446
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-02-02 14:15 修改: 2023-11-07 03:09
|
librsvg2-common |
CVE-2019-20446 |
中危 |
2.44.10-2.1 |
2.44.10-2.1+deb10u1 |
librsvg: Resource exhaustion via crafted SVG file with nested patterns
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20446
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-02-02 14:15 修改: 2023-11-07 03:09
|
curl |
CVE-2024-8096 |
中危 |
7.64.1.6-4+security |
|
curl: OCSP stapling bypass with GnuTLS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26
|
libfreeimage3 |
CVE-2020-22524 |
中危 |
3.18.0+ds2-1+deb10u1 |
3.18.0+ds2-1+deb10u2 |
Buffer Overflow vulnerability in FreeImage_Load function in FreeImage ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22524
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-22 19:16 修改: 2023-12-18 05:15
|
libfreeimage3 |
CVE-2020-24294 |
中危 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in psdParser::UnpackRLE function in PSDP ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24294
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-22 19:16 修改: 2023-08-25 15:44
|
libfreeimage3 |
CVE-2021-33367 |
中危 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in Freeimage v3.18.0 allows attacker to ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33367
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-02-22 21:15 修改: 2023-11-07 03:35
|
libfreeimage3 |
CVE-2021-40262 |
中危 |
3.18.0+ds2-1+deb10u1 |
|
A stack exhaustion issue was discovered in FreeImage before 1.18.0 via ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40262
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-22 19:16 修改: 2023-08-25 18:11
|
libfreeimage3 |
CVE-2021-40264 |
中危 |
3.18.0+ds2-1+deb10u1 |
|
NULL pointer dereference vulnerability in FreeImage before 1.18.0 via ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40264
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-22 19:16 修改: 2023-08-25 18:07
|
libfreeimage3 |
CVE-2021-40266 |
中危 |
3.18.0+ds2-1+deb10u1 |
|
FreeImage before 1.18.0, ReadPalette function in PluginTIFF.cpp is vul ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40266
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:38
|
libfreeimage3 |
CVE-2023-47993 |
中危 |
3.18.0+ds2-1+deb10u1 |
|
A Buffer out-of-bound read vulnerability in Exif.cpp::ReadInt32 in Fre ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47993
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-01-09 23:15 修改: 2024-01-16 21:02
|
libsmartcols1 |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libfreeimage3 |
CVE-2023-47995 |
中危 |
3.18.0+ds2-1+deb10u1 |
|
Memory Allocation with Excessive Size Value discovered in BitmapAccess ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47995
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-01-09 23:15 修改: 2024-03-23 03:15
|
libfreeimage3 |
CVE-2023-47996 |
中危 |
3.18.0+ds2-1+deb10u1 |
|
An integer overflow vulnerability in Exif.cpp::jpeg_read_exif_dir in F ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47996
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-01-09 23:15 修改: 2024-01-16 20:59
|
libfreeimage3 |
CVE-2023-47997 |
中危 |
3.18.0+ds2-1+deb10u1 |
|
An issue discovered in BitmapAccess.cpp::FreeImage_AllocateBitmap in F ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47997
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-01-10 00:15 修改: 2024-03-23 03:15
|
dbus |
CVE-2022-42010 |
中危 |
1.12.20-0+deb10u1+rebuild |
1.12.24-0+deb10u1 |
dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42010
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49
|
libavahi-client3 |
CVE-2023-38469 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_dns_packet_append_record
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libavahi-client3 |
CVE-2023-38470 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_escape_label
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libavahi-client3 |
CVE-2023-38471 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in dbus_set_host_name
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libfribidi0 |
CVE-2022-25309 |
中危 |
1.0.5-3.1+deb10u1 |
1.0.5-3.1+deb10u2 |
fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25309
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-09-06 18:15 修改: 2023-02-12 22:15
|
libfribidi0 |
CVE-2022-25310 |
中危 |
1.0.5-3.1+deb10u1 |
1.0.5-3.1+deb10u2 |
fribidi: SEGV in fribidi_remove_bidi_marks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25310
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-09-06 18:15 修改: 2023-06-23 17:50
|
libavahi-client3 |
CVE-2023-38472 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_rdata_parse
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libavresample4 |
CVE-2020-21697 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the mpeg_mux_write_packet function in libavfo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21697
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libavresample4 |
CVE-2021-3566 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Prior to ffmpeg version 4.3, the tty demuxer did not have a 'read_prob ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3566
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-05 21:15 修改: 2022-12-21 15:01
|
libavresample4 |
CVE-2022-3341 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
A null pointer dereference issue was discovered in 'FFmpeg' in decode_ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3341
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 15:15 修改: 2023-06-13 17:15
|
libavresample4 |
CVE-2023-49502 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49502
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libavresample4 |
CVE-2023-50010 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50010
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libavresample4 |
CVE-2023-51793 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51793
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libgcrypt20 |
CVE-2019-13627 |
中危 |
1.8.4.2-1+dde |
|
libgcrypt: ECDSA timing attack allowing private key leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13627
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-09-25 15:15 修改: 2021-07-21 11:39
|
libgcrypt20 |
CVE-2024-2236 |
中危 |
1.8.4.2-1+dde |
|
libgcrypt: vulnerable to Marvin Attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2236
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-03-06 22:15 修改: 2024-09-14 04:15
|
libavresample4 |
CVE-2023-51794 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51794
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-26 15:15 修改: 2024-08-01 13:45
|
libavresample4 |
CVE-2023-51798 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51798
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libavresample4 |
CVE-2024-31578 |
中危 |
7:4.1.8.1-1+dde |
|
FFmpeg version n6.1.1 was discovered to contain a heap use-after-free ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31578
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-17 14:15 修改: 2024-07-03 01:55
|
libsmbclient |
CVE-2018-14628 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Unprivileged read of deleted object tombstones in AD LDAP server
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14628
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-17 18:15 修改: 2023-12-04 03:15
|
libsmbclient |
CVE-2019-14861 |
中危 |
2:4.9.5.18-1+dde |
|
samba: An authenticated user can crash the DCE/RPC DNS management server by creating records with matching the zone name
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14861
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-12-10 23:15 修改: 2024-06-25 02:15
|
libsmbclient |
CVE-2019-14870 |
中危 |
2:4.9.5.18-1+dde |
|
samba: The DelegationNotAllowed Kerberos feature restriction was not being applied when processing protocol transition requests (S4U2Self), in the AD DC KDC
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14870
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-12-10 23:15 修改: 2023-11-07 03:05
|
libsmbclient |
CVE-2020-10730 |
中危 |
2:4.9.5.18-1+dde |
|
samba: NULL pointer de-reference and use-after-free in Samba AD DC LDAP Server with ASQ, VLV and paged_results
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10730
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-07-07 14:15 修改: 2023-11-07 03:14
|
libsmbclient |
CVE-2020-10760 |
中危 |
2:4.9.5.18-1+dde |
|
samba: LDAP Use-after-free in Samba AD DC Global Catalog with paged_results and VLV
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10760
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-07-06 19:15 修改: 2023-11-07 03:14
|
libsmbclient |
CVE-2021-20251 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Race condition in the bad password lockout code
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20251
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-06 23:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2021-20254 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20254
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-05 14:15 修改: 2023-11-07 03:29
|
libsmbclient |
CVE-2021-20316 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Symlink race error can allow metadata read and modify outside of the exported share
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20316
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 16:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2021-3670 |
中危 |
2:4.9.5.18-1+dde |
|
samba: MaxQueryDuration not honoured in Samba AD DC LDAP
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3670
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 16:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2021-3671 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Null pointer dereference on missing sname in TGS-REQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38
|
libsmbclient |
CVE-2021-44141 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Information leak via symlinks of existance of files or directories outside of the exported share
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44141
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-21 18:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2022-32746 |
中危 |
2:4.9.5.18-1+dde |
|
samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2023-0225 |
中危 |
2:4.9.5.18-1+dde |
|
samba: AD DC "dnsHostname" attribute can be deleted by unprivileged authenticated users
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0225
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-03 23:15 修改: 2023-09-17 09:15
|
libsmbclient |
CVE-2023-0614 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Access controlled AD LDAP attributes can be discovered
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0614
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-03 23:15 修改: 2023-11-07 04:01
|
libsmbclient |
CVE-2023-0922 |
中危 |
2:4.9.5.18-1+dde |
|
samba: AD DC admin tool samba-tool sends passwords in cleartext
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0922
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-03 23:15 修改: 2023-11-07 04:01
|
libsmbclient |
CVE-2023-34967 |
中危 |
2:4.9.5.18-1+dde |
|
samba: type confusion in mdssvc RPC service for spotlight
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34967
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-07-20 15:15 修改: 2024-09-16 13:15
|
libsmbclient |
CVE-2023-34968 |
中危 |
2:4.9.5.18-1+dde |
|
samba: spotlight server-side share path disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34968
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-07-20 15:15 修改: 2024-09-16 13:15
|
libsmbclient |
CVE-2023-4154 |
中危 |
2:4.9.5.18-1+dde |
|
samba: AD DC password exposure to privileged users and RODCs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4154
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-07 20:15 修改: 2023-12-29 05:15
|
libsmbclient |
CVE-2023-42669 |
中危 |
2:4.9.5.18-1+dde |
|
samba: "rpcecho" development server allows denial of service via sleep() call on AD DC
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42669
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-06 07:15 修改: 2024-09-16 15:15
|
libavresample4 |
CVE-2024-7055 |
中危 |
7:4.1.8.1-1+dde |
|
A vulnerability was found in FFmpeg up to 7.0.1. It has been classifie ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7055
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-06 06:15 修改: 2024-08-06 16:30
|
libavahi-client3 |
CVE-2023-38473 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_alternative_host_name
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46
|
libspeex1 |
CVE-2020-23903 |
中危 |
1.2.1-1+rebuild |
|
speex: divide by zero in read_samples() via crafted WAV file
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-23903
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-10 22:15 修改: 2023-11-07 03:19
|
libspeexdsp1 |
CVE-2020-23903 |
中危 |
1.2.1-1+rebuild |
|
speex: divide by zero in read_samples() via crafted WAV file
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-23903
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-10 22:15 修改: 2023-11-07 03:19
|
libavahi-common-data |
CVE-2023-38469 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_dns_packet_append_record
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libavahi-common-data |
CVE-2023-38470 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_escape_label
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libsqlite3-0 |
CVE-2019-19645 |
中危 |
3.27.2.3-1+security |
|
sqlite: infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19645
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-12-09 16:15 修改: 2022-04-15 16:14
|
libsqlite3-0 |
CVE-2019-19924 |
中危 |
3.27.2.3-1+security |
|
sqlite: incorrect sqlite3WindowRewrite() error handling leads to mishandling certain parser-tree rewriting
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19924
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-12-24 16:15 修改: 2023-11-07 03:07
|
libsqlite3-0 |
CVE-2020-13631 |
中危 |
3.27.2.3-1+security |
|
sqlite: Virtual table can be renamed into the name of one of its shadow tables
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13631
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-05-27 15:15 修改: 2023-11-07 03:16
|
libavahi-common-data |
CVE-2023-38471 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in dbus_set_host_name
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libssh-gcrypt-4 |
CVE-2020-16135 |
中危 |
0.8.7.3-1+dde |
|
libssh: NULL pointer dereference in sftpserver.c if ssh_buffer_new returns NULL
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16135
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-07-29 21:15 修改: 2023-11-07 03:18
|
libssh-gcrypt-4 |
CVE-2023-48795 |
中危 |
0.8.7.3-1+dde |
|
ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48795
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-12-18 16:15 修改: 2024-05-01 18:15
|
libssh-gcrypt-4 |
CVE-2023-6004 |
中危 |
0.8.7.3-1+dde |
|
libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6004
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-01-03 17:15 修改: 2024-09-16 18:15
|
libssh-gcrypt-4 |
CVE-2023-6918 |
中危 |
0.8.7.3-1+dde |
|
libssh: Missing checks for return values for digests
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6918
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-12-19 00:15 修改: 2024-09-16 18:15
|
libavahi-common-data |
CVE-2023-38472 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_rdata_parse
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libavahi-common-data |
CVE-2023-38473 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_alternative_host_name
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46
|
libavahi-common3 |
CVE-2023-38469 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_dns_packet_append_record
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libavahi-common3 |
CVE-2023-38470 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_escape_label
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libgroupsock8 |
CVE-2021-38381 |
中危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 does not handle MPEG-1 or 2 files properly. Sendi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38381
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 18:15 修改: 2023-11-07 03:37
|
libgroupsock8 |
CVE-2021-38382 |
中危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 does not handle Matroska and Ogg files properly. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38382
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 18:15 修改: 2023-11-07 03:37
|
libssl1.1 |
CVE-2022-2097 |
中危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u4 |
openssl: AES OCB fails to encrypt some bytes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2022-4304 |
中危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u4 |
openssl: timing attack in RSA Decryption implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2023-0465 |
中危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u5 |
openssl: Invalid certificate policies in leaf certificates are silently ignored
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2023-0466 |
中危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u5 |
openssl: Certificate policy check not enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2023-2650 |
中危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u5 |
openssl: Possible DoS translating ASN.1 object identifiers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-05-30 14:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2023-3446 |
中危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u6 |
openssl: Excessive time spent checking DH keys and parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3446
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-07-19 12:15 修改: 2024-10-14 15:15
|
libssl1.1 |
CVE-2023-3817 |
中危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u6 |
OpenSSL: Excessive time spent checking DH q parameter value
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3817
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-07-31 16:15 修改: 2024-10-14 15:15
|
libssl1.1 |
CVE-2023-5678 |
中危 |
1.1.1d.6-1 |
|
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5678
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-06 16:15 修改: 2024-10-14 15:15
|
libssl1.1 |
CVE-2024-0727 |
中危 |
1.1.1d.6-1 |
|
openssl: denial of service via null dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15
|
libssl1.1 |
CVE-2024-4741 |
中危 |
1.1.1d.6-1 |
|
openssl: Use After Free with SSL_free_buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libssl1.1 |
CVE-2024-5535 |
中危 |
1.1.1d.6-1 |
|
openssl: SSL_select_next_proto buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15
|
libssl1.1 |
CVE-2024-6119 |
中危 |
1.1.1d.6-1 |
|
openssl: Possible denial of service in X.509 name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35
|
libgroupsock8 |
CVE-2021-39283 |
中危 |
2018.11.26.1-1+eagle |
|
liveMedia/FramedSource.cpp in Live555 through 1.08 allows an assertion ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39283
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-18 17:15 修改: 2023-11-07 03:37
|
libavutil56 |
CVE-2020-21697 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the mpeg_mux_write_packet function in libavfo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21697
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libavutil56 |
CVE-2021-3566 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Prior to ffmpeg version 4.3, the tty demuxer did not have a 'read_prob ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3566
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-05 21:15 修改: 2022-12-21 15:01
|
libavutil56 |
CVE-2022-3341 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
A null pointer dereference issue was discovered in 'FFmpeg' in decode_ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3341
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 15:15 修改: 2023-06-13 17:15
|
libavutil56 |
CVE-2023-49502 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49502
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libavutil56 |
CVE-2023-50010 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50010
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libavutil56 |
CVE-2023-51793 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51793
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libavutil56 |
CVE-2023-51794 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51794
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-26 15:15 修改: 2024-08-01 13:45
|
libavutil56 |
CVE-2023-51798 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51798
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libgssapi-krb5-2 |
CVE-2024-26458 |
中危 |
1.17.4-1+eagle |
|
krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09
|
libgssapi-krb5-2 |
CVE-2024-26461 |
中危 |
1.17.4-1+eagle |
|
krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35
|
libavutil56 |
CVE-2024-31578 |
中危 |
7:4.1.8.1-1+dde |
|
FFmpeg version n6.1.1 was discovered to contain a heap use-after-free ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31578
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-17 14:15 修改: 2024-07-03 01:55
|
libswresample3 |
CVE-2020-21697 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the mpeg_mux_write_packet function in libavfo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21697
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libswresample3 |
CVE-2021-3566 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Prior to ffmpeg version 4.3, the tty demuxer did not have a 'read_prob ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3566
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-05 21:15 修改: 2022-12-21 15:01
|
libswresample3 |
CVE-2022-3341 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
A null pointer dereference issue was discovered in 'FFmpeg' in decode_ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3341
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 15:15 修改: 2023-06-13 17:15
|
libswresample3 |
CVE-2023-49502 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49502
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libswresample3 |
CVE-2023-50010 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50010
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libswresample3 |
CVE-2023-51793 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51793
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libswresample3 |
CVE-2023-51794 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51794
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-26 15:15 修改: 2024-08-01 13:45
|
libswresample3 |
CVE-2023-51798 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51798
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libswresample3 |
CVE-2024-31578 |
中危 |
7:4.1.8.1-1+dde |
|
FFmpeg version n6.1.1 was discovered to contain a heap use-after-free ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31578
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-17 14:15 修改: 2024-07-03 01:55
|
libswresample3 |
CVE-2024-7055 |
中危 |
7:4.1.8.1-1+dde |
|
A vulnerability was found in FFmpeg up to 7.0.1. It has been classifie ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7055
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-06 06:15 修改: 2024-08-06 16:30
|
libavutil56 |
CVE-2024-7055 |
中危 |
7:4.1.8.1-1+dde |
|
A vulnerability was found in FFmpeg up to 7.0.1. It has been classifie ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7055
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-06 06:15 修改: 2024-08-06 16:30
|
libavahi-common3 |
CVE-2023-38471 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in dbus_set_host_name
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libavahi-common3 |
CVE-2023-38472 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_rdata_parse
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libavahi-common3 |
CVE-2023-38473 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_alternative_host_name
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46
|
libavahi-glib1 |
CVE-2023-38469 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_dns_packet_append_record
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38469
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libavahi-glib1 |
CVE-2023-38470 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_escape_label
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38470
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libharfbuzz-icu0 |
CVE-2022-33068 |
中危 |
2.3.1-1 |
|
harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33068
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-06-23 17:15 修改: 2023-11-07 03:48
|
libavahi-glib1 |
CVE-2023-38471 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in dbus_set_host_name
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38471
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libswscale5 |
CVE-2020-21697 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the mpeg_mux_write_packet function in libavfo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21697
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libswscale5 |
CVE-2021-3566 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Prior to ffmpeg version 4.3, the tty demuxer did not have a 'read_prob ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3566
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-05 21:15 修改: 2022-12-21 15:01
|
libswscale5 |
CVE-2022-3341 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
A null pointer dereference issue was discovered in 'FFmpeg' in decode_ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3341
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 15:15 修改: 2023-06-13 17:15
|
libswscale5 |
CVE-2023-49502 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49502
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libswscale5 |
CVE-2023-50010 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50010
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libswscale5 |
CVE-2023-51793 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51793
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libswscale5 |
CVE-2023-51794 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51794
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-26 15:15 修改: 2024-08-01 13:45
|
libswscale5 |
CVE-2023-51798 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51798
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libswscale5 |
CVE-2024-31578 |
中危 |
7:4.1.8.1-1+dde |
|
FFmpeg version n6.1.1 was discovered to contain a heap use-after-free ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31578
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-17 14:15 修改: 2024-07-03 01:55
|
libswscale5 |
CVE-2024-7055 |
中危 |
7:4.1.8.1-1+dde |
|
A vulnerability was found in FFmpeg up to 7.0.1. It has been classifie ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7055
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-06 06:15 修改: 2024-08-06 16:30
|
libharfbuzz0b |
CVE-2022-33068 |
中危 |
2.3.1-1 |
|
harfbuzz: integer overflow in the component hb-ot-shape-fallback.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33068
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-06-23 17:15 修改: 2023-11-07 03:48
|
libbasicusageenvironment1 |
CVE-2021-38381 |
中危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 does not handle MPEG-1 or 2 files properly. Sendi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38381
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 18:15 修改: 2023-11-07 03:37
|
libbasicusageenvironment1 |
CVE-2021-38382 |
中危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 does not handle Matroska and Ogg files properly. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38382
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 18:15 修改: 2023-11-07 03:37
|
libbasicusageenvironment1 |
CVE-2021-39283 |
中危 |
2018.11.26.1-1+eagle |
|
liveMedia/FramedSource.cpp in Live555 through 1.08 allows an assertion ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39283
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-18 17:15 修改: 2023-11-07 03:37
|
libsystemd0 |
CVE-2021-3997 |
中危 |
241.26-1+dde |
|
systemd: Uncontrolled recursion in systemd-tmpfiles when removing files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3997
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-08-23 20:15 修改: 2023-05-03 12:15
|
libsystemd0 |
CVE-2022-4415 |
中危 |
241.26-1+dde |
|
systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19
|
libsystemd0 |
CVE-2023-7008 |
中危 |
241.26-1+dde |
|
systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-12-23 13:15 修改: 2024-09-16 17:16
|
libavahi-glib1 |
CVE-2023-38472 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_rdata_parse
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38472
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-02 15:15 修改: 2023-11-09 19:58
|
libblkid-dev |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libavahi-glib1 |
CVE-2023-38473 |
中危 |
0.7.5-4+deb10u1+security |
|
avahi: Reachable assertion in avahi_alternative_host_name
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38473
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-02 16:15 修改: 2023-11-09 17:46
|
libtiff5 |
CVE-2022-40090 |
中危 |
4.1.0+git191117.1-1+security |
|
libtiff: infinite loop via a crafted TIFF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40090
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:13
|
libtiff5 |
CVE-2023-6277 |
中危 |
4.1.0+git191117.1-1+security |
|
libtiff: Out-of-memory in TIFFOpen via a craft file
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6277
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-24 19:15 修改: 2024-09-17 01:15
|
libtinfo6 |
CVE-2023-50495 |
中危 |
6.1+20181013.1-1+dde+rb2 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15
|
libblkid1 |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
dbus |
CVE-2022-42011 |
中危 |
1.12.20-0+deb10u1+rebuild |
1.12.24-0+deb10u1 |
dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42011
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49
|
dbus |
CVE-2022-42012 |
中危 |
1.12.20-0+deb10u1+rebuild |
1.12.24-0+deb10u1 |
dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42012
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49
|
dbus |
CVE-2023-34969 |
中危 |
1.12.20-0+deb10u1+rebuild |
1.12.28-0+deb10u1 |
dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34969
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-06-08 03:15 修改: 2023-12-27 16:36
|
gdisk |
CVE-2020-0256 |
中危 |
1.0.3.1-1+eagle |
|
gdisk: possible out-of-bounds-write in LoadPartitionTable of gpt.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-0256
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-08-11 20:15 修改: 2021-02-11 14:51
|
libbluetooth3 |
CVE-2023-51580 |
中危 |
5.50.22-1+dde |
|
bluez: avrcp_parse_attribute_list out-of-bounds read information disclosure vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51580
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48
|
libbluetooth3 |
CVE-2023-51589 |
中危 |
5.50.22-1+dde |
|
bluez: audio profile avrcp parse_media_element out-of-bounds read information disclosure vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51589
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48
|
libbluetooth3 |
CVE-2023-51592 |
中危 |
5.50.22-1+dde |
|
bluez: audio profile avrcp parse_media_folder out-of-bounds read information disclosure vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51592
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48
|
gdisk |
CVE-2021-0308 |
中危 |
1.0.3.1-1+eagle |
|
gdisk: possible out-of-bounds-write in ReadLogicalParts of basicmbr.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-0308
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-01-11 22:15 修改: 2022-02-09 17:02
|
libc-bin |
CVE-2023-4806 |
中危 |
2.28.17-1+eagle |
|
glibc: potential use-after-free in getaddrinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15
|
libudev1 |
CVE-2021-3997 |
中危 |
241.26-1+dde |
|
systemd: Uncontrolled recursion in systemd-tmpfiles when removing files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3997
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-08-23 20:15 修改: 2023-05-03 12:15
|
libudev1 |
CVE-2022-4415 |
中危 |
241.26-1+dde |
|
systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19
|
libudev1 |
CVE-2023-7008 |
中危 |
241.26-1+dde |
|
systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-12-23 13:15 修改: 2024-09-16 17:16
|
libc-bin |
CVE-2023-4813 |
中危 |
2.28.17-1+eagle |
|
glibc: potential use-after-free in gaih_inet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15
|
dbus-x11 |
CVE-2022-42010 |
中危 |
1.12.20-0+deb10u1+rebuild |
1.12.24-0+deb10u1 |
dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42010
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49
|
libc-dev-bin |
CVE-2023-4806 |
中危 |
2.28.17-1+eagle |
|
glibc: potential use-after-free in getaddrinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15
|
libc-dev-bin |
CVE-2023-4813 |
中危 |
2.28.17-1+eagle |
|
glibc: potential use-after-free in gaih_inet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15
|
dbus-x11 |
CVE-2022-42011 |
中危 |
1.12.20-0+deb10u1+rebuild |
1.12.24-0+deb10u1 |
dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42011
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49
|
libc-l10n |
CVE-2023-4806 |
中危 |
2.28.17-1+eagle |
|
glibc: potential use-after-free in getaddrinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15
|
libc-l10n |
CVE-2023-4813 |
中危 |
2.28.17-1+eagle |
|
glibc: potential use-after-free in gaih_inet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15
|
gnupg |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48
|
libc6 |
CVE-2023-4806 |
中危 |
2.28.17-1+eagle |
|
glibc: potential use-after-free in getaddrinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15
|
libc6 |
CVE-2023-4813 |
中危 |
2.28.17-1+eagle |
|
glibc: potential use-after-free in gaih_inet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15
|
libusageenvironment3 |
CVE-2021-38381 |
中危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 does not handle MPEG-1 or 2 files properly. Sendi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38381
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 18:15 修改: 2023-11-07 03:37
|
libusageenvironment3 |
CVE-2021-38382 |
中危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 does not handle Matroska and Ogg files properly. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38382
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 18:15 修改: 2023-11-07 03:37
|
libusageenvironment3 |
CVE-2021-39283 |
中危 |
2018.11.26.1-1+eagle |
|
liveMedia/FramedSource.cpp in Live555 through 1.08 allows an assertion ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39283
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-18 17:15 修改: 2023-11-07 03:37
|
libavcodec58 |
CVE-2020-21697 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the mpeg_mux_write_packet function in libavfo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21697
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libuuid1 |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libc6-dev |
CVE-2023-4806 |
中危 |
2.28.17-1+eagle |
|
glibc: potential use-after-free in getaddrinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15
|
libc6-dev |
CVE-2023-4813 |
中危 |
2.28.17-1+eagle |
|
glibc: potential use-after-free in gaih_inet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15
|
libavcodec58 |
CVE-2021-3566 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Prior to ffmpeg version 4.3, the tty demuxer did not have a 'read_prob ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3566
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-05 21:15 修改: 2022-12-21 15:01
|
libavcodec58 |
CVE-2022-3341 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
A null pointer dereference issue was discovered in 'FFmpeg' in decode_ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3341
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 15:15 修改: 2023-06-13 17:15
|
libavcodec58 |
CVE-2023-49502 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49502
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libavcodec58 |
CVE-2023-50010 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50010
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libavcodec58 |
CVE-2023-51793 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51793
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libavcodec58 |
CVE-2023-51794 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51794
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-26 15:15 修改: 2024-08-01 13:45
|
libavcodec58 |
CVE-2023-51798 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51798
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libavcodec58 |
CVE-2024-31578 |
中危 |
7:4.1.8.1-1+dde |
|
FFmpeg version n6.1.1 was discovered to contain a heap use-after-free ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31578
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-17 14:15 修改: 2024-07-03 01:55
|
libavcodec58 |
CVE-2024-7055 |
中危 |
7:4.1.8.1-1+dde |
|
A vulnerability was found in FFmpeg up to 7.0.1. It has been classifie ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7055
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-06 06:15 修改: 2024-08-06 16:30
|
libcrypto++6 |
CVE-2021-40530 |
中危 |
5.6.4-8 |
|
The ElGamal implementation in Crypto++ through 8.5 allows plaintext re ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40530
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-06 19:15 修改: 2023-11-07 03:38
|
libcrypto++6 |
CVE-2023-50979 |
中危 |
5.6.4-8 |
|
Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50979
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-12-18 04:15 修改: 2023-12-27 18:59
|
gnupg-l10n |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48
|
gnupg-utils |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48
|
gpg |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48
|
libwavpack1 |
CVE-2020-35738 |
中危 |
5.1.0.1-1+dde |
|
wavpack: out-of-bounds write in WavpackPackSamples function in pack_utils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35738
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-12-28 04:15 修改: 2023-11-07 03:22
|
libwavpack1 |
CVE-2022-2476 |
中危 |
5.1.0.1-1+dde |
|
wavpack: null pointer dereference in main() in cli/wvunpack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2476
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-07-19 20:15 修改: 2023-11-07 03:46
|
libwayland-client0 |
CVE-2021-3782 |
中危 |
1.16.0-1 |
|
wayland: libwayland-server wl_shm reference-count overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3782
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-09-23 16:15 修改: 2023-11-07 03:38
|
libwayland-cursor0 |
CVE-2021-3782 |
中危 |
1.16.0-1 |
|
wayland: libwayland-server wl_shm reference-count overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3782
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-09-23 16:15 修改: 2023-11-07 03:38
|
libwayland-egl1 |
CVE-2021-3782 |
中危 |
1.16.0-1 |
|
wayland: libwayland-server wl_shm reference-count overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3782
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-09-23 16:15 修改: 2023-11-07 03:38
|
libwayland-server0 |
CVE-2021-3782 |
中危 |
1.16.0-1 |
|
wayland: libwayland-server wl_shm reference-count overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3782
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-09-23 16:15 修改: 2023-11-07 03:38
|
libcurl3-gnutls |
CVE-2024-6874 |
中危 |
7.64.1.6-4+security |
|
curl: macidn punycode buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6874
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-24 08:15 修改: 2024-09-10 15:27
|
libcurl3-gnutls |
CVE-2024-7264 |
中危 |
7.64.1.6-4+security |
|
curl: libcurl: ASN.1 date parser overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-31 08:15 修改: 2024-08-12 17:30
|
libcurl3-gnutls |
CVE-2024-8096 |
中危 |
7.64.1.6-4+security |
|
curl: OCSP stapling bypass with GnuTLS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26
|
gpg-agent |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48
|
gpg-wks-client |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48
|
libcurl4 |
CVE-2024-6874 |
中危 |
7.64.1.6-4+security |
|
curl: macidn punycode buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6874
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2024-07-24 08:15 修改: 2024-09-10 15:27
|
libcurl4 |
CVE-2024-7264 |
中危 |
7.64.1.6-4+security |
|
curl: libcurl: ASN.1 date parser overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2024-07-31 08:15 修改: 2024-08-12 17:30
|
libcurl4 |
CVE-2024-8096 |
中危 |
7.64.1.6-4+security |
|
curl: OCSP stapling bypass with GnuTLS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26
|
libjavascriptcoregtk-4.0-18 |
CVE-2021-30823 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.34.1-1~deb10u1 |
webkitgtk: Logic issue leading to HSTS bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30823
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2021-10-28 19:15 修改: 2023-01-09 16:41
|
libjavascriptcoregtk-4.0-18 |
CVE-2021-30884 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.34.1-1~deb10u1 |
webkitgtk: CSS compositing issue leading to revealing of the browsing history
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30884
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2021-08-24 19:15 修改: 2023-11-07 03:33
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-0108 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.38.6-0+deb10u1 |
Inappropriate implementation in Navigation in Google Chrome prior to 9 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0108
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-02-12 00:15 修改: 2023-11-07 03:41
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-22589 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.34.6-1~deb10u1 |
webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22589
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-03-18 18:15 修改: 2023-08-08 14:22
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-22594 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.34.4-1~deb10u1 |
webkitgtk: A malicious website may exfiltrate data cross-origin
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22594
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-03-18 18:15 修改: 2022-03-28 16:40
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-32891 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.36.6-1~deb10u1 |
webkitgtk: UI spoofing while Visiting a website that frames malicious content
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32891
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-02-27 20:15 修改: 2023-05-30 06:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-32919 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.38.4-1 |
webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32919
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-01-10 22:15 修改: 2024-01-17 18:23
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-32933 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.38.0-1 |
webkitgtk: A website may able to track visited websites in private browsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32933
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-06-10 20:15 修改: 2024-06-12 18:07
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-46705 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.38.4-1 |
webkitgtk: Visiting a malicious website may lead to address bar spoofing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46705
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-02-27 20:15 修改: 2023-12-28 14:48
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-46725 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.38.4-1 |
webkitgtk: Visiting a malicious website may lead to address bar spoofing.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46725
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-08-14 23:15 修改: 2023-12-27 22:04
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-32370 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: content security policy blacklist failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32370
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-09-06 02:15 修改: 2024-01-05 14:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-38133 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: disclose sensitive information
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38133
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 00:15 修改: 2024-01-05 14:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-38599 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: track sensitive user information
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38599
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-28 05:15 修改: 2024-01-05 14:15
|
libwbclient0 |
CVE-2018-14628 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Unprivileged read of deleted object tombstones in AD LDAP server
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14628
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-17 18:15 修改: 2023-12-04 03:15
|
libwbclient0 |
CVE-2019-14861 |
中危 |
2:4.9.5.18-1+dde |
|
samba: An authenticated user can crash the DCE/RPC DNS management server by creating records with matching the zone name
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14861
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-12-10 23:15 修改: 2024-06-25 02:15
|
libwbclient0 |
CVE-2019-14870 |
中危 |
2:4.9.5.18-1+dde |
|
samba: The DelegationNotAllowed Kerberos feature restriction was not being applied when processing protocol transition requests (S4U2Self), in the AD DC KDC
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14870
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-12-10 23:15 修改: 2023-11-07 03:05
|
libwbclient0 |
CVE-2020-10730 |
中危 |
2:4.9.5.18-1+dde |
|
samba: NULL pointer de-reference and use-after-free in Samba AD DC LDAP Server with ASQ, VLV and paged_results
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10730
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-07-07 14:15 修改: 2023-11-07 03:14
|
libwbclient0 |
CVE-2020-10760 |
中危 |
2:4.9.5.18-1+dde |
|
samba: LDAP Use-after-free in Samba AD DC Global Catalog with paged_results and VLV
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10760
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-07-06 19:15 修改: 2023-11-07 03:14
|
libwbclient0 |
CVE-2021-20251 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Race condition in the bad password lockout code
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20251
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-06 23:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2021-20254 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20254
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-05 14:15 修改: 2023-11-07 03:29
|
libwbclient0 |
CVE-2021-20316 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Symlink race error can allow metadata read and modify outside of the exported share
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20316
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 16:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2021-3670 |
中危 |
2:4.9.5.18-1+dde |
|
samba: MaxQueryDuration not honoured in Samba AD DC LDAP
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3670
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 16:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2021-3671 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Null pointer dereference on missing sname in TGS-REQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38
|
libwbclient0 |
CVE-2021-44141 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Information leak via symlinks of existance of files or directories outside of the exported share
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44141
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-21 18:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2022-32746 |
中危 |
2:4.9.5.18-1+dde |
|
samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2023-0225 |
中危 |
2:4.9.5.18-1+dde |
|
samba: AD DC "dnsHostname" attribute can be deleted by unprivileged authenticated users
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0225
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-03 23:15 修改: 2023-09-17 09:15
|
libwbclient0 |
CVE-2023-0614 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Access controlled AD LDAP attributes can be discovered
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0614
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-03 23:15 修改: 2023-11-07 04:01
|
libwbclient0 |
CVE-2023-0922 |
中危 |
2:4.9.5.18-1+dde |
|
samba: AD DC admin tool samba-tool sends passwords in cleartext
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0922
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-03 23:15 修改: 2023-11-07 04:01
|
libwbclient0 |
CVE-2023-34967 |
中危 |
2:4.9.5.18-1+dde |
|
samba: type confusion in mdssvc RPC service for spotlight
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34967
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-07-20 15:15 修改: 2024-09-16 13:15
|
libwbclient0 |
CVE-2023-34968 |
中危 |
2:4.9.5.18-1+dde |
|
samba: spotlight server-side share path disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34968
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-07-20 15:15 修改: 2024-09-16 13:15
|
libwbclient0 |
CVE-2023-4154 |
中危 |
2:4.9.5.18-1+dde |
|
samba: AD DC password exposure to privileged users and RODCs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4154
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-07 20:15 修改: 2023-12-29 05:15
|
libwbclient0 |
CVE-2023-42669 |
中危 |
2:4.9.5.18-1+dde |
|
samba: "rpcecho" development server allows denial of service via sleep() call on AD DC
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42669
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-06 07:15 修改: 2024-09-16 15:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-41983 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing web content may lead to a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41983
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-10-25 19:15 修改: 2024-01-31 15:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-42843 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: visiting a malicious website may lead to address bar spoofing
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42843
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-02-21 07:15 修改: 2024-05-07 06:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-42883 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: processing a malicious image may lead to a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42883
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-12-12 01:15 修改: 2024-06-12 10:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-42916 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Out-of-bounds read leads to sensitive data leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42916
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-11-30 23:15 修改: 2024-08-14 19:56
|
libjavascriptcoregtk-4.0-18 |
CVE-2023-42956 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: processing malicious web content may lead to a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42956
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-03-28 16:15 修改: 2024-06-12 10:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-23206 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: A maliciously crafted webpage may be able to fingerprint the user
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23206
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-01-23 01:15 修改: 2024-06-12 10:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-23254 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: malicious website may exfiltrate audio data cross-origin
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23254
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-03-08 02:15 修改: 2024-05-07 06:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-23263 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: processing malicious web content prevents Content Security Policy from being enforced
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23263
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-03-08 02:15 修改: 2024-07-03 01:47
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-23271 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: A malicious website may cause unexpected cross-origin behavior
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23271
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-04-24 17:15 修改: 2024-07-03 01:47
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-23280 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: maliciously crafted webpage may be able to fingerprint the user
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23280
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-03-08 02:15 修改: 2024-05-07 06:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-23284 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23284
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-03-08 02:15 修改: 2024-05-07 06:15
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-27838 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: A maliciously crafted webpage may be able to fingerprint the user
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27838
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-06-10 21:15 修改: 2024-07-03 16:27
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-40776 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40776
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-29 23:15 修改: 2024-08-20 15:19
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-40779 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40779
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-29 23:15 修改: 2024-08-15 16:07
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-40780 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40780
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-29 23:15 修改: 2024-08-15 16:47
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-40782 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40782
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-29 23:15 修改: 2024-08-01 13:58
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-40785 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to a cross site scripting attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40785
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-29 23:15 修改: 2024-08-15 16:46
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-40789 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40789
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-29 23:15 修改: 2024-08-23 15:38
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-40794 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: webkit2gtk: Private Browsing tabs may be accessed without authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40794
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-29 23:15 修改: 2024-08-23 15:18
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-40866 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Visiting a malicious website may lead to address bar spoofing
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40866
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-09-17 00:15 修改: 2024-09-24 19:02
|
libjavascriptcoregtk-4.0-18 |
CVE-2024-44187 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: A malicious website may exfiltrate data cross-origin
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44187
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-09-17 00:15 修改: 2024-09-25 13:25
|
libjpeg62-turbo |
CVE-2020-35538 |
中危 |
1:1.5.2.6-1+dde |
|
libjpeg-turbo: Null pointer dereference in jcopy_sample_rows() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35538
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-31 16:15 修改: 2022-09-20 17:39
|
libjpeg62-turbo |
CVE-2021-46822 |
中危 |
1:1.5.2.6-1+dde |
|
libjpeg-turbo: heap buffer overflow in get_word_rgb_row() in rdppm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46822
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-06-18 16:15 修改: 2022-08-15 15:52
|
gpg-wks-server |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48
|
libdbus-1-3 |
CVE-2022-42010 |
中危 |
1.12.20-0+deb10u1+rebuild |
1.12.24-0+deb10u1 |
dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42010
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49
|
libk5crypto3 |
CVE-2024-26458 |
中危 |
1.17.4-1+eagle |
|
krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09
|
libk5crypto3 |
CVE-2024-26461 |
中危 |
1.17.4-1+eagle |
|
krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35
|
libdbus-1-3 |
CVE-2022-42011 |
中危 |
1.12.20-0+deb10u1+rebuild |
1.12.24-0+deb10u1 |
dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42011
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49
|
libdbus-1-3 |
CVE-2022-42012 |
中危 |
1.12.20-0+deb10u1+rebuild |
1.12.24-0+deb10u1 |
dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42012
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49
|
libkrb5-3 |
CVE-2024-26458 |
中危 |
1.17.4-1+eagle |
|
krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09
|
libkrb5-3 |
CVE-2024-26461 |
中危 |
1.17.4-1+eagle |
|
krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35
|
libdbus-1-3 |
CVE-2023-34969 |
中危 |
1.12.20-0+deb10u1+rebuild |
1.12.28-0+deb10u1 |
dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34969
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-06-08 03:15 修改: 2023-12-27 16:36
|
gpgconf |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48
|
libkrb5support0 |
CVE-2024-26458 |
中危 |
1.17.4-1+eagle |
|
krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09
|
libkrb5support0 |
CVE-2024-26461 |
中危 |
1.17.4-1+eagle |
|
krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35
|
gpgsm |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48
|
libavdevice58 |
CVE-2020-21697 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the mpeg_mux_write_packet function in libavfo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21697
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libavdevice58 |
CVE-2021-3566 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Prior to ffmpeg version 4.3, the tty demuxer did not have a 'read_prob ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3566
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-05 21:15 修改: 2022-12-21 15:01
|
libavdevice58 |
CVE-2022-3341 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
A null pointer dereference issue was discovered in 'FFmpeg' in decode_ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3341
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 15:15 修改: 2023-06-13 17:15
|
libldb1 |
CVE-2021-3670 |
中危 |
2:1.5.1+really1.4.6.2-1+security |
|
samba: MaxQueryDuration not honoured in Samba AD DC LDAP
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3670
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 16:15 修改: 2023-09-17 09:15
|
libavdevice58 |
CVE-2023-49502 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49502
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libavdevice58 |
CVE-2023-50010 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50010
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libwebkit2gtk-4.0-37 |
CVE-2021-30823 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.34.1-1~deb10u1 |
webkitgtk: Logic issue leading to HSTS bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30823
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2021-10-28 19:15 修改: 2023-01-09 16:41
|
libwebkit2gtk-4.0-37 |
CVE-2021-30884 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.34.1-1~deb10u1 |
webkitgtk: CSS compositing issue leading to revealing of the browsing history
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30884
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2021-08-24 19:15 修改: 2023-11-07 03:33
|
libwebkit2gtk-4.0-37 |
CVE-2022-0108 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.38.6-0+deb10u1 |
Inappropriate implementation in Navigation in Google Chrome prior to 9 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0108
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-02-12 00:15 修改: 2023-11-07 03:41
|
libwebkit2gtk-4.0-37 |
CVE-2022-22589 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.34.6-1~deb10u1 |
webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22589
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-03-18 18:15 修改: 2023-08-08 14:22
|
libwebkit2gtk-4.0-37 |
CVE-2022-22594 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.34.4-1~deb10u1 |
webkitgtk: A malicious website may exfiltrate data cross-origin
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22594
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-03-18 18:15 修改: 2022-03-28 16:40
|
libwebkit2gtk-4.0-37 |
CVE-2022-32891 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.36.6-1~deb10u1 |
webkitgtk: UI spoofing while Visiting a website that frames malicious content
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32891
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-02-27 20:15 修改: 2023-05-30 06:15
|
libwebkit2gtk-4.0-37 |
CVE-2022-32919 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.38.4-1 |
webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32919
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-01-10 22:15 修改: 2024-01-17 18:23
|
libwebkit2gtk-4.0-37 |
CVE-2022-32933 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.38.0-1 |
webkitgtk: A website may able to track visited websites in private browsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32933
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-06-10 20:15 修改: 2024-06-12 18:07
|
libwebkit2gtk-4.0-37 |
CVE-2022-46705 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.38.4-1 |
webkitgtk: Visiting a malicious website may lead to address bar spoofing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46705
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-02-27 20:15 修改: 2023-12-28 14:48
|
libwebkit2gtk-4.0-37 |
CVE-2022-46725 |
中危 |
2.32.4.1-1~deb10u1.1 |
2.38.4-1 |
webkitgtk: Visiting a malicious website may lead to address bar spoofing.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46725
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-08-14 23:15 修改: 2023-12-27 22:04
|
libwebkit2gtk-4.0-37 |
CVE-2023-32370 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: content security policy blacklist failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32370
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-09-06 02:15 修改: 2024-01-05 14:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-38133 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: disclose sensitive information
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38133
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-27 00:15 修改: 2024-01-05 14:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-38599 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: track sensitive user information
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38599
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-07-28 05:15 修改: 2024-01-05 14:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-41983 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Processing web content may lead to a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41983
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-10-25 19:15 修改: 2024-01-31 15:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-42843 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: visiting a malicious website may lead to address bar spoofing
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42843
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-02-21 07:15 修改: 2024-05-07 06:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-42883 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: processing a malicious image may lead to a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42883
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-12-12 01:15 修改: 2024-06-12 10:15
|
libwebkit2gtk-4.0-37 |
CVE-2023-42916 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Out-of-bounds read leads to sensitive data leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42916
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-11-30 23:15 修改: 2024-08-14 19:56
|
libwebkit2gtk-4.0-37 |
CVE-2023-42956 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: processing malicious web content may lead to a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42956
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-03-28 16:15 修改: 2024-06-12 10:15
|
libwebkit2gtk-4.0-37 |
CVE-2024-23206 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: A maliciously crafted webpage may be able to fingerprint the user
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23206
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-01-23 01:15 修改: 2024-06-12 10:15
|
libwebkit2gtk-4.0-37 |
CVE-2024-23254 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: malicious website may exfiltrate audio data cross-origin
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23254
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-03-08 02:15 修改: 2024-05-07 06:15
|
libwebkit2gtk-4.0-37 |
CVE-2024-23263 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: processing malicious web content prevents Content Security Policy from being enforced
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23263
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-03-08 02:15 修改: 2024-07-03 01:47
|
libwebkit2gtk-4.0-37 |
CVE-2024-23271 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: A malicious website may cause unexpected cross-origin behavior
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23271
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-04-24 17:15 修改: 2024-07-03 01:47
|
libwebkit2gtk-4.0-37 |
CVE-2024-23280 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: maliciously crafted webpage may be able to fingerprint the user
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23280
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-03-08 02:15 修改: 2024-05-07 06:15
|
libwebkit2gtk-4.0-37 |
CVE-2024-23284 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23284
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-03-08 02:15 修改: 2024-05-07 06:15
|
libwebkit2gtk-4.0-37 |
CVE-2024-27838 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: A maliciously crafted webpage may be able to fingerprint the user
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27838
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-06-10 21:15 修改: 2024-07-03 16:27
|
libwebkit2gtk-4.0-37 |
CVE-2024-40776 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40776
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-29 23:15 修改: 2024-08-20 15:19
|
libwebkit2gtk-4.0-37 |
CVE-2024-40779 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40779
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-29 23:15 修改: 2024-08-15 16:07
|
libwebkit2gtk-4.0-37 |
CVE-2024-40780 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40780
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-29 23:15 修改: 2024-08-15 16:47
|
libwebkit2gtk-4.0-37 |
CVE-2024-40782 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40782
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-29 23:15 修改: 2024-08-01 13:58
|
libwebkit2gtk-4.0-37 |
CVE-2024-40785 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to a cross site scripting attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40785
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-29 23:15 修改: 2024-08-15 16:46
|
libwebkit2gtk-4.0-37 |
CVE-2024-40789 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40789
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-29 23:15 修改: 2024-08-23 15:38
|
libwebkit2gtk-4.0-37 |
CVE-2024-40794 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: webkit2gtk: Private Browsing tabs may be accessed without authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40794
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-07-29 23:15 修改: 2024-08-23 15:18
|
libwebkit2gtk-4.0-37 |
CVE-2024-40866 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: Visiting a malicious website may lead to address bar spoofing
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40866
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-09-17 00:15 修改: 2024-09-24 19:02
|
libwebkit2gtk-4.0-37 |
CVE-2024-44187 |
中危 |
2.32.4.1-1~deb10u1.1 |
|
webkitgtk: A malicious website may exfiltrate data cross-origin
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44187
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2024-09-17 00:15 修改: 2024-09-25 13:25
|
libavdevice58 |
CVE-2023-51793 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51793
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libde265-0 |
CVE-2023-24751 |
中危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u4 |
libde265 v1.0.10 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24751
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-03-01 15:15 修改: 2023-03-10 02:35
|
libde265-0 |
CVE-2023-24752 |
中危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u4 |
libde265 v1.0.10 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24752
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-03-01 15:15 修改: 2023-03-10 18:14
|
libxml2 |
CVE-2016-3709 |
中危 |
2.9.4.5-1+dde |
|
libxml2: Incorrect server side include parsing can lead to XSS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3709
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-07-28 17:15 修改: 2022-12-07 16:39
|
libxml2 |
CVE-2016-9318 |
中危 |
2.9.4.5-1+dde |
|
libxml2: XML External Entity vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9318
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2016-11-16 00:59 修改: 2022-04-08 23:15
|
libxml2 |
CVE-2023-39615 |
中危 |
2.9.4.5-1+dde |
|
libxml2: crafted xml can cause global buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39615
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-29 17:15 修改: 2024-08-02 19:15
|
libxml2 |
CVE-2023-45322 |
中危 |
2.9.4.5-1+dde |
|
libxml2: use-after-free in xmlUnlinkNode() in tree.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45322
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-10-06 22:15 修改: 2024-08-02 21:15
|
libde265-0 |
CVE-2023-24754 |
中危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u4 |
libde265 v1.0.10 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24754
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-03-01 15:15 修改: 2023-03-10 18:17
|
liblivemedia64 |
CVE-2021-38381 |
中危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 does not handle MPEG-1 or 2 files properly. Sendi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38381
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 18:15 修改: 2023-11-07 03:37
|
liblivemedia64 |
CVE-2021-38382 |
中危 |
2018.11.26.1-1+eagle |
|
Live555 through 1.08 does not handle Matroska and Ogg files properly. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38382
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 18:15 修改: 2023-11-07 03:37
|
libxml2-dev |
CVE-2016-3709 |
中危 |
2.9.4.5-1+dde |
|
libxml2: Incorrect server side include parsing can lead to XSS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3709
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-07-28 17:15 修改: 2022-12-07 16:39
|
libxml2-dev |
CVE-2016-9318 |
中危 |
2.9.4.5-1+dde |
|
libxml2: XML External Entity vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9318
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-11-16 00:59 修改: 2022-04-08 23:15
|
libxml2-dev |
CVE-2023-39615 |
中危 |
2.9.4.5-1+dde |
|
libxml2: crafted xml can cause global buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39615
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-29 17:15 修改: 2024-08-02 19:15
|
libxml2-dev |
CVE-2023-45322 |
中危 |
2.9.4.5-1+dde |
|
libxml2: use-after-free in xmlUnlinkNode() in tree.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45322
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-10-06 22:15 修改: 2024-08-02 21:15
|
liblivemedia64 |
CVE-2021-39283 |
中危 |
2018.11.26.1-1+eagle |
|
liveMedia/FramedSource.cpp in Live555 through 1.08 allows an assertion ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39283
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-18 17:15 修改: 2023-11-07 03:37
|
libde265-0 |
CVE-2023-24755 |
中危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u4 |
libde265 v1.0.10 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24755
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-03-01 15:15 修改: 2023-03-10 18:18
|
libde265-0 |
CVE-2023-24756 |
中危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u4 |
libde265 v1.0.10 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24756
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-03-01 15:15 修改: 2023-03-10 18:19
|
libxpm4 |
CVE-2023-43788 |
中危 |
1:3.5.12-1 |
1:3.5.12-1+deb10u2 |
libXpm: out of bounds read in XpmCreateXpmImageFromBuffer()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43788
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15
|
libxpm4 |
CVE-2023-43789 |
中危 |
1:3.5.12-1 |
1:3.5.12-1+deb10u2 |
libXpm: out of bounds read on XPM with corrupted colormap
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43789
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-10-12 12:15 修改: 2024-09-16 15:15
|
libde265-0 |
CVE-2023-24757 |
中危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u4 |
libde265 v1.0.10 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24757
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-03-01 15:15 修改: 2023-03-10 18:20
|
libde265-0 |
CVE-2023-24758 |
中危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u4 |
libde265 v1.0.10 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24758
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-03-01 15:15 修改: 2023-03-10 18:22
|
libde265-0 |
CVE-2023-27102 |
中危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u5 |
Libde265 v1.0.11 was discovered to contain a segmentation violation vi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27102
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-03-15 15:15 修改: 2023-11-30 19:15
|
libmount-dev |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libde265-0 |
CVE-2023-47471 |
中危 |
1.0.3.1-1+rebuild1 |
1.0.11-0+deb10u5 |
Buffer Overflow vulnerability in strukturag libde265 v1.10.12 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47471
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-11-16 04:15 修改: 2023-11-30 19:15
|
libmount1 |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libzmq5 |
CVE-2021-20234 |
中危 |
4.3.1.2-1 |
|
zeromq: Memory leak in client induced by malicious server without CURVE/ZAP
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20234
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-04-01 14:15 修改: 2022-08-05 17:41
|
libde265-0 |
CVE-2023-51792 |
中危 |
1.0.3.1-1+rebuild1 |
|
Buffer Overflow vulnerability in libde265 v1.0.12 allows a local attac ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51792
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
locales |
CVE-2023-4806 |
中危 |
2.28.17-1+eagle |
|
glibc: potential use-after-free in getaddrinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15
|
locales |
CVE-2023-4813 |
中危 |
2.28.17-1+eagle |
|
glibc: potential use-after-free in gaih_inet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15
|
libde265-0 |
CVE-2024-38949 |
中危 |
1.0.3.1-1+rebuild1 |
|
Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attacker ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38949
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-06-26 20:15 修改: 2024-07-08 14:18
|
locales-all |
CVE-2023-4806 |
中危 |
2.28.17-1+eagle |
|
glibc: potential use-after-free in getaddrinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15
|
locales-all |
CVE-2023-4813 |
中危 |
2.28.17-1+eagle |
|
glibc: potential use-after-free in gaih_inet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15
|
login |
CVE-2023-4641 |
中危 |
1:4.5.1-1+dde |
|
shadow-utils: possible password leak during passwd(1) change
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4641
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-12-27 16:15 修改: 2024-05-03 16:15
|
libde265-0 |
CVE-2024-38950 |
中危 |
1.0.3.1-1+rebuild1 |
|
Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attacker ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38950
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-06-26 20:15 修改: 2024-08-12 18:35
|
mount |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
nano |
CVE-2024-5742 |
中危 |
3.2-3 |
3.2-3+deb10u1 |
nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5742
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-06-12 09:15 修改: 2024-10-07 20:15
|
ncurses-base |
CVE-2023-50495 |
中危 |
6.1+20181013.1-1+dde+rb2 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15
|
ncurses-bin |
CVE-2023-50495 |
中危 |
6.1+20181013.1-1+dde+rb2 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15
|
libavdevice58 |
CVE-2023-51794 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51794
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-26 15:15 修改: 2024-08-01 13:45
|
libebml4v5 |
CVE-2021-3405 |
中危 |
1.3.6-2 |
|
A flaw was found in libebml before 1.4.2. A heap overflow bug exists i ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3405
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-02-23 20:15 修改: 2023-11-07 03:37
|
libebml4v5 |
CVE-2023-52339 |
中危 |
1.3.6-2 |
|
In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52339
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-01-12 02:15 修改: 2024-02-05 03:15
|
libmysofa0 |
CVE-2019-20016 |
中危 |
0.6~dfsg0.2-1+security |
|
libmysofa before 2019-11-24 does not properly restrict recursive funct ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20016
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-12-27 02:15 修改: 2020-01-08 21:22
|
libmysofa0 |
CVE-2020-36148 |
中危 |
0.6~dfsg0.2-1+security |
|
Incorrect handling of input data in verifyAttribute function in the li ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36148
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-02-08 21:15 修改: 2023-11-07 03:22
|
libmysofa0 |
CVE-2020-36149 |
中危 |
0.6~dfsg0.2-1+security |
|
Incorrect handling of input data in changeAttribute function in the li ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36149
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-02-08 21:15 修改: 2023-11-07 03:22
|
libmysofa0 |
CVE-2020-36150 |
中危 |
0.6~dfsg0.2-1+security |
|
Incorrect handling of input data in loudness function in the libmysofa ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36150
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-02-08 21:15 修改: 2023-11-07 03:22
|
openssl |
CVE-2022-2097 |
中危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u4 |
openssl: AES OCB fails to encrypt some bytes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2022-4304 |
中危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u4 |
openssl: timing attack in RSA Decryption implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2023-0465 |
中危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u5 |
openssl: Invalid certificate policies in leaf certificates are silently ignored
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2023-0466 |
中危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u5 |
openssl: Certificate policy check not enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0466
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2023-2650 |
中危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u5 |
openssl: Possible DoS translating ASN.1 object identifiers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2650
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-05-30 14:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2023-3446 |
中危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u6 |
openssl: Excessive time spent checking DH keys and parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3446
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-07-19 12:15 修改: 2024-10-14 15:15
|
openssl |
CVE-2023-3817 |
中危 |
1.1.1d.6-1 |
1.1.1n-0+deb10u6 |
OpenSSL: Excessive time spent checking DH q parameter value
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3817
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-07-31 16:15 修改: 2024-10-14 15:15
|
openssl |
CVE-2023-5678 |
中危 |
1.1.1d.6-1 |
|
openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5678
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-11-06 16:15 修改: 2024-10-14 15:15
|
openssl |
CVE-2024-0727 |
中危 |
1.1.1d.6-1 |
|
openssl: denial of service via null dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15
|
openssl |
CVE-2024-4741 |
中危 |
1.1.1d.6-1 |
|
openssl: Use After Free with SSL_free_buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
openssl |
CVE-2024-5535 |
中危 |
1.1.1d.6-1 |
|
openssl: SSL_select_next_proto buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15
|
openssl |
CVE-2024-6119 |
中危 |
1.1.1d.6-1 |
|
openssl: Possible denial of service in X.509 name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35
|
passwd |
CVE-2023-4641 |
中危 |
1:4.5.1-1+dde |
|
shadow-utils: possible password leak during passwd(1) change
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4641
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-12-27 16:15 修改: 2024-05-03 16:15
|
libmysofa0 |
CVE-2020-36151 |
中危 |
0.6~dfsg0.2-1+security |
|
Incorrect handling of input data in mysofa_resampler_reset_mem functio ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36151
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-02-08 21:15 修改: 2023-11-07 03:22
|
libncurses6 |
CVE-2023-50495 |
中危 |
6.1+20181013.1-1+dde+rb2 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15
|
libncursesw6 |
CVE-2023-50495 |
中危 |
6.1+20181013.1-1+dde+rb2 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15
|
libelf1 |
CVE-2020-21047 |
中危 |
0.176-1.1 |
0.176-1.1+deb10u1 |
The libcpu component which is used by libasm of elfutils version 0.177 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21047
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19
|
libnss3 |
CVE-2023-6135 |
中危 |
2:3.42.1.4-1+dde |
|
nss: vulnerable to Minerva side-channel information leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6135
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-12-19 14:15 修改: 2024-01-07 11:15
|
libnss3 |
CVE-2024-6602 |
中危 |
2:3.42.1.4-1+dde |
|
Mozilla: Memory corruption in NSS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6602
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-09 15:15 修改: 2024-07-16 18:15
|
libnss3 |
CVE-2024-7531 |
中危 |
2:3.42.1.4-1+dde |
|
mozilla: nss: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel Sandy Bridge machines
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7531
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-06 13:15 修改: 2024-08-12 16:10
|
libavdevice58 |
CVE-2023-51798 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51798
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
python2.7 |
CVE-2023-27043 |
中危 |
2.7.16.2-1+eagle |
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
python2.7 |
CVE-2024-0397 |
中危 |
2.7.16.2-1+eagle |
|
cpython: python: Memory race condition in ssl.SSLContext certificate store methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44
|
python2.7 |
CVE-2024-6923 |
中危 |
2.7.16.2-1+eagle |
|
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15
|
python2.7 |
CVE-2024-9287 |
中危 |
2.7.16.2-1+eagle |
|
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-22 17:15 修改: 2024-10-23 15:12
|
libopenjp2-7 |
CVE-2019-12973 |
中危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: denial of service in function opj_t1_encode_cblks in openjp2/t1.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12973
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-06-26 18:15 修改: 2022-10-05 20:37
|
libopenjp2-7 |
CVE-2021-29338 |
中危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: out-of-bounds write due to an integer overflow in opj_compress.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29338
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-04-14 14:15 修改: 2023-11-07 03:32
|
python2.7-minimal |
CVE-2023-27043 |
中危 |
2.7.16.2-1+eagle |
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
python2.7-minimal |
CVE-2024-0397 |
中危 |
2.7.16.2-1+eagle |
|
cpython: python: Memory race condition in ssl.SSLContext certificate store methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44
|
python2.7-minimal |
CVE-2024-6923 |
中危 |
2.7.16.2-1+eagle |
|
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15
|
python2.7-minimal |
CVE-2024-9287 |
中危 |
2.7.16.2-1+eagle |
|
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-22 17:15 修改: 2024-10-23 15:12
|
libopenjp2-7 |
CVE-2022-1122 |
中危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: segmentation fault in opj2_decompress due to uninitialized pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1122
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-03-29 18:15 修改: 2023-11-07 03:41
|
libopenjp2-7 |
CVE-2023-39327 |
中危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: Malicious files can cause the program to enter a large loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39327
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-13 03:15 修改: 2024-07-15 13:00
|
python3.7 |
CVE-2021-23336 |
中危 |
3.7.3.6-1+eagle |
|
python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30
|
python3.7 |
CVE-2023-27043 |
中危 |
3.7.3.6-1+eagle |
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
python3.7 |
CVE-2024-0397 |
中危 |
3.7.3.6-1+eagle |
|
cpython: python: Memory race condition in ssl.SSLContext certificate store methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44
|
libopenjp2-7 |
CVE-2023-39328 |
中危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: denail of service via crafted image file
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39328
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-09 14:15 修改: 2024-07-09 18:19
|
libopenjp2-7 |
CVE-2023-39329 |
中危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: Resource exhaustion will occur in the opj_t1_decode_cblks function in the tcd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39329
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-13 03:15 修改: 2024-07-15 13:00
|
python3.7-minimal |
CVE-2021-23336 |
中危 |
3.7.3.6-1+eagle |
|
python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30
|
python3.7-minimal |
CVE-2023-27043 |
中危 |
3.7.3.6-1+eagle |
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
python3.7-minimal |
CVE-2024-0397 |
中危 |
3.7.3.6-1+eagle |
|
cpython: python: Memory race condition in ssl.SSLContext certificate store methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44
|
qdbus |
CVE-2021-28025 |
中危 |
4:4.8.7.1+dfsg-1+dde |
|
qt-qtsvg: Out of bounds read in function `QRadialFetchSimd<QSimdSse2>::fetch` when input craft svg file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28025
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-08-11 14:15 修改: 2023-08-21 15:41
|
qtcore4-l10n |
CVE-2021-28025 |
中危 |
4:4.8.7.1+dfsg-1+dde |
|
qt-qtsvg: Out of bounds read in function `QRadialFetchSimd<QSimdSse2>::fetch` when input craft svg file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28025
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2023-08-11 14:15 修改: 2023-08-21 15:41
|
liborc-0.4-0 |
CVE-2024-40897 |
中危 |
1:0.4.28-3.1 |
|
orc: Stack-based buffer overflow vulnerability in ORC
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40897
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-26 06:15 修改: 2024-08-27 13:52
|
rfkill |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libpam-modules |
CVE-2024-10041 |
中危 |
1.3.1.12-1 |
|
pam: libpam: Libpam vulnerable to read hashed password
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-10-23 14:15 修改: 2024-10-23 15:12
|
libpam-modules |
CVE-2024-22365 |
中危 |
1.3.1.12-1 |
|
pam: allowing unprivileged user to block another user namespace
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27
|
libpam-modules-bin |
CVE-2024-10041 |
中危 |
1.3.1.12-1 |
|
pam: libpam: Libpam vulnerable to read hashed password
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-10-23 14:15 修改: 2024-10-23 15:12
|
libpam-modules-bin |
CVE-2024-22365 |
中危 |
1.3.1.12-1 |
|
pam: allowing unprivileged user to block another user namespace
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27
|
libpam-runtime |
CVE-2024-10041 |
中危 |
1.3.1.12-1 |
|
pam: libpam: Libpam vulnerable to read hashed password
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-10-23 14:15 修改: 2024-10-23 15:12
|
libpam-runtime |
CVE-2024-22365 |
中危 |
1.3.1.12-1 |
|
pam: allowing unprivileged user to block another user namespace
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27
|
libavdevice58 |
CVE-2024-31578 |
中危 |
7:4.1.8.1-1+dde |
|
FFmpeg version n6.1.1 was discovered to contain a heap use-after-free ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31578
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-17 14:15 修改: 2024-07-03 01:55
|
libavdevice58 |
CVE-2024-7055 |
中危 |
7:4.1.8.1-1+dde |
|
A vulnerability was found in FFmpeg up to 7.0.1. It has been classifie ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7055
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-06 06:15 修改: 2024-08-06 16:30
|
gpgv |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48
|
dbus-x11 |
CVE-2022-42012 |
中危 |
1.12.20-0+deb10u1+rebuild |
1.12.24-0+deb10u1 |
dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42012
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-10-10 00:15 修改: 2023-12-27 16:49
|
libpam-systemd |
CVE-2021-3997 |
中危 |
241.26-1+dde |
|
systemd: Uncontrolled recursion in systemd-tmpfiles when removing files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3997
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 20:15 修改: 2023-05-03 12:15
|
libpam-systemd |
CVE-2022-4415 |
中危 |
241.26-1+dde |
|
systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19
|
libpam-systemd |
CVE-2023-7008 |
中危 |
241.26-1+dde |
|
systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-12-23 13:15 修改: 2024-09-16 17:16
|
libpam0g |
CVE-2024-10041 |
中危 |
1.3.1.12-1 |
|
pam: libpam: Libpam vulnerable to read hashed password
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-10-23 14:15 修改: 2024-10-23 15:12
|
libpam0g |
CVE-2024-22365 |
中危 |
1.3.1.12-1 |
|
pam: allowing unprivileged user to block another user namespace
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27
|
libpcre16-3 |
CVE-2020-14155 |
中危 |
2:8.39.2-12+dde2 |
|
pcre: Integer overflow when parsing callout numeric arguments
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14155
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:04
|
libpcre3 |
CVE-2020-14155 |
中危 |
2:8.39.2-12+dde2 |
|
pcre: Integer overflow when parsing callout numeric arguments
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14155
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:04
|
libpcre3-dev |
CVE-2020-14155 |
中危 |
2:8.39.2-12+dde2 |
|
pcre: Integer overflow when parsing callout numeric arguments
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14155
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:04
|
libpcre32-3 |
CVE-2020-14155 |
中危 |
2:8.39.2-12+dde2 |
|
pcre: Integer overflow when parsing callout numeric arguments
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14155
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:04
|
libpcrecpp0v5 |
CVE-2020-14155 |
中危 |
2:8.39.2-12+dde2 |
|
pcre: Integer overflow when parsing callout numeric arguments
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14155
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:04
|
dbus-x11 |
CVE-2023-34969 |
中危 |
1.12.20-0+deb10u1+rebuild |
1.12.28-0+deb10u1 |
dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34969
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-06-08 03:15 修改: 2023-12-27 16:36
|
samba-libs |
CVE-2018-14628 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Unprivileged read of deleted object tombstones in AD LDAP server
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14628
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-17 18:15 修改: 2023-12-04 03:15
|
samba-libs |
CVE-2019-14861 |
中危 |
2:4.9.5.18-1+dde |
|
samba: An authenticated user can crash the DCE/RPC DNS management server by creating records with matching the zone name
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14861
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-12-10 23:15 修改: 2024-06-25 02:15
|
samba-libs |
CVE-2019-14870 |
中危 |
2:4.9.5.18-1+dde |
|
samba: The DelegationNotAllowed Kerberos feature restriction was not being applied when processing protocol transition requests (S4U2Self), in the AD DC KDC
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14870
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-12-10 23:15 修改: 2023-11-07 03:05
|
samba-libs |
CVE-2020-10730 |
中危 |
2:4.9.5.18-1+dde |
|
samba: NULL pointer de-reference and use-after-free in Samba AD DC LDAP Server with ASQ, VLV and paged_results
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10730
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-07-07 14:15 修改: 2023-11-07 03:14
|
samba-libs |
CVE-2020-10760 |
中危 |
2:4.9.5.18-1+dde |
|
samba: LDAP Use-after-free in Samba AD DC Global Catalog with paged_results and VLV
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10760
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-07-06 19:15 修改: 2023-11-07 03:14
|
samba-libs |
CVE-2021-20251 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Race condition in the bad password lockout code
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20251
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-03-06 23:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2021-20254 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20254
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-05 14:15 修改: 2023-11-07 03:29
|
samba-libs |
CVE-2021-20316 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Symlink race error can allow metadata read and modify outside of the exported share
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20316
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 16:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2021-3670 |
中危 |
2:4.9.5.18-1+dde |
|
samba: MaxQueryDuration not honoured in Samba AD DC LDAP
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3670
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 16:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2021-3671 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Null pointer dereference on missing sname in TGS-REQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3671
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-10-12 18:15 修改: 2023-11-07 03:38
|
samba-libs |
CVE-2021-44141 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Information leak via symlinks of existance of files or directories outside of the exported share
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44141
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-21 18:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2022-32746 |
中危 |
2:4.9.5.18-1+dde |
|
samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32746
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-25 18:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2023-0225 |
中危 |
2:4.9.5.18-1+dde |
|
samba: AD DC "dnsHostname" attribute can be deleted by unprivileged authenticated users
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0225
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-03 23:15 修改: 2023-09-17 09:15
|
samba-libs |
CVE-2023-0614 |
中危 |
2:4.9.5.18-1+dde |
|
samba: Access controlled AD LDAP attributes can be discovered
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0614
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-03 23:15 修改: 2023-11-07 04:01
|
samba-libs |
CVE-2023-0922 |
中危 |
2:4.9.5.18-1+dde |
|
samba: AD DC admin tool samba-tool sends passwords in cleartext
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0922
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-03 23:15 修改: 2023-11-07 04:01
|
samba-libs |
CVE-2023-34967 |
中危 |
2:4.9.5.18-1+dde |
|
samba: type confusion in mdssvc RPC service for spotlight
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34967
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-07-20 15:15 修改: 2024-09-16 13:15
|
samba-libs |
CVE-2023-34968 |
中危 |
2:4.9.5.18-1+dde |
|
samba: spotlight server-side share path disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34968
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-07-20 15:15 修改: 2024-09-16 13:15
|
samba-libs |
CVE-2023-4154 |
中危 |
2:4.9.5.18-1+dde |
|
samba: AD DC password exposure to privileged users and RODCs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4154
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-07 20:15 修改: 2023-12-29 05:15
|
samba-libs |
CVE-2023-42669 |
中危 |
2:4.9.5.18-1+dde |
|
samba: "rpcecho" development server allows denial of service via sleep() call on AD DC
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42669
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-06 07:15 修改: 2024-09-16 15:15
|
dirmngr |
CVE-2022-34903 |
中危 |
2.2.12-1+deb10u1 |
2.2.12-1+deb10u2 |
gpg: Signature spoofing via status line injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34903
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-07-01 22:15 修改: 2023-11-07 03:48
|
busybox |
CVE-2023-42363 |
中危 |
1:1.30.1.2-1+dde |
|
busybox: use-after-free in awk
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42363
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-27 22:15 修改: 2023-11-30 05:06
|
libpoppler-cpp0v5 |
CVE-2022-37052 |
中危 |
0.71.0.2-1+eagle |
|
poppler: reachable assertion due to a failure in markObject()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37052
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-22 19:16 修改: 2023-08-25 20:17
|
libpoppler-cpp0v5 |
CVE-2022-38349 |
中危 |
0.71.0.2-1+eagle |
|
poppler: Reachable assertion in Object.h
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38349
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-22 19:16 修改: 2023-08-28 18:29
|
libpoppler-glib8 |
CVE-2022-37052 |
中危 |
0.71.0.2-1+eagle |
|
poppler: reachable assertion due to a failure in markObject()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37052
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-22 19:16 修改: 2023-08-25 20:17
|
systemd |
CVE-2021-3997 |
中危 |
241.26-1+dde |
|
systemd: Uncontrolled recursion in systemd-tmpfiles when removing files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3997
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 20:15 修改: 2023-05-03 12:15
|
systemd |
CVE-2022-4415 |
中危 |
241.26-1+dde |
|
systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19
|
systemd |
CVE-2023-7008 |
中危 |
241.26-1+dde |
|
systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-12-23 13:15 修改: 2024-09-16 17:16
|
libpoppler-glib8 |
CVE-2022-38349 |
中危 |
0.71.0.2-1+eagle |
|
poppler: Reachable assertion in Object.h
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38349
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-22 19:16 修改: 2023-08-28 18:29
|
libpoppler82 |
CVE-2022-37052 |
中危 |
0.71.0.2-1+eagle |
|
poppler: reachable assertion due to a failure in markObject()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37052
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-22 19:16 修改: 2023-08-25 20:17
|
libpoppler82 |
CVE-2022-38349 |
中危 |
0.71.0.2-1+eagle |
|
poppler: Reachable assertion in Object.h
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38349
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-22 19:16 修改: 2023-08-28 18:29
|
busybox |
CVE-2023-42364 |
中危 |
1:1.30.1.2-1+dde |
|
busybox: use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42364
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-27 23:15 修改: 2024-10-11 21:36
|
systemd-sysv |
CVE-2021-3997 |
中危 |
241.26-1+dde |
|
systemd: Uncontrolled recursion in systemd-tmpfiles when removing files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3997
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 20:15 修改: 2023-05-03 12:15
|
systemd-sysv |
CVE-2022-4415 |
中危 |
241.26-1+dde |
|
systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19
|
systemd-sysv |
CVE-2023-7008 |
中危 |
241.26-1+dde |
|
systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-12-23 13:15 修改: 2024-09-16 17:16
|
busybox |
CVE-2023-42365 |
中危 |
1:1.30.1.2-1+dde |
|
busybox: use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42365
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-27 23:15 修改: 2023-11-30 05:08
|
busybox |
CVE-2023-42366 |
中危 |
1:1.30.1.2-1+dde |
|
busybox: A heap-buffer-overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42366
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-27 23:15 修改: 2023-11-30 05:08
|
libavfilter7 |
CVE-2020-21697 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the mpeg_mux_write_packet function in libavfo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21697
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libavfilter7 |
CVE-2021-3566 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Prior to ffmpeg version 4.3, the tty demuxer did not have a 'read_prob ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3566
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-05 21:15 修改: 2022-12-21 15:01
|
udev |
CVE-2021-3997 |
中危 |
241.26-1+dde |
|
systemd: Uncontrolled recursion in systemd-tmpfiles when removing files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3997
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 20:15 修改: 2023-05-03 12:15
|
udev |
CVE-2022-4415 |
中危 |
241.26-1+dde |
|
systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4415
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-11 15:15 修改: 2023-02-02 16:19
|
udev |
CVE-2023-7008 |
中危 |
241.26-1+dde |
|
systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-12-23 13:15 修改: 2024-09-16 17:16
|
libavfilter7 |
CVE-2022-3341 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
A null pointer dereference issue was discovered in 'FFmpeg' in decode_ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3341
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 15:15 修改: 2023-06-13 17:15
|
util-linux |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libavfilter7 |
CVE-2023-49502 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49502
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
uuid-dev |
CVE-2021-37600 |
中危 |
2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libavfilter7 |
CVE-2023-50010 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50010
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libpostproc55 |
CVE-2020-21697 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
A heap-use-after-free in the mpeg_mux_write_packet function in libavfo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21697
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-10 21:15 修改: 2021-11-30 18:54
|
libpostproc55 |
CVE-2021-3566 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.9-0+deb10u1 |
Prior to ffmpeg version 4.3, the tty demuxer did not have a 'read_prob ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3566
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-05 21:15 修改: 2022-12-21 15:01
|
libpostproc55 |
CVE-2022-3341 |
中危 |
7:4.1.8.1-1+dde |
7:4.1.11-0+deb10u1 |
A null pointer dereference issue was discovered in 'FFmpeg' in decode_ ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3341
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 15:15 修改: 2023-06-13 17:15
|
libpostproc55 |
CVE-2023-49502 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49502
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libpostproc55 |
CVE-2023-50010 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50010
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:42
|
libpostproc55 |
CVE-2023-51793 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51793
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libpostproc55 |
CVE-2023-51794 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51794
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-26 15:15 修改: 2024-08-01 13:45
|
libpostproc55 |
CVE-2023-51798 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51798
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libpostproc55 |
CVE-2024-31578 |
中危 |
7:4.1.8.1-1+dde |
|
FFmpeg version n6.1.1 was discovered to contain a heap use-after-free ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31578
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-17 14:15 修改: 2024-07-03 01:55
|
libpostproc55 |
CVE-2024-7055 |
中危 |
7:4.1.8.1-1+dde |
|
A vulnerability was found in FFmpeg up to 7.0.1. It has been classifie ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7055
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-06 06:15 修改: 2024-08-06 16:30
|
libavfilter7 |
CVE-2023-51793 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51793
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libavfilter7 |
CVE-2023-51794 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51794
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-26 15:15 修改: 2024-08-01 13:45
|
libavfilter7 |
CVE-2023-51798 |
中危 |
7:4.1.8.1-1+dde |
|
Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51798
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-19 17:15 修改: 2024-07-03 01:43
|
libavfilter7 |
CVE-2024-31578 |
中危 |
7:4.1.8.1-1+dde |
|
FFmpeg version n6.1.1 was discovered to contain a heap use-after-free ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31578
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-04-17 14:15 修改: 2024-07-03 01:55
|
libexpat1 |
CVE-2022-25313 |
中危 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u3 |
expat: Stack exhaustion in doctype parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25313
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44
|
libprotobuf-lite17 |
CVE-2021-22569 |
中危 |
3.6.1.3-2 |
3.6.1.3-2+deb10u1 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
libprotobuf-lite17 |
CVE-2021-22570 |
中危 |
3.6.1.3-2 |
3.6.1.3-2+deb10u1 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
libavfilter7 |
CVE-2024-7055 |
中危 |
7:4.1.8.1-1+dde |
|
A vulnerability was found in FFmpeg up to 7.0.1. It has been classifie ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7055
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-06 06:15 修改: 2024-08-06 16:30
|
bluez-obexd |
CVE-2023-51580 |
中危 |
5.50.22-1+dde |
|
bluez: avrcp_parse_attribute_list out-of-bounds read information disclosure vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51580
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48
|
libpython2.7 |
CVE-2023-27043 |
中危 |
2.7.16.2-1+eagle |
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
libpython2.7 |
CVE-2024-0397 |
中危 |
2.7.16.2-1+eagle |
|
cpython: python: Memory race condition in ssl.SSLContext certificate store methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44
|
libpython2.7 |
CVE-2024-6923 |
中危 |
2.7.16.2-1+eagle |
|
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15
|
libpython2.7 |
CVE-2024-9287 |
中危 |
2.7.16.2-1+eagle |
|
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-22 17:15 修改: 2024-10-23 15:12
|
dnsmasq-base |
CVE-2021-3448 |
中危 |
2.80.4-1+dde |
|
dnsmasq: fixed outgoing port used when --server is used with an interface name
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3448
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-04-08 23:15 修改: 2023-11-07 03:38
|
bsdutils |
CVE-2021-37600 |
中危 |
1:2.33.1-0.1 |
2.33.1-0.1+deb10u1 |
util-linux: integer overflow can lead to buffer overflow in get_sem_elements() in sys-utils/ipcutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37600
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-07-30 14:15 修改: 2024-08-04 02:15
|
libpython2.7-minimal |
CVE-2023-27043 |
中危 |
2.7.16.2-1+eagle |
|
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
libpython2.7-minimal |
CVE-2024-0397 |
中危 |
2.7.16.2-1+eagle |
|
cpython: python: Memory race condition in ssl.SSLContext certificate store methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44
|
xdg-utils |
CVE-2020-27748 |
中危 |
1.1.3+deepin-1+deepin |
|
xdg-utils: local file inclusion vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27748
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2021-06-01 14:15 修改: 2021-06-11 17:34
|
libpython2.7-minimal |
CVE-2024-6923 |
中危 |
2.7.16.2-1+eagle |
|
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15
|
libpython2.7-minimal |
CVE-2024-9287 |
中危 |
2.7.16.2-1+eagle |
|
python: Virtual environment (venv) activation scripts don't quote paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-10-22 17:15 修改: 2024-10-23 15:12
|
libarchive13 |
CVE-2019-19221 |
中危 |
3.3.3-4+deb10u1 |
3.3.3-4+deb10u2 |
libarchive: out-of-bounds read in archive_wstring_append_from_mbs in archive_string.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19221
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-11-21 23:15 修改: 2023-11-07 03:07
|
binutils-common |
CVE-2020-16590 |
低危 |
2.31.1.4-1+dde |
|
binutils: double free vulnerability in process_symbol_table could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16590
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
binutils-common |
CVE-2020-16591 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid read in process_symbol_table could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16591
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
libjpeg62-turbo |
CVE-2017-15232 |
低危 |
1:1.5.2.6-1+dde |
|
libjpeg-turbo: NULL pointer dereference in jdpostct.c and jquant1.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15232
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-10-11 03:29 修改: 2018-07-11 01:29
|
libjpeg62-turbo |
CVE-2018-11813 |
低危 |
1:1.5.2.6-1+dde |
|
libjpeg: "cjpeg" utility large loop because read_pixel in rdtarga.c mishandles EOF
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11813
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-06-06 03:29 修改: 2020-06-25 14:15
|
libjpeg62-turbo |
CVE-2020-17541 |
低危 |
1:1.5.2.6-1+dde |
|
libjpeg-turbo: Stack-based buffer overflow in the "transform" component
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-17541
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 15:15 修改: 2022-11-07 14:29
|
libjson-glib-1.0-0 |
TEMP-0772585-D41D8C |
低危 |
1.4.4-2 |
|
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0772585-D41D8C
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libjson-glib-1.0-common |
TEMP-0772585-D41D8C |
低危 |
1.4.4-2 |
|
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0772585-D41D8C
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
binutils-common |
CVE-2020-16592 |
低危 |
2.31.1.4-1+dde |
|
binutils: use-after-free in bfd_hash_lookup could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16592
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
binutils-common |
CVE-2020-16593 |
低危 |
2.31.1.4-1+dde |
|
binutils: Null Pointer Dereference in scan_unit_for_symbols could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16593
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
binutils-common |
CVE-2020-16599 |
低危 |
2.31.1.4-1+dde |
|
binutils: Null Pointer Dereference in _bfd_elf_get_symbol_version_string could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16599
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
binutils-common |
CVE-2020-19724 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in get_data() in nm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19724
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19
|
libk5crypto3 |
CVE-2018-5709 |
低危 |
1.17.4-1+eagle |
|
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58
|
binutils-common |
CVE-2020-19726 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19726
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2024-10-07 19:36
|
binutils-common |
CVE-2020-21490 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in get_field() in microblaze-dis.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21490
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19
|
binutils-common |
CVE-2020-35342 |
低危 |
2.31.1.4-1+dde |
|
binutils: uninitialized heap memory in tic4x_print_cond() in opcodes/tic4x-dis.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35342
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15
|
binutils-common |
CVE-2020-35448 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35448
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-27 04:15 修改: 2023-11-07 03:21
|
libkrb5-3 |
CVE-2018-5709 |
低危 |
1.17.4-1+eagle |
|
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58
|
binutils-common |
CVE-2020-35493 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35493
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
binutils-common |
CVE-2020-35494 |
低危 |
2.31.1.4-1+dde |
|
binutils: usage of unitialized heap in tic4x_print_cond function in opcodes/tic4x-dis.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35494
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
binutils-common |
CVE-2020-35495 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in bfd_pef_parse_symbols function in bfd/pef.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35495
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
libavdevice58 |
CVE-2020-20450 |
低危 |
7:4.1.8.1-1+dde |
|
FFmpeg 4.2 is affected by null pointer dereference passed as argument ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20450
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 19:38
|
libkrb5support0 |
CVE-2018-5709 |
低危 |
1.17.4-1+eagle |
|
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58
|
libavdevice58 |
CVE-2020-20451 |
低危 |
7:4.1.8.1-1+dde |
|
Denial of Service issue in FFmpeg 4.2 due to resource management error ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20451
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 21:59
|
libavdevice58 |
CVE-2020-20898 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_prewitt in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20898
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:45
|
libavdevice58 |
CVE-2020-22038 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22038
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:36
|
libldap-2.4-2 |
CVE-2015-3276 |
低危 |
2.4.47+dfsg.4-1+eagle |
|
openldap: incorrect multi-keyword mode cipherstring parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-3276
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2015-12-07 20:59 修改: 2023-04-28 18:28
|
libldap-2.4-2 |
CVE-2017-14159 |
低危 |
2.4.47+dfsg.4-1+eagle |
|
openldap: Privilege escalation via PID file manipulation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14159
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2017-09-05 18:29 修改: 2022-06-13 19:18
|
libldap-2.4-2 |
CVE-2017-17740 |
低危 |
2.4.47+dfsg.4-1+eagle |
|
openldap: contrib/slapd-modules/nops/nops.c attempts to free stack buffer allowing remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17740
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2017-12-18 06:29 修改: 2022-06-13 19:10
|
libldap-2.4-2 |
CVE-2020-15719 |
低危 |
2.4.47+dfsg.4-1+eagle |
|
openldap: Certificate validation incorrectly matches name against CN-ID
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15719
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-07-14 14:15 修改: 2022-05-12 15:01
|
libavdevice58 |
CVE-2020-22039 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22039
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libldap-common |
CVE-2015-3276 |
低危 |
2.4.47+dfsg.4-1+eagle |
|
openldap: incorrect multi-keyword mode cipherstring parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-3276
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2015-12-07 20:59 修改: 2023-04-28 18:28
|
libldap-common |
CVE-2017-14159 |
低危 |
2.4.47+dfsg.4-1+eagle |
|
openldap: Privilege escalation via PID file manipulation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14159
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2017-09-05 18:29 修改: 2022-06-13 19:18
|
libldap-common |
CVE-2017-17740 |
低危 |
2.4.47+dfsg.4-1+eagle |
|
openldap: contrib/slapd-modules/nops/nops.c attempts to free stack buffer allowing remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17740
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2017-12-18 06:29 修改: 2022-06-13 19:10
|
libldap-common |
CVE-2020-15719 |
低危 |
2.4.47+dfsg.4-1+eagle |
|
openldap: Certificate validation incorrectly matches name against CN-ID
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15719
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-07-14 14:15 修改: 2022-05-12 15:01
|
libavdevice58 |
CVE-2020-22040 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 idue to a memor ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22040
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libavdevice58 |
CVE-2020-22041 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22041
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 22:00
|
libavdevice58 |
CVE-2020-22042 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22042
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 18:54
|
libavdevice58 |
CVE-2020-22043 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:33
|
libavdevice58 |
CVE-2020-22044 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22044
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 21:15 修改: 2021-11-30 22:00
|
libavdevice58 |
CVE-2020-22046 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22046
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libavdevice58 |
CVE-2020-22048 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22048
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libavdevice58 |
CVE-2020-22051 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22051
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 17:15 修改: 2023-11-07 03:19
|
libavdevice58 |
CVE-2020-22056 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22056
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 18:15 修改: 2021-06-07 15:31
|
libavdevice58 |
CVE-2021-38090 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_roberts in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38090
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
liblivemedia64 |
CVE-2019-15232 |
低危 |
2018.11.26.1-1+eagle |
|
Live555 before 2019.08.16 has a Use-After-Free because GenericMediaSer ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15232
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-08-20 00:15 修改: 2023-03-29 16:23
|
liblivemedia64 |
CVE-2019-7732 |
低危 |
2018.11.26.1-1+eagle |
|
In Live555 0.95, a setup packet can cause a memory leak leading to DoS ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7732
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-02-11 17:29 修改: 2020-08-24 17:37
|
liblivemedia64 |
CVE-2019-7733 |
低危 |
2018.11.26.1-1+eagle |
|
In Live555 0.95, there is a buffer overflow via a large integer in a C ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7733
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-02-11 17:29 修改: 2020-05-15 00:15
|
libavdevice58 |
CVE-2021-38091 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_sobel in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38091
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavdevice58 |
CVE-2021-38092 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_prewitt in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38092
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
liblsan0 |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
liblz4-1 |
CVE-2019-17543 |
低危 |
1.8.3.2-1 |
|
lz4: heap-based buffer overflow in LZ4_write32
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17543
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-10-14 02:15 修改: 2023-11-07 03:06
|
libavdevice58 |
CVE-2021-38093 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_robert in libavfilte ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38093
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
libavdevice58 |
CVE-2021-38094 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_sobel in libavfilter ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38094
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
libmediainfo0v5 |
CVE-2020-15395 |
低危 |
18.12.2-1+security |
|
In MediaInfoLib in MediaArea MediaInfo 20.03, there is a stack-based b ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15395
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-30 11:15 修改: 2023-11-07 03:17
|
binutils-common |
CVE-2020-35496 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in bfd_pef_scan_start_address function in bfd/pef.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35496
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
binutils-common |
CVE-2020-35507 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in bfd_pef_parse_function_stubs function in bfd/pef.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35507
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-01-24 16:10
|
libmount-dev |
CVE-2022-0563 |
低危 |
2.33.1-0.1 |
|
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
binutils-common |
CVE-2021-20197 |
低危 |
2.31.1.4-1+dde |
|
binutils: Race window allows users to own arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20197
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15
|
binutils-common |
CVE-2021-20284 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20284
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15
|
libmount1 |
CVE-2022-0563 |
低危 |
2.33.1-0.1 |
|
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
binutils-common |
CVE-2021-20294 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack buffer overflow WRITE may lead to a DoS via a crafted ELF
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20294
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-04-29 16:15 修改: 2023-11-07 03:29
|
binutils-common |
CVE-2021-32256 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack-overflow issue in demangle_type in rust-demangle.c.
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32256
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-07-18 14:15 修改: 2023-08-24 19:15
|
binutils-common |
CVE-2021-3530 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack memory exhaustion in demangle_path() in rust-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3530
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-06-02 15:15 修改: 2022-09-28 20:03
|
libmpx2 |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
binutils-common |
CVE-2021-3549 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3549
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-05-26 21:15 修改: 2022-10-07 20:28
|
binutils-common |
CVE-2021-3826 |
低危 |
2.31.1.4-1+dde |
|
libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3826
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-09-01 21:15 修改: 2024-01-22 15:01
|
binutils-common |
CVE-2021-45078 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45078
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-12-15 20:15 修改: 2023-11-07 03:39
|
binutils-common |
CVE-2021-46174 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46174
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:40
|
binutils-common |
CVE-2021-46195 |
低危 |
2.31.1.4-1+dde |
|
gcc: uncontrolled recursion in libiberty/rust-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46195
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-01-14 20:15 修改: 2022-01-22 01:38
|
binutils-common |
CVE-2022-35205 |
低危 |
2.31.1.4-1+dde |
|
binutils: reachable assertion in display_debug_names() in dwarf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35205
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15
|
binutils-common |
CVE-2022-35206 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in read_and_display_attr_value() in dwarf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35206
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-31 00:36
|
binutils-common |
CVE-2022-38533 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38533
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-08-26 00:15 修改: 2023-11-07 03:50
|
binutils-common |
CVE-2022-4285 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4285
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-01-27 18:15 修改: 2023-11-07 03:57
|
libncurses6 |
CVE-2023-45918 |
低危 |
6.1+20181013.1-1+dde+rb2 |
|
ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15
|
binutils-common |
CVE-2022-44840 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in find_section_in_set() in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44840
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libncursesw6 |
CVE-2023-45918 |
低危 |
6.1+20181013.1-1+dde+rb2 |
|
ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15
|
libnm0 |
CVE-2020-10754 |
低危 |
1.14.6.5-3 |
|
NetworkManager: user configuration not honoured leaving the connection unauthenticated via insecure defaults
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10754
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-08 18:15 修改: 2023-11-07 03:14
|
libnm0 |
CVE-2024-6501 |
低危 |
1.14.6.5-3 |
|
NetworkManager: Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6501
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-09 20:15 修改: 2024-07-11 13:06
|
binutils-common |
CVE-2022-45703 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in display_debug_section() in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45703
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15
|
libavfilter7 |
CVE-2020-20450 |
低危 |
7:4.1.8.1-1+dde |
|
FFmpeg 4.2 is affected by null pointer dereference passed as argument ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20450
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 19:38
|
libavfilter7 |
CVE-2020-20451 |
低危 |
7:4.1.8.1-1+dde |
|
Denial of Service issue in FFmpeg 4.2 due to resource management error ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20451
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 21:59
|
libavfilter7 |
CVE-2020-20898 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_prewitt in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20898
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:45
|
libnss3 |
CVE-2017-11695 |
低危 |
2:3.42.1.4-1+dde |
|
nss: Heap-buffer-overflow in alloc_segs
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11695
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-27 19:29 修改: 2020-03-16 23:15
|
libnss3 |
CVE-2017-11696 |
低危 |
2:3.42.1.4-1+dde |
|
nss: Heap-buffer-overflow in __hash_open
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11696
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-27 19:29 修改: 2020-03-16 23:15
|
libnss3 |
CVE-2017-11697 |
低危 |
2:3.42.1.4-1+dde |
|
nss: Floating Point Exception in __hash_open
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11697
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-27 19:29 修改: 2020-03-16 23:15
|
libnss3 |
CVE-2017-11698 |
低危 |
2:3.42.1.4-1+dde |
|
nss: Heap-buffer-overflow in __get_page
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11698
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-27 19:29 修改: 2020-03-16 23:15
|
libopenexr23 |
CVE-2017-14988 |
低危 |
2.2.1.4-1 |
|
OpenEXR: Excessive memory allocation in Header::readfrom
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14988
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2017-10-03 01:29 修改: 2024-08-05 20:15
|
libopenexr23 |
CVE-2018-18443 |
低危 |
2.2.1.4-1 |
|
OpenEXR: Memory leak in ThreadPool in in IlmBase/IlmThread/IlmThreadPool.cpp
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18443
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2018-10-17 19:29 修改: 2023-11-07 02:55
|
libopenexr23 |
CVE-2021-20304 |
低危 |
2.2.1.4-1 |
|
OpenEXR: Undefined-shift in Imf_2_5::hufDecode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20304
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2022-08-23 16:15 修改: 2022-12-07 02:23
|
libopenexr23 |
CVE-2021-26945 |
低危 |
2.2.1.4-1 |
|
OpenEXR: Integer-overflow in bool Imf_2_5::readDeepTile<Imf_2_5::DeepTiledInputPart>
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26945
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2021-06-08 12:15 修改: 2022-10-19 13:19
|
libavfilter7 |
CVE-2020-22038 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22038
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:36
|
libavfilter7 |
CVE-2020-22039 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22039
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libavfilter7 |
CVE-2020-22040 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 idue to a memor ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22040
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libavfilter7 |
CVE-2020-22041 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22041
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 22:00
|
libavfilter7 |
CVE-2020-22042 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22042
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 18:54
|
libavfilter7 |
CVE-2020-22043 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:33
|
libavfilter7 |
CVE-2020-22044 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22044
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 21:15 修改: 2021-11-30 22:00
|
libopenjp2-7 |
CVE-2016-10505 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: NULL pointer dereference in imagetopnm function in convert.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10505
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-08-30 09:29 修改: 2020-09-09 19:57
|
libopenjp2-7 |
CVE-2016-10506 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: Division by zero in functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in pi.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10506
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-08-30 09:29 修改: 2020-09-09 19:57
|
libopenjp2-7 |
CVE-2016-9113 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg2: Multiple security issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9113
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57
|
libopenjp2-7 |
CVE-2016-9114 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg2: Multiple security issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9114
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57
|
libopenjp2-7 |
CVE-2016-9115 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg2: Multiple security issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9115
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57
|
libopenjp2-7 |
CVE-2016-9116 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg2: Multiple security issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9116
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57
|
libopenjp2-7 |
CVE-2016-9117 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg2: Multiple security issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9117
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-10-30 22:59 修改: 2020-09-09 19:57
|
libopenjp2-7 |
CVE-2016-9580 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg2: Integer overflow in tiftoimage causes heap buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9580
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-08-01 16:29 修改: 2023-02-12 23:27
|
libopenjp2-7 |
CVE-2016-9581 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg2: Infinite loop in tiftoimage resulting into heap buffer overflow in convert_32s_C1P1
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9581
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-08-01 14:29 修改: 2023-02-12 23:27
|
libopenjp2-7 |
CVE-2017-17479 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: Stack-buffer overflow in the pgxtoimage function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17479
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-08 19:29 修改: 2018-11-29 14:51
|
libopenjp2-7 |
CVE-2018-16375 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: Heap-based buffer overflow in pnmtoimage function in bin/jpwl/convert.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16375
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-09-03 00:29 修改: 2021-01-26 12:50
|
libopenjp2-7 |
CVE-2018-16376 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: Heap-based buffer overflow in function t2_encode_packet in src/lib/openmj2/t2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16376
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-09-03 00:29 修改: 2018-10-31 14:26
|
libopenjp2-7 |
CVE-2018-20845 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20845
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-06-26 18:15 修改: 2023-02-27 16:48
|
libopenjp2-7 |
CVE-2018-20846 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: out-of-bounds read in functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20846
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-06-26 18:15 修改: 2023-02-27 16:48
|
libopenjp2-7 |
CVE-2018-5727 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: integer overflow in opj_t1_encode_cblks in src/lib/openjp2/t1.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5727
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-01-16 22:29 修改: 2021-01-26 12:50
|
libopenjp2-7 |
CVE-2018-7648 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. Th ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7648
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-03-02 16:29 修改: 2021-01-26 12:50
|
libopenjp2-7 |
CVE-2019-6988 |
低危 |
2.3.0.5-2+deb10u2+dde |
|
openjpeg: DoS via memory exhaustion in opj_decompress
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6988
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-01-28 16:29 修改: 2020-08-24 17:37
|
libavfilter7 |
CVE-2020-22046 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22046
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libpam-gnome-keyring |
CVE-2018-19358 |
低危 |
3.28.2-5 |
|
gnome-keyring: login credentials retrieval via a Secret Service API call
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19358
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-11-18 19:29 修改: 2024-08-05 12:15
|
libavfilter7 |
CVE-2020-22048 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22048
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libavfilter7 |
CVE-2020-22051 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22051
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 17:15 修改: 2023-11-07 03:19
|
libavfilter7 |
CVE-2020-22056 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22056
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 18:15 修改: 2021-06-07 15:31
|
libavfilter7 |
CVE-2021-38090 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_roberts in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38090
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavfilter7 |
CVE-2021-38091 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_sobel in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38091
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavfilter7 |
CVE-2021-38092 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_prewitt in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38092
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavfilter7 |
CVE-2021-38093 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_robert in libavfilte ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38093
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
libavfilter7 |
CVE-2021-38094 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_sobel in libavfilter ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38094
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
binutils-common |
CVE-2022-47007 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in stab_demangle_v3_arg() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47007
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
binutils-common |
CVE-2022-47008 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in make_tempdir() and make_tempname() in bucomm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47008
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
binutils-common |
CVE-2022-47010 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in pr_function_type() in prdbg.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47010
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
binutils-common |
CVE-2022-47011 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in parse_stab_struct_fields() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47011
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
binutils-common |
CVE-2022-47673 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libpam-systemd |
CVE-2013-4392 |
低危 |
241.26-1+dde |
|
systemd: TOCTOU race condition when updating file permissions and SELinux security contexts
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49
|
libpam-systemd |
CVE-2019-20386 |
低危 |
241.26-1+dde |
|
systemd: memory leak in button_open() in login/logind-button.c when udev events are received
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20386
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-01-21 06:15 修改: 2023-11-07 03:09
|
libpam-systemd |
CVE-2020-13529 |
低危 |
241.26-1+dde |
|
systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16
|
libpam-systemd |
CVE-2023-31437 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can modify a seale ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
libpam-systemd |
CVE-2023-31438 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can truncate a sea ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
libpam-systemd |
CVE-2023-31439 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can modify the con ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
binutils-common |
CVE-2022-47695 |
低危 |
2.31.1.4-1+dde |
|
binutils: uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47695
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35
|
binutils-common |
CVE-2022-47696 |
低危 |
2.31.1.4-1+dde |
|
binutils: segmentation fault in compare_symbols() in objdump.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35
|
libpcap0.8 |
CVE-2023-7256 |
低危 |
1.8.1.1-6+dde |
|
libpcap: Double Free in libcap
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7256
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-31 00:15 修改: 2024-09-19 17:53
|
libpcap0.8 |
CVE-2024-8006 |
低危 |
1.8.1.1-6+dde |
|
libpcap: NULL pointer derefence in pcap_findalldevs_ex() in pcap-new.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8006
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-08-31 00:15 修改: 2024-09-19 17:46
|
binutils-common |
CVE-2022-48063 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory consumption in load_separate_debug_files() in dwarf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48063
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56
|
libpcre16-3 |
CVE-2017-11164 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: OP_KETRMAX feature in the match function in pcre_exec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38
|
libpcre16-3 |
CVE-2017-16231 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: self-recursive call in match() in pcre_exec.c leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16231
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15
|
libpcre16-3 |
CVE-2017-7245 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: stack-based buffer overflow write in pcre32_copy_substring
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7245
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
libpcre16-3 |
CVE-2017-7246 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: stack-based buffer overflow write in pcre32_copy_substring
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7246
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
libpcre16-3 |
CVE-2019-20838 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20838
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:05
|
libpcre2-16-0 |
CVE-2022-41409 |
低危 |
10.32.1-1+dde |
|
pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-07-18 14:15 修改: 2023-07-27 03:46
|
binutils-common |
CVE-2022-48064 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48064
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56
|
libpcre3 |
CVE-2017-11164 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: OP_KETRMAX feature in the match function in pcre_exec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38
|
libpcre3 |
CVE-2017-16231 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: self-recursive call in match() in pcre_exec.c leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16231
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15
|
libpcre3 |
CVE-2017-7245 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: stack-based buffer overflow write in pcre32_copy_substring
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7245
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
libpcre3 |
CVE-2017-7246 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: stack-based buffer overflow write in pcre32_copy_substring
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7246
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
libpcre3 |
CVE-2019-20838 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20838
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:05
|
binutils-common |
CVE-2022-48065 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in find_abstract_instance() in dwarf2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48065
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-15 02:36
|
libpcre3-dev |
CVE-2017-11164 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: OP_KETRMAX feature in the match function in pcre_exec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38
|
libpcre3-dev |
CVE-2017-16231 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: self-recursive call in match() in pcre_exec.c leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16231
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15
|
libpcre3-dev |
CVE-2017-7245 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: stack-based buffer overflow write in pcre32_copy_substring
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7245
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
libpcre3-dev |
CVE-2017-7246 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: stack-based buffer overflow write in pcre32_copy_substring
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7246
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
libpcre3-dev |
CVE-2019-20838 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20838
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:05
|
binutils-common |
CVE-2023-1579 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1579
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-04-03 23:15 修改: 2023-11-07 04:04
|
libpcre32-3 |
CVE-2017-11164 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: OP_KETRMAX feature in the match function in pcre_exec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38
|
libpcre32-3 |
CVE-2017-16231 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: self-recursive call in match() in pcre_exec.c leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16231
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15
|
libpcre32-3 |
CVE-2017-7245 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: stack-based buffer overflow write in pcre32_copy_substring
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7245
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
libpcre32-3 |
CVE-2017-7246 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: stack-based buffer overflow write in pcre32_copy_substring
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7246
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
libpcre32-3 |
CVE-2019-20838 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20838
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:05
|
binutils-common |
CVE-2023-1972 |
低危 |
2.31.1.4-1+dde |
|
binutils: Illegal memory access when accessing a zer0-lengthverdef table
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1972
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-05-17 22:15 修改: 2023-09-30 10:15
|
libpcrecpp0v5 |
CVE-2017-11164 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: OP_KETRMAX feature in the match function in pcre_exec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38
|
libpcrecpp0v5 |
CVE-2017-16231 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: self-recursive call in match() in pcre_exec.c leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16231
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15
|
libpcrecpp0v5 |
CVE-2017-7245 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: stack-based buffer overflow write in pcre32_copy_substring
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7245
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
libpcrecpp0v5 |
CVE-2017-7246 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: stack-based buffer overflow write in pcre32_copy_substring
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7246
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
libpcrecpp0v5 |
CVE-2019-20838 |
低危 |
2:8.39.2-12+dde2 |
|
pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20838
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:05
|
binutils-common |
CVE-2023-25584 |
低危 |
2.31.1.4-1+dde |
|
binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51
|
binutils-common |
CVE-2023-25585 |
低危 |
2.31.1.4-1+dde |
|
binutils: Field `file_table` of `struct module *module` is uninitialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
libperl5.28 |
CVE-2011-4116 |
低危 |
5.28.1.2-6+deb10u1 |
|
perl: File:: Temp insecure temporary file handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-01-31 18:15 修改: 2020-02-05 22:10
|
libperl5.28 |
CVE-2023-31486 |
低危 |
5.28.1.2-6+deb10u1 |
|
http-tiny: insecure TLS cert default
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31486
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-04-29 00:15 修改: 2023-06-21 18:19
|
binutils-common |
CVE-2023-25586 |
低危 |
2.31.1.4-1+dde |
|
binutils: Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25586
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
libpixman-1-0 |
CVE-2023-37769 |
低危 |
0.36.0-1 |
|
stress-test master commit e4c878 was discovered to contain a FPE vulne ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37769
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-07-17 20:15 修改: 2023-07-28 13:22
|
libpng16-16 |
CVE-2018-14048 |
低危 |
1.6.36.2-2+dde |
|
libpng: Segmentation fault in png.c:png_free_data function causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14048
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-07-13 16:29 修改: 2022-06-27 17:35
|
libpng16-16 |
CVE-2018-14550 |
低危 |
1.6.36.2-2+dde |
|
libpng: Stack-based buffer overflow in contrib/pngminus/pnm2png.c:get_token() potentially leading to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14550
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-07-10 12:15 修改: 2023-03-01 01:57
|
libpng16-16 |
CVE-2019-6129 |
低危 |
1.6.36.2-2+dde |
|
libpng: memory leak of png_info struct in pngcp.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6129
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-01-11 05:29 修改: 2024-08-04 21:15
|
libpng16-16 |
CVE-2021-4214 |
低危 |
1.6.36.2-2+dde |
|
libpng: hardcoded value leads to heap-overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4214
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-24 16:15 修改: 2022-11-08 02:32
|
libpolkit-agent-1-0 |
CVE-2016-2568 |
低危 |
0.105.10.6-1+eagle |
|
polkit: Program run via pkexec as unprivileged user can escape to parent session via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2568
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-02-13 18:59 修改: 2022-04-18 17:59
|
libpolkit-backend-1-0 |
CVE-2016-2568 |
低危 |
0.105.10.6-1+eagle |
|
polkit: Program run via pkexec as unprivileged user can escape to parent session via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2568
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-02-13 18:59 修改: 2022-04-18 17:59
|
libpolkit-gobject-1-0 |
CVE-2016-2568 |
低危 |
0.105.10.6-1+eagle |
|
polkit: Program run via pkexec as unprivileged user can escape to parent session via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2568
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-02-13 18:59 修改: 2022-04-18 17:59
|
binutils-common |
CVE-2023-25588 |
低危 |
2.31.1.4-1+dde |
|
binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab`
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
binutils-x86-64-linux-gnu |
CVE-2017-13716 |
低危 |
2.31.1.4-1+dde |
|
binutils: Memory leak with the C++ symbol demangler routine in libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2017-08-28 21:29 修改: 2019-10-03 00:03
|
libpoppler-cpp0v5 |
CVE-2013-4472 |
低危 |
0.71.0.2-1+eagle |
|
xpdf: insecure temporary file
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4472
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2014-04-22 14:23 修改: 2014-04-23 12:20
|
libpoppler-cpp0v5 |
CVE-2017-2814 |
低危 |
0.71.0.2-1+eagle |
|
poppler: Heap-buffer overflow in DCTStream::readScan()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2814
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-07-12 17:29 修改: 2022-04-19 19:15
|
libpoppler-cpp0v5 |
CVE-2017-2818 |
低危 |
0.71.0.2-1+eagle |
|
poppler: Heap-buffer overflow in the image rendering functionality
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2818
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-07-12 17:29 修改: 2022-04-19 19:15
|
libpoppler-cpp0v5 |
CVE-2017-2820 |
低危 |
0.71.0.2-1+eagle |
|
poppler: Integer overflow in the JPEG 2000 image parsing functionality
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2820
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-07-12 17:29 修改: 2023-01-27 20:57
|
libpoppler-cpp0v5 |
CVE-2017-9083 |
低危 |
0.71.0.2-1+eagle |
|
poppler: Null pointer dereference in the JPXStream::readUByte function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9083
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-05-19 16:29 修改: 2019-03-14 19:00
|
libpoppler-cpp0v5 |
CVE-2018-19059 |
低危 |
0.71.0.2-1+eagle |
|
poppler: out-of-bounds read in EmbFile::save2 in FileSpec.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19059
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-11-07 16:29 修改: 2019-08-06 17:15
|
libpoppler-cpp0v5 |
CVE-2018-19060 |
低危 |
0.71.0.2-1+eagle |
|
poppler: pdfdetach utility does not validate save paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19060
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-11-07 16:29 修改: 2019-08-06 17:15
|
libpoppler-cpp0v5 |
CVE-2019-10871 |
低危 |
0.71.0.2-1+eagle |
|
poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10871
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-04-05 04:29 修改: 2023-11-07 03:02
|
libpoppler-cpp0v5 |
CVE-2019-11026 |
低危 |
0.71.0.2-1+eagle |
|
poppler: infinite recursion in function FontInfoScanner::scanFonts in FontInfo.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11026
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-04-08 23:29 修改: 2023-11-07 03:02
|
libpoppler-cpp0v5 |
CVE-2019-9543 |
低危 |
0.71.0.2-1+eagle |
|
poppler: recursive function call in JBIG2Stream::readGenericBitmap() in JBIG2Stream.cc causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9543
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-03-01 19:29 修改: 2021-07-21 11:39
|
libpoppler-cpp0v5 |
CVE-2019-9545 |
低危 |
0.71.0.2-1+eagle |
|
poppler: recursive function call in JBIG2Stream::readTextRegion() in JBIG2Stream.cc causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9545
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-03-01 19:29 修改: 2021-07-21 11:39
|
libpoppler-cpp0v5 |
CVE-2022-24106 |
低危 |
0.71.0.2-1+eagle |
|
In Xpdf prior to 4.04, the DCT (JPEG) decoder was incorrectly allowing ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24106
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-30 04:15 修改: 2022-10-28 20:08
|
libpoppler-cpp0v5 |
CVE-2024-6239 |
低危 |
0.71.0.2-1+eagle |
|
poppler: pdfinfo: crash in broken documents when using -dests parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6239
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-21 14:15 修改: 2024-09-18 09:15
|
binutils-x86-64-linux-gnu |
CVE-2018-1000876 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow leads to heap-based buffer overflow in objdump
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000876
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-20 17:29 修改: 2023-11-07 02:51
|
libavformat58 |
CVE-2020-20450 |
低危 |
7:4.1.8.1-1+dde |
|
FFmpeg 4.2 is affected by null pointer dereference passed as argument ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20450
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 19:38
|
libpoppler-glib8 |
CVE-2013-4472 |
低危 |
0.71.0.2-1+eagle |
|
xpdf: insecure temporary file
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4472
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2014-04-22 14:23 修改: 2014-04-23 12:20
|
libpoppler-glib8 |
CVE-2017-2814 |
低危 |
0.71.0.2-1+eagle |
|
poppler: Heap-buffer overflow in DCTStream::readScan()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2814
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-07-12 17:29 修改: 2022-04-19 19:15
|
libpoppler-glib8 |
CVE-2017-2818 |
低危 |
0.71.0.2-1+eagle |
|
poppler: Heap-buffer overflow in the image rendering functionality
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2818
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-07-12 17:29 修改: 2022-04-19 19:15
|
libpoppler-glib8 |
CVE-2017-2820 |
低危 |
0.71.0.2-1+eagle |
|
poppler: Integer overflow in the JPEG 2000 image parsing functionality
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2820
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-07-12 17:29 修改: 2023-01-27 20:57
|
libpoppler-glib8 |
CVE-2017-9083 |
低危 |
0.71.0.2-1+eagle |
|
poppler: Null pointer dereference in the JPXStream::readUByte function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9083
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-05-19 16:29 修改: 2019-03-14 19:00
|
libpoppler-glib8 |
CVE-2018-19059 |
低危 |
0.71.0.2-1+eagle |
|
poppler: out-of-bounds read in EmbFile::save2 in FileSpec.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19059
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-11-07 16:29 修改: 2019-08-06 17:15
|
libpoppler-glib8 |
CVE-2018-19060 |
低危 |
0.71.0.2-1+eagle |
|
poppler: pdfdetach utility does not validate save paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19060
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-11-07 16:29 修改: 2019-08-06 17:15
|
libpoppler-glib8 |
CVE-2019-10871 |
低危 |
0.71.0.2-1+eagle |
|
poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10871
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-04-05 04:29 修改: 2023-11-07 03:02
|
libpoppler-glib8 |
CVE-2019-11026 |
低危 |
0.71.0.2-1+eagle |
|
poppler: infinite recursion in function FontInfoScanner::scanFonts in FontInfo.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11026
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-04-08 23:29 修改: 2023-11-07 03:02
|
libpoppler-glib8 |
CVE-2019-9543 |
低危 |
0.71.0.2-1+eagle |
|
poppler: recursive function call in JBIG2Stream::readGenericBitmap() in JBIG2Stream.cc causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9543
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-03-01 19:29 修改: 2021-07-21 11:39
|
libpoppler-glib8 |
CVE-2019-9545 |
低危 |
0.71.0.2-1+eagle |
|
poppler: recursive function call in JBIG2Stream::readTextRegion() in JBIG2Stream.cc causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9545
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-03-01 19:29 修改: 2021-07-21 11:39
|
libpoppler-glib8 |
CVE-2022-24106 |
低危 |
0.71.0.2-1+eagle |
|
In Xpdf prior to 4.04, the DCT (JPEG) decoder was incorrectly allowing ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24106
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-30 04:15 修改: 2022-10-28 20:08
|
libpoppler-glib8 |
CVE-2024-6239 |
低危 |
0.71.0.2-1+eagle |
|
poppler: pdfinfo: crash in broken documents when using -dests parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6239
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-21 14:15 修改: 2024-09-18 09:15
|
libavformat58 |
CVE-2020-20451 |
低危 |
7:4.1.8.1-1+dde |
|
Denial of Service issue in FFmpeg 4.2 due to resource management error ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20451
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 21:59
|
libavformat58 |
CVE-2020-20898 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_prewitt in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20898
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:45
|
libpoppler82 |
CVE-2013-4472 |
低危 |
0.71.0.2-1+eagle |
|
xpdf: insecure temporary file
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4472
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2014-04-22 14:23 修改: 2014-04-23 12:20
|
libpoppler82 |
CVE-2017-2814 |
低危 |
0.71.0.2-1+eagle |
|
poppler: Heap-buffer overflow in DCTStream::readScan()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2814
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-07-12 17:29 修改: 2022-04-19 19:15
|
libpoppler82 |
CVE-2017-2818 |
低危 |
0.71.0.2-1+eagle |
|
poppler: Heap-buffer overflow in the image rendering functionality
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2818
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-07-12 17:29 修改: 2022-04-19 19:15
|
libpoppler82 |
CVE-2017-2820 |
低危 |
0.71.0.2-1+eagle |
|
poppler: Integer overflow in the JPEG 2000 image parsing functionality
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2820
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-07-12 17:29 修改: 2023-01-27 20:57
|
libpoppler82 |
CVE-2017-9083 |
低危 |
0.71.0.2-1+eagle |
|
poppler: Null pointer dereference in the JPXStream::readUByte function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9083
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-05-19 16:29 修改: 2019-03-14 19:00
|
libpoppler82 |
CVE-2018-19059 |
低危 |
0.71.0.2-1+eagle |
|
poppler: out-of-bounds read in EmbFile::save2 in FileSpec.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19059
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-11-07 16:29 修改: 2019-08-06 17:15
|
libpoppler82 |
CVE-2018-19060 |
低危 |
0.71.0.2-1+eagle |
|
poppler: pdfdetach utility does not validate save paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19060
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-11-07 16:29 修改: 2019-08-06 17:15
|
libpoppler82 |
CVE-2019-10871 |
低危 |
0.71.0.2-1+eagle |
|
poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10871
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-04-05 04:29 修改: 2023-11-07 03:02
|
libpoppler82 |
CVE-2019-11026 |
低危 |
0.71.0.2-1+eagle |
|
poppler: infinite recursion in function FontInfoScanner::scanFonts in FontInfo.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11026
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-04-08 23:29 修改: 2023-11-07 03:02
|
libpoppler82 |
CVE-2019-9543 |
低危 |
0.71.0.2-1+eagle |
|
poppler: recursive function call in JBIG2Stream::readGenericBitmap() in JBIG2Stream.cc causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9543
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-03-01 19:29 修改: 2021-07-21 11:39
|
libpoppler82 |
CVE-2019-9545 |
低危 |
0.71.0.2-1+eagle |
|
poppler: recursive function call in JBIG2Stream::readTextRegion() in JBIG2Stream.cc causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9545
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-03-01 19:29 修改: 2021-07-21 11:39
|
libpoppler82 |
CVE-2022-24106 |
低危 |
0.71.0.2-1+eagle |
|
In Xpdf prior to 4.04, the DCT (JPEG) decoder was incorrectly allowing ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24106
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-30 04:15 修改: 2022-10-28 20:08
|
libpoppler82 |
CVE-2024-6239 |
低危 |
0.71.0.2-1+eagle |
|
poppler: pdfinfo: crash in broken documents when using -dests parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6239
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-21 14:15 修改: 2024-09-18 09:15
|
libavformat58 |
CVE-2020-22038 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22038
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:36
|
libavformat58 |
CVE-2020-22039 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22039
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libavformat58 |
CVE-2020-22040 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 idue to a memor ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22040
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libavformat58 |
CVE-2020-22041 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22041
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 22:00
|
libavformat58 |
CVE-2020-22042 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22042
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 18:54
|
libavformat58 |
CVE-2020-22043 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:33
|
libavformat58 |
CVE-2020-22044 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22044
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 21:15 修改: 2021-11-30 22:00
|
libavformat58 |
CVE-2020-22046 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22046
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libavformat58 |
CVE-2020-22048 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22048
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libavformat58 |
CVE-2020-22051 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22051
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 17:15 修改: 2023-11-07 03:19
|
libavformat58 |
CVE-2020-22056 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22056
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 18:15 修改: 2021-06-07 15:31
|
libavformat58 |
CVE-2021-38090 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_roberts in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38090
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavformat58 |
CVE-2021-38091 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_sobel in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38091
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavformat58 |
CVE-2021-38092 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_prewitt in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38092
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavformat58 |
CVE-2021-38093 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_robert in libavfilte ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38093
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
libavformat58 |
CVE-2021-38094 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_sobel in libavfilter ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38094
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
binutils-x86-64-linux-gnu |
CVE-2018-12697 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c.
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12697
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15
|
binutils-x86-64-linux-gnu |
CVE-2018-12698 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory consumption in demangle_template in cplus-dem.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12698
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-23 23:29 修改: 2019-10-03 00:03
|
libpostproc55 |
CVE-2020-20450 |
低危 |
7:4.1.8.1-1+dde |
|
FFmpeg 4.2 is affected by null pointer dereference passed as argument ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20450
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 19:38
|
libpostproc55 |
CVE-2020-20451 |
低危 |
7:4.1.8.1-1+dde |
|
Denial of Service issue in FFmpeg 4.2 due to resource management error ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20451
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 21:59
|
libpostproc55 |
CVE-2020-20898 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_prewitt in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20898
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:45
|
libpostproc55 |
CVE-2020-22038 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22038
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:36
|
libpostproc55 |
CVE-2020-22039 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22039
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libpostproc55 |
CVE-2020-22040 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 idue to a memor ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22040
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libpostproc55 |
CVE-2020-22041 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22041
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 22:00
|
libpostproc55 |
CVE-2020-22042 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22042
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 18:54
|
libpostproc55 |
CVE-2020-22043 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:33
|
libpostproc55 |
CVE-2020-22044 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22044
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 21:15 修改: 2021-11-30 22:00
|
libpostproc55 |
CVE-2020-22046 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22046
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libpostproc55 |
CVE-2020-22048 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22048
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libpostproc55 |
CVE-2020-22051 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22051
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 17:15 修改: 2023-11-07 03:19
|
libpostproc55 |
CVE-2020-22056 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22056
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 18:15 修改: 2021-06-07 15:31
|
libpostproc55 |
CVE-2021-38090 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_roberts in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38090
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libpostproc55 |
CVE-2021-38091 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_sobel in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38091
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libpostproc55 |
CVE-2021-38092 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_prewitt in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38092
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libpostproc55 |
CVE-2021-38093 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_robert in libavfilte ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38093
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
libpostproc55 |
CVE-2021-38094 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_sobel in libavfilter ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38094
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
libprocps7 |
CVE-2023-4016 |
低危 |
2:3.3.15-2 |
|
procps: ps buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4016
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-08-02 05:15 修改: 2023-12-15 18:19
|
binutils-x86-64-linux-gnu |
CVE-2018-12699 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in finish_stab in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12699
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15
|
binutils-x86-64-linux-gnu |
CVE-2018-12934 |
低危 |
2.31.1.4-1+dde |
|
binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12934
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-28 14:29 修改: 2020-04-21 22:15
|
binutils-x86-64-linux-gnu |
CVE-2018-17358 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid memory access in _bfd_stab_section_find_nearest_line in syms.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17358
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15
|
binutils-x86-64-linux-gnu |
CVE-2018-17359 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid memory access in bfd_zalloc in opncls.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17359
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15
|
binutils-x86-64-linux-gnu |
CVE-2018-17360 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer over-read in bfd_getl32 in libbfd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17360
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15
|
binutils-x86-64-linux-gnu |
CVE-2018-17794 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in libiberty/cplus-dem.c:work_stuff_copy_to_from() via crafted input
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17794
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-30 20:29 修改: 2020-04-21 22:15
|
binutils-x86-64-linux-gnu |
CVE-2018-17985 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack consumption problem caused by the cplus_demangle_type
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17985
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-04 23:29 修改: 2019-10-31 01:15
|
libprotobuf-lite17 |
CVE-2015-5237 |
低危 |
3.6.1.3-2 |
|
protobuf: integer overflow in serialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5237
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-09-25 17:29 修改: 2023-02-12 23:15
|
libpython-stdlib |
CVE-2008-4108 |
低危 |
2.7.16-1 |
|
python: Generic FAQ wizard moving tool insecure auxiliary /tmp file usage (symlink attack possible)
漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4108
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2008-09-18 17:59 修改: 2017-08-08 01:32
|
libpython2-stdlib |
CVE-2008-4108 |
低危 |
2.7.16-1 |
|
python: Generic FAQ wizard moving tool insecure auxiliary /tmp file usage (symlink attack possible)
漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4108
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2008-09-18 17:59 修改: 2017-08-08 01:32
|
binutils-x86-64-linux-gnu |
CVE-2018-18309 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid memory address dereference in read_reloc in reloc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18309
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-15 02:29 修改: 2023-11-07 02:55
|
binutils-x86-64-linux-gnu |
CVE-2018-18483 |
低危 |
2.31.1.4-1+dde |
|
binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18483
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-18 21:29 修改: 2019-10-31 01:15
|
binutils-x86-64-linux-gnu |
CVE-2018-18484 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack exhaustion in cp-demangle.c allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18484
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-18 21:29 修改: 2020-08-24 17:37
|
binutils-x86-64-linux-gnu |
CVE-2018-18605 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer over-read in sec_merge_hash_lookup in merge.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18605
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55
|
binutils-x86-64-linux-gnu |
CVE-2018-18606 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in _bfd_add_merge_section in merge_strings function in merge.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18606
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55
|
binutils-x86-64-linux-gnu |
CVE-2018-18607 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in elf_link_input_bfd in elflink.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18607
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55
|
libpython2.7 |
CVE-2013-7040 |
低危 |
2.7.16.2-1+eagle |
|
python: hash secret can be recovered remotely
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-7040
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2014-05-19 14:55 修改: 2019-10-25 11:53
|
libpython2.7 |
CVE-2017-17522 |
低危 |
2.7.16.2-1+eagle |
|
python: Command injection in Lib/webbrowser.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15
|
libpython2.7 |
CVE-2019-18348 |
低危 |
2.7.16.2-1+eagle |
|
python: CRLF injection via the host part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06
|
libpython2.7 |
CVE-2019-9674 |
低危 |
2.7.16.2-1+eagle |
|
python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40
|
libpython2.7 |
CVE-2020-27619 |
低危 |
2.7.16.2-1+eagle |
|
python: Unsafe use of eval() on data retrieved via HTTP in the test suite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15
|
libpython2.7 |
CVE-2021-28861 |
低危 |
2.7.16.2-1+eagle |
|
python: open redirection vulnerability in lib/http/server.py may lead to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15
|
libpython2.7 |
CVE-2024-5642 |
低危 |
2.7.16.2-1+eagle |
|
python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-27 21:15 修改: 2024-07-28 14:15
|
binutils-x86-64-linux-gnu |
CVE-2018-18700 |
低危 |
2.31.1.4-1+dde |
|
binutils: Recursive Stack Overflow within function d_name, d_encoding, and d_local_name in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18700
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15
|
binutils-x86-64-linux-gnu |
CVE-2018-18701 |
低危 |
2.31.1.4-1+dde |
|
binutils: infinite recursion in next_is_type_qual and cplus_demangle_type functions in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18701
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15
|
binutils-x86-64-linux-gnu |
CVE-2018-19931 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-based buffer overflow in bfd_elf32_swap_phdr_in function resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19931
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55
|
libavresample4 |
CVE-2020-20450 |
低危 |
7:4.1.8.1-1+dde |
|
FFmpeg 4.2 is affected by null pointer dereference passed as argument ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20450
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 19:38
|
libavresample4 |
CVE-2020-20451 |
低危 |
7:4.1.8.1-1+dde |
|
Denial of Service issue in FFmpeg 4.2 due to resource management error ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20451
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 21:59
|
libavresample4 |
CVE-2020-20898 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_prewitt in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20898
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:45
|
libpython2.7-minimal |
CVE-2013-7040 |
低危 |
2.7.16.2-1+eagle |
|
python: hash secret can be recovered remotely
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-7040
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2014-05-19 14:55 修改: 2019-10-25 11:53
|
libpython2.7-minimal |
CVE-2017-17522 |
低危 |
2.7.16.2-1+eagle |
|
python: Command injection in Lib/webbrowser.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15
|
libpython2.7-minimal |
CVE-2019-18348 |
低危 |
2.7.16.2-1+eagle |
|
python: CRLF injection via the host part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06
|
libpython2.7-minimal |
CVE-2019-9674 |
低危 |
2.7.16.2-1+eagle |
|
python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40
|
libpython2.7-minimal |
CVE-2020-27619 |
低危 |
2.7.16.2-1+eagle |
|
python: Unsafe use of eval() on data retrieved via HTTP in the test suite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15
|
libpython2.7-minimal |
CVE-2021-28861 |
低危 |
2.7.16.2-1+eagle |
|
python: open redirection vulnerability in lib/http/server.py may lead to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15
|
libpython2.7-minimal |
CVE-2024-5642 |
低危 |
2.7.16.2-1+eagle |
|
python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-27 21:15 修改: 2024-07-28 14:15
|
libavresample4 |
CVE-2020-22038 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22038
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:36
|
libavresample4 |
CVE-2020-22039 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22039
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libavresample4 |
CVE-2020-22040 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 idue to a memor ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22040
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libavresample4 |
CVE-2020-22041 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22041
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 22:00
|
libavresample4 |
CVE-2020-22042 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22042
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 18:54
|
libavresample4 |
CVE-2020-22043 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:33
|
libpython2.7-stdlib |
CVE-2013-7040 |
低危 |
2.7.16.2-1+eagle |
|
python: hash secret can be recovered remotely
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-7040
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2014-05-19 14:55 修改: 2019-10-25 11:53
|
libpython2.7-stdlib |
CVE-2017-17522 |
低危 |
2.7.16.2-1+eagle |
|
python: Command injection in Lib/webbrowser.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15
|
libpython2.7-stdlib |
CVE-2019-18348 |
低危 |
2.7.16.2-1+eagle |
|
python: CRLF injection via the host part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06
|
libpython2.7-stdlib |
CVE-2019-9674 |
低危 |
2.7.16.2-1+eagle |
|
python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40
|
libpython2.7-stdlib |
CVE-2020-27619 |
低危 |
2.7.16.2-1+eagle |
|
python: Unsafe use of eval() on data retrieved via HTTP in the test suite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15
|
libpython2.7-stdlib |
CVE-2021-28861 |
低危 |
2.7.16.2-1+eagle |
|
python: open redirection vulnerability in lib/http/server.py may lead to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15
|
libpython2.7-stdlib |
CVE-2024-5642 |
低危 |
2.7.16.2-1+eagle |
|
python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-27 21:15 修改: 2024-07-28 14:15
|
libavresample4 |
CVE-2020-22044 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22044
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 21:15 修改: 2021-11-30 22:00
|
libavresample4 |
CVE-2020-22046 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22046
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libavresample4 |
CVE-2020-22048 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22048
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libavresample4 |
CVE-2020-22051 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22051
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 17:15 修改: 2023-11-07 03:19
|
libavresample4 |
CVE-2020-22056 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22056
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 18:15 修改: 2021-06-07 15:31
|
libpython3.7-minimal |
CVE-2017-17522 |
低危 |
3.7.3.6-1+eagle |
|
python: Command injection in Lib/webbrowser.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15
|
libpython3.7-minimal |
CVE-2019-18348 |
低危 |
3.7.3.6-1+eagle |
|
python: CRLF injection via the host part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06
|
libpython3.7-minimal |
CVE-2019-9674 |
低危 |
3.7.3.6-1+eagle |
|
python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40
|
libpython3.7-minimal |
CVE-2020-27619 |
低危 |
3.7.3.6-1+eagle |
|
python: Unsafe use of eval() on data retrieved via HTTP in the test suite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15
|
libpython3.7-minimal |
CVE-2021-28861 |
低危 |
3.7.3.6-1+eagle |
|
python: open redirection vulnerability in lib/http/server.py may lead to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15
|
libpython3.7-minimal |
CVE-2024-4032 |
低危 |
3.7.3.6-1+eagle |
|
python: incorrect IPv4 and IPv6 private ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35
|
libpython3.7-minimal |
CVE-2024-5642 |
低危 |
3.7.3.6-1+eagle |
|
python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-27 21:15 修改: 2024-07-28 14:15
|
libavresample4 |
CVE-2021-38090 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_roberts in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38090
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavresample4 |
CVE-2021-38091 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_sobel in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38091
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavresample4 |
CVE-2021-38092 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_prewitt in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38092
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavresample4 |
CVE-2021-38093 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_robert in libavfilte ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38093
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
libavresample4 |
CVE-2021-38094 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_sobel in libavfilter ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38094
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
libpython3.7-stdlib |
CVE-2017-17522 |
低危 |
3.7.3.6-1+eagle |
|
python: Command injection in Lib/webbrowser.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15
|
libpython3.7-stdlib |
CVE-2019-18348 |
低危 |
3.7.3.6-1+eagle |
|
python: CRLF injection via the host part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06
|
libpython3.7-stdlib |
CVE-2019-9674 |
低危 |
3.7.3.6-1+eagle |
|
python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40
|
libpython3.7-stdlib |
CVE-2020-27619 |
低危 |
3.7.3.6-1+eagle |
|
python: Unsafe use of eval() on data retrieved via HTTP in the test suite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15
|
libpython3.7-stdlib |
CVE-2021-28861 |
低危 |
3.7.3.6-1+eagle |
|
python: open redirection vulnerability in lib/http/server.py may lead to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15
|
libpython3.7-stdlib |
CVE-2024-4032 |
低危 |
3.7.3.6-1+eagle |
|
python: incorrect IPv4 and IPv6 private ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35
|
libpython3.7-stdlib |
CVE-2024-5642 |
低危 |
3.7.3.6-1+eagle |
|
python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-27 21:15 修改: 2024-07-28 14:15
|
binutils-x86-64-linux-gnu |
CVE-2018-19932 |
低危 |
2.31.1.4-1+dde |
|
binutils: Integer overflow due to the IS_CONTAINED_BY_LMA macro resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19932
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55
|
libqt4-dbus |
CVE-2009-3015 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
QtWeb 3.0 Builds 001 and 003 does not properly block javascript: and d ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3015
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2009-08-31 16:30 修改: 2017-08-17 01:31
|
libqt4-dbus |
CVE-2009-3272 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
Stack consumption vulnerability in WebKit.dll in WebKit in Apple Safar ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3272
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2009-09-21 19:30 修改: 2017-09-19 01:29
|
libqt4-dbus |
TEMP-0560108-565B70 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
[browser-based css info disclosure]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0560108-565B70
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libqt4-dbus |
TEMP-0568486-B6FCB6 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
[browser javascript document.write denial-of-service]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0568486-B6FCB6
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
binutils-x86-64-linux-gnu |
CVE-2018-20002 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in _bfd_generic_read_minisymbols function in syms.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20002
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-10 02:29 修改: 2023-11-07 02:56
|
libqt4-xml |
CVE-2009-3015 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
QtWeb 3.0 Builds 001 and 003 does not properly block javascript: and d ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3015
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2009-08-31 16:30 修改: 2017-08-17 01:31
|
libqt4-xml |
CVE-2009-3272 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
Stack consumption vulnerability in WebKit.dll in WebKit in Apple Safar ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3272
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2009-09-21 19:30 修改: 2017-09-19 01:29
|
libqt4-xml |
TEMP-0560108-565B70 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
[browser-based css info disclosure]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0560108-565B70
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libqt4-xml |
TEMP-0568486-B6FCB6 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
[browser javascript document.write denial-of-service]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0568486-B6FCB6
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
binutils-x86-64-linux-gnu |
CVE-2018-20623 |
低危 |
2.31.1.4-1+dde |
|
binutils: Use-after-free in the error function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20623
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-31 19:29 修改: 2019-10-31 01:15
|
binutils-x86-64-linux-gnu |
CVE-2018-20651 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in elf_link_add_object_symbols function resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20651
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-01 16:29 修改: 2023-11-07 02:56
|
binutils-x86-64-linux-gnu |
CVE-2018-20671 |
低危 |
2.31.1.4-1+dde |
|
binutils: Integer overflow in load_specific_debug_section function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20671
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-04 16:29 修改: 2023-11-07 02:56
|
libqt5concurrent5 |
CVE-2023-45935 |
低危 |
5.15.1.8-1+dde |
|
Qt 6 through 6.6 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45935
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
binutils-x86-64-linux-gnu |
CVE-2018-20673 |
低危 |
2.31.1.4-1+dde |
|
libiberty: Integer overflow in demangle_template() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20673
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-04 18:29 修改: 2020-08-24 17:37
|
binutils-x86-64-linux-gnu |
CVE-2018-20712 |
低危 |
2.31.1.4-1+dde |
|
libiberty: heap-based buffer over-read in d_expression_1
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20712
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-15 00:29 修改: 2019-10-03 00:03
|
binutils-x86-64-linux-gnu |
CVE-2018-9138 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack Exhaustion in the the C++ demangling functions provided by libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9138
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-03-30 08:29 修改: 2020-04-21 22:15
|
libqt5core5a |
CVE-2023-45935 |
低危 |
5.15.1.8-1+dde |
|
Qt 6 through 6.6 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45935
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
binutils-x86-64-linux-gnu |
CVE-2018-9996 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack-overflow in libiberty/cplus-dem.c causes crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9996
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-04-10 22:29 修改: 2019-10-03 00:03
|
binutils-x86-64-linux-gnu |
CVE-2019-1010180 |
低危 |
2.31.1.4-1+dde |
|
gdb: buffer overflow while opening an ELF for debugging leads to Dos, information dislosure and code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010180
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-24 13:15 修改: 2021-07-21 11:39
|
binutils-x86-64-linux-gnu |
CVE-2019-1010204 |
低危 |
2.31.1.4-1+dde |
|
binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010204
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-23 14:15 修改: 2023-11-07 03:02
|
libqt5dbus5 |
CVE-2023-45935 |
低危 |
5.15.1.8-1+dde |
|
Qt 6 through 6.6 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45935
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
binutils-x86-64-linux-gnu |
CVE-2019-12972 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bounds read in setup_group in bfd/elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12972
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-06-26 14:15 修改: 2023-11-07 03:03
|
binutils-x86-64-linux-gnu |
CVE-2019-14250 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow in simple-object-elf.c leads to a heap-based buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14250
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-24 04:15 修改: 2023-03-01 18:01
|
binutils-x86-64-linux-gnu |
CVE-2019-14444 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow in function apply_relocation in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14444
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-30 13:15 修改: 2023-03-01 17:58
|
libqt5gui5 |
CVE-2023-45935 |
低危 |
5.15.1.8-1+dde |
|
Qt 6 through 6.6 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45935
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
binutils-x86-64-linux-gnu |
CVE-2019-17450 |
低危 |
2.31.1.4-1+dde |
|
binutils: denial of service via crafted ELF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17450
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-10-10 17:15 修改: 2023-02-27 15:32
|
binutils-x86-64-linux-gnu |
CVE-2019-17451 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17451
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-10-10 17:15 修改: 2023-11-07 03:06
|
binutils-x86-64-linux-gnu |
CVE-2019-9070 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer over-read in function d_expression_1 in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9070
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17
|
libqt5network5 |
CVE-2023-45935 |
低危 |
5.15.1.8-1+dde |
|
Qt 6 through 6.6 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45935
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
binutils-x86-64-linux-gnu |
CVE-2019-9071 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack consumption in function d_count_templates_scopes in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9071
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 19:32
|
libavutil56 |
CVE-2020-20450 |
低危 |
7:4.1.8.1-1+dde |
|
FFmpeg 4.2 is affected by null pointer dereference passed as argument ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20450
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 19:38
|
libavutil56 |
CVE-2020-20451 |
低危 |
7:4.1.8.1-1+dde |
|
Denial of Service issue in FFmpeg 4.2 due to resource management error ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20451
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 21:59
|
libqt5opengl5 |
CVE-2023-45935 |
低危 |
5.15.1.8-1+dde |
|
Qt 6 through 6.6 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45935
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libavutil56 |
CVE-2020-20898 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_prewitt in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20898
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:45
|
libavutil56 |
CVE-2020-22038 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22038
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:36
|
libavutil56 |
CVE-2020-22039 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22039
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libqt5printsupport5 |
CVE-2023-45935 |
低危 |
5.15.1.8-1+dde |
|
Qt 6 through 6.6 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45935
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libqt5qml5 |
CVE-2022-40983 |
低危 |
5.15.1.2+dde-1+eagle |
|
An integer overflow vulnerability exists in the QML QtScript Reflect A ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40983
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 15:31
|
libqt5qml5 |
CVE-2022-43591 |
低危 |
5.15.1.2+dde-1+eagle |
|
A buffer overflow vulnerability exists in the QML QtScript Reflect API ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43591
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 07:55
|
libqt5qmlmodels5 |
CVE-2022-40983 |
低危 |
5.15.1.2+dde-1+eagle |
|
An integer overflow vulnerability exists in the QML QtScript Reflect A ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40983
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 15:31
|
libqt5qmlmodels5 |
CVE-2022-43591 |
低危 |
5.15.1.2+dde-1+eagle |
|
A buffer overflow vulnerability exists in the QML QtScript Reflect API ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43591
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 07:55
|
libqt5qmlworkerscript5 |
CVE-2022-40983 |
低危 |
5.15.1.2+dde-1+eagle |
|
An integer overflow vulnerability exists in the QML QtScript Reflect A ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40983
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 15:31
|
libqt5qmlworkerscript5 |
CVE-2022-43591 |
低危 |
5.15.1.2+dde-1+eagle |
|
A buffer overflow vulnerability exists in the QML QtScript Reflect API ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43591
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 07:55
|
libqt5quick5 |
CVE-2022-40983 |
低危 |
5.15.1.2+dde-1+eagle |
|
An integer overflow vulnerability exists in the QML QtScript Reflect A ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40983
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 15:31
|
libqt5quick5 |
CVE-2022-43591 |
低危 |
5.15.1.2+dde-1+eagle |
|
A buffer overflow vulnerability exists in the QML QtScript Reflect API ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43591
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 07:55
|
libqt5quickwidgets5 |
CVE-2022-40983 |
低危 |
5.15.1.2+dde-1+eagle |
|
An integer overflow vulnerability exists in the QML QtScript Reflect A ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40983
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 15:31
|
libqt5quickwidgets5 |
CVE-2022-43591 |
低危 |
5.15.1.2+dde-1+eagle |
|
A buffer overflow vulnerability exists in the QML QtScript Reflect API ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43591
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 07:55
|
libavutil56 |
CVE-2020-22040 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 idue to a memor ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22040
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libavutil56 |
CVE-2020-22041 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22041
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 22:00
|
libavutil56 |
CVE-2020-22042 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22042
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 18:54
|
libqt5sql5 |
CVE-2023-45935 |
低危 |
5.15.1.8-1+dde |
|
Qt 6 through 6.6 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45935
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libavutil56 |
CVE-2020-22043 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:33
|
libavutil56 |
CVE-2020-22044 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22044
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 21:15 修改: 2021-11-30 22:00
|
libavutil56 |
CVE-2020-22046 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22046
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libqt5sql5-sqlite |
CVE-2023-45935 |
低危 |
5.15.1.8-1+dde |
|
Qt 6 through 6.6 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45935
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libavutil56 |
CVE-2020-22048 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22048
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libavutil56 |
CVE-2020-22051 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22051
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 17:15 修改: 2023-11-07 03:19
|
libavutil56 |
CVE-2020-22056 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22056
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 18:15 修改: 2021-06-07 15:31
|
libavutil56 |
CVE-2021-38090 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_roberts in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38090
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavutil56 |
CVE-2021-38091 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_sobel in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38091
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavutil56 |
CVE-2021-38092 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_prewitt in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38092
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavutil56 |
CVE-2021-38093 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_robert in libavfilte ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38093
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
libqt5test5 |
CVE-2023-45935 |
低危 |
5.15.1.8-1+dde |
|
Qt 6 through 6.6 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45935
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libavutil56 |
CVE-2021-38094 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_sobel in libavfilter ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38094
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
binutils-x86-64-linux-gnu |
CVE-2019-9073 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory allocation in function _bfd_elf_slurp_version_tables in elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9073
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:09
|
binutils-x86-64-linux-gnu |
CVE-2019-9074 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bound read in function bfd_getl32 in libbfd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9074
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:11
|
libqt5widgets5 |
CVE-2023-45935 |
低危 |
5.15.1.8-1+dde |
|
Qt 6 through 6.6 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45935
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
binutils-x86-64-linux-gnu |
CVE-2019-9075 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in function _bfd_archive_64_bit_slurp_armap in archive64.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9075
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:19
|
binutils-x86-64-linux-gnu |
CVE-2019-9077 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in function process_mips_specific in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9077
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17
|
binutils-x86-64-linux-gnu |
CVE-2020-16590 |
低危 |
2.31.1.4-1+dde |
|
binutils: double free vulnerability in process_symbol_table could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16590
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
libqt5xml5 |
CVE-2023-45935 |
低危 |
5.15.1.8-1+dde |
|
Qt 6 through 6.6 was discovered to contain a NULL pointer dereference ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45935
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
binutils-x86-64-linux-gnu |
CVE-2020-16591 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid read in process_symbol_table could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16591
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
libqtcore4 |
CVE-2009-3015 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
QtWeb 3.0 Builds 001 and 003 does not properly block javascript: and d ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3015
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2009-08-31 16:30 修改: 2017-08-17 01:31
|
libqtcore4 |
CVE-2009-3272 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
Stack consumption vulnerability in WebKit.dll in WebKit in Apple Safar ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3272
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2009-09-21 19:30 修改: 2017-09-19 01:29
|
libqtcore4 |
TEMP-0560108-565B70 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
[browser-based css info disclosure]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0560108-565B70
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libqtcore4 |
TEMP-0568486-B6FCB6 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
[browser javascript document.write denial-of-service]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0568486-B6FCB6
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
binutils-x86-64-linux-gnu |
CVE-2020-16592 |
低危 |
2.31.1.4-1+dde |
|
binutils: use-after-free in bfd_hash_lookup could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16592
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
libqtdbus4 |
CVE-2009-3015 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
QtWeb 3.0 Builds 001 and 003 does not properly block javascript: and d ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3015
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2009-08-31 16:30 修改: 2017-08-17 01:31
|
libqtdbus4 |
CVE-2009-3272 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
Stack consumption vulnerability in WebKit.dll in WebKit in Apple Safar ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3272
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2009-09-21 19:30 修改: 2017-09-19 01:29
|
libqtdbus4 |
TEMP-0560108-565B70 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
[browser-based css info disclosure]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0560108-565B70
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libqtdbus4 |
TEMP-0568486-B6FCB6 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
[browser javascript document.write denial-of-service]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0568486-B6FCB6
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
binutils-x86-64-linux-gnu |
CVE-2020-16593 |
低危 |
2.31.1.4-1+dde |
|
binutils: Null Pointer Dereference in scan_unit_for_symbols could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16593
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
libqtgui4 |
CVE-2009-3015 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
QtWeb 3.0 Builds 001 and 003 does not properly block javascript: and d ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3015
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2009-08-31 16:30 修改: 2017-08-17 01:31
|
libqtgui4 |
CVE-2009-3272 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
Stack consumption vulnerability in WebKit.dll in WebKit in Apple Safar ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3272
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2009-09-21 19:30 修改: 2017-09-19 01:29
|
libqtgui4 |
TEMP-0560108-565B70 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
[browser-based css info disclosure]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0560108-565B70
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libqtgui4 |
TEMP-0568486-B6FCB6 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
[browser javascript document.write denial-of-service]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0568486-B6FCB6
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
binutils-x86-64-linux-gnu |
CVE-2020-16599 |
低危 |
2.31.1.4-1+dde |
|
binutils: Null Pointer Dereference in _bfd_elf_get_symbol_version_string could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16599
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
libbasicusageenvironment1 |
CVE-2019-15232 |
低危 |
2018.11.26.1-1+eagle |
|
Live555 before 2019.08.16 has a Use-After-Free because GenericMediaSer ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15232
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-08-20 00:15 修改: 2023-03-29 16:23
|
libquadmath0 |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
libbasicusageenvironment1 |
CVE-2019-7732 |
低危 |
2018.11.26.1-1+eagle |
|
In Live555 0.95, a setup packet can cause a memory leak leading to DoS ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7732
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-02-11 17:29 修改: 2020-08-24 17:37
|
libbasicusageenvironment1 |
CVE-2019-7733 |
低危 |
2018.11.26.1-1+eagle |
|
In Live555 0.95, there is a buffer overflow via a large integer in a C ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7733
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-02-11 17:29 修改: 2020-05-15 00:15
|
libbinutils |
CVE-2017-13716 |
低危 |
2.31.1.4-1+dde |
|
binutils: Memory leak with the C++ symbol demangler routine in libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2017-08-28 21:29 修改: 2019-10-03 00:03
|
libbinutils |
CVE-2018-1000876 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow leads to heap-based buffer overflow in objdump
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000876
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-20 17:29 修改: 2023-11-07 02:51
|
libbinutils |
CVE-2018-12697 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c.
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12697
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15
|
libbinutils |
CVE-2018-12698 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory consumption in demangle_template in cplus-dem.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12698
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-23 23:29 修改: 2019-10-03 00:03
|
libbinutils |
CVE-2018-12699 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in finish_stab in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12699
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15
|
libbinutils |
CVE-2018-12934 |
低危 |
2.31.1.4-1+dde |
|
binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12934
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-28 14:29 修改: 2020-04-21 22:15
|
libraw19 |
CVE-2020-24890 |
低危 |
0.19.2-2 |
|
libraw: null pointer dereference in parse_tiff_ifd in src/metadata/tiff.cpp
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24890
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2020-09-16 15:15 修改: 2024-08-04 16:15
|
libbinutils |
CVE-2018-17358 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid memory access in _bfd_stab_section_find_nearest_line in syms.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17358
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15
|
libbinutils |
CVE-2018-17359 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid memory access in bfd_zalloc in opncls.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17359
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15
|
libbinutils |
CVE-2018-17360 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer over-read in bfd_getl32 in libbfd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17360
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15
|
libbinutils |
CVE-2018-17794 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in libiberty/cplus-dem.c:work_stuff_copy_to_from() via crafted input
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17794
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-30 20:29 修改: 2020-04-21 22:15
|
libbinutils |
CVE-2018-17985 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack consumption problem caused by the cplus_demangle_type
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17985
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-04 23:29 修改: 2019-10-31 01:15
|
libbinutils |
CVE-2018-18309 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid memory address dereference in read_reloc in reloc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18309
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-15 02:29 修改: 2023-11-07 02:55
|
libbinutils |
CVE-2018-18483 |
低危 |
2.31.1.4-1+dde |
|
binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18483
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-18 21:29 修改: 2019-10-31 01:15
|
libbinutils |
CVE-2018-18484 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack exhaustion in cp-demangle.c allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18484
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-18 21:29 修改: 2020-08-24 17:37
|
libbinutils |
CVE-2018-18605 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer over-read in sec_merge_hash_lookup in merge.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18605
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55
|
libbinutils |
CVE-2018-18606 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in _bfd_add_merge_section in merge_strings function in merge.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18606
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55
|
libseccomp2 |
CVE-2019-9893 |
低危 |
2.3.3-4 |
|
libseccomp: incorrect generation of syscall filters in libseccomp
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9893
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-03-21 16:01 修改: 2020-08-24 17:37
|
libsepol1 |
CVE-2021-36084 |
低危 |
2.8-1 |
|
libsepol: use-after-free in __cil_verify_classperms()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36084
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36
|
libsepol1 |
CVE-2021-36085 |
低危 |
2.8-1 |
|
libsepol: use-after-free in __cil_verify_classperms()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36085
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36
|
libsepol1 |
CVE-2021-36086 |
低危 |
2.8-1 |
|
libsepol: use-after-free in cil_reset_classpermission()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36086
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36
|
libsepol1 |
CVE-2021-36087 |
低危 |
2.8-1 |
|
libsepol: heap-based buffer overflow in ebitmap_match_any()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36087
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36
|
libsepol1-dev |
CVE-2021-36084 |
低危 |
2.8-1 |
|
libsepol: use-after-free in __cil_verify_classperms()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36084
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36
|
libsepol1-dev |
CVE-2021-36085 |
低危 |
2.8-1 |
|
libsepol: use-after-free in __cil_verify_classperms()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36085
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36
|
libsepol1-dev |
CVE-2021-36086 |
低危 |
2.8-1 |
|
libsepol: use-after-free in cil_reset_classpermission()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36086
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36
|
libsepol1-dev |
CVE-2021-36087 |
低危 |
2.8-1 |
|
libsepol: heap-based buffer overflow in ebitmap_match_any()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36087
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36
|
libslang2 |
CVE-2023-45927 |
低危 |
2.3.2-2 |
|
S-Lang 2.3.2 was discovered to contain an arithmetic exception via the ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45927
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 04:15 修改: 2024-08-06 15:35
|
libslang2 |
CVE-2023-45929 |
低危 |
2.3.2-2 |
|
S-Lang 2.3.2 was discovered to contain a segmentation fault via the fu ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45929
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 04:15 修改: 2024-03-27 12:29
|
libbinutils |
CVE-2018-18607 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in elf_link_input_bfd in elflink.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18607
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55
|
libbinutils |
CVE-2018-18700 |
低危 |
2.31.1.4-1+dde |
|
binutils: Recursive Stack Overflow within function d_name, d_encoding, and d_local_name in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18700
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15
|
libsmartcols1 |
CVE-2022-0563 |
低危 |
2.33.1-0.1 |
|
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
libbinutils |
CVE-2018-18701 |
低危 |
2.31.1.4-1+dde |
|
binutils: infinite recursion in next_is_type_qual and cplus_demangle_type functions in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18701
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15
|
libbinutils |
CVE-2018-19931 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-based buffer overflow in bfd_elf32_swap_phdr_in function resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19931
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55
|
libbinutils |
CVE-2018-19932 |
低危 |
2.31.1.4-1+dde |
|
binutils: Integer overflow due to the IS_CONTAINED_BY_LMA macro resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19932
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55
|
libbinutils |
CVE-2018-20002 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in _bfd_generic_read_minisymbols function in syms.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20002
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-10 02:29 修改: 2023-11-07 02:56
|
libbinutils |
CVE-2018-20623 |
低危 |
2.31.1.4-1+dde |
|
binutils: Use-after-free in the error function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20623
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-31 19:29 修改: 2019-10-31 01:15
|
libbinutils |
CVE-2018-20651 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in elf_link_add_object_symbols function resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20651
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-01 16:29 修改: 2023-11-07 02:56
|
libbinutils |
CVE-2018-20671 |
低危 |
2.31.1.4-1+dde |
|
binutils: Integer overflow in load_specific_debug_section function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20671
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-04 16:29 修改: 2023-11-07 02:56
|
libbinutils |
CVE-2018-20673 |
低危 |
2.31.1.4-1+dde |
|
libiberty: Integer overflow in demangle_template() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20673
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-04 18:29 修改: 2020-08-24 17:37
|
libbinutils |
CVE-2018-20712 |
低危 |
2.31.1.4-1+dde |
|
libiberty: heap-based buffer over-read in d_expression_1
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20712
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-15 00:29 修改: 2019-10-03 00:03
|
libbinutils |
CVE-2018-9138 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack Exhaustion in the the C++ demangling functions provided by libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9138
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-03-30 08:29 修改: 2020-04-21 22:15
|
libbinutils |
CVE-2018-9996 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack-overflow in libiberty/cplus-dem.c causes crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9996
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-04-10 22:29 修改: 2019-10-03 00:03
|
libbinutils |
CVE-2019-1010180 |
低危 |
2.31.1.4-1+dde |
|
gdb: buffer overflow while opening an ELF for debugging leads to Dos, information dislosure and code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010180
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-24 13:15 修改: 2021-07-21 11:39
|
libbinutils |
CVE-2019-1010204 |
低危 |
2.31.1.4-1+dde |
|
binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010204
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-23 14:15 修改: 2023-11-07 03:02
|
libbinutils |
CVE-2019-12972 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bounds read in setup_group in bfd/elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12972
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-06-26 14:15 修改: 2023-11-07 03:03
|
libbinutils |
CVE-2019-14250 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow in simple-object-elf.c leads to a heap-based buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14250
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-24 04:15 修改: 2023-03-01 18:01
|
libbinutils |
CVE-2019-14444 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow in function apply_relocation in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14444
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-30 13:15 修改: 2023-03-01 17:58
|
libbinutils |
CVE-2019-17450 |
低危 |
2.31.1.4-1+dde |
|
binutils: denial of service via crafted ELF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17450
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-10-10 17:15 修改: 2023-02-27 15:32
|
libbinutils |
CVE-2019-17451 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17451
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-10-10 17:15 修改: 2023-11-07 03:06
|
libbinutils |
CVE-2019-9070 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer over-read in function d_expression_1 in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9070
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17
|
libbinutils |
CVE-2019-9071 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack consumption in function d_count_templates_scopes in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9071
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 19:32
|
libbinutils |
CVE-2019-9073 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory allocation in function _bfd_elf_slurp_version_tables in elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9073
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:09
|
libbinutils |
CVE-2019-9074 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bound read in function bfd_getl32 in libbfd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9074
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:11
|
libbinutils |
CVE-2019-9075 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in function _bfd_archive_64_bit_slurp_armap in archive64.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9075
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:19
|
libbinutils |
CVE-2019-9077 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in function process_mips_specific in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9077
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17
|
libbinutils |
CVE-2020-16590 |
低危 |
2.31.1.4-1+dde |
|
binutils: double free vulnerability in process_symbol_table could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16590
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
libbinutils |
CVE-2020-16591 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid read in process_symbol_table could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16591
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
libbinutils |
CVE-2020-16592 |
低危 |
2.31.1.4-1+dde |
|
binutils: use-after-free in bfd_hash_lookup could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16592
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
libbinutils |
CVE-2020-16593 |
低危 |
2.31.1.4-1+dde |
|
binutils: Null Pointer Dereference in scan_unit_for_symbols could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16593
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
libbinutils |
CVE-2020-16599 |
低危 |
2.31.1.4-1+dde |
|
binutils: Null Pointer Dereference in _bfd_elf_get_symbol_version_string could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16599
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
libbinutils |
CVE-2020-19724 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in get_data() in nm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19724
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19
|
libbinutils |
CVE-2020-19726 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19726
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2024-10-07 19:36
|
libbinutils |
CVE-2020-21490 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in get_field() in microblaze-dis.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21490
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19
|
libbinutils |
CVE-2020-35342 |
低危 |
2.31.1.4-1+dde |
|
binutils: uninitialized heap memory in tic4x_print_cond() in opcodes/tic4x-dis.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35342
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15
|
libbinutils |
CVE-2020-35448 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35448
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-27 04:15 修改: 2023-11-07 03:21
|
libbinutils |
CVE-2020-35493 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35493
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
libbinutils |
CVE-2020-35494 |
低危 |
2.31.1.4-1+dde |
|
binutils: usage of unitialized heap in tic4x_print_cond function in opcodes/tic4x-dis.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35494
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
libbinutils |
CVE-2020-35495 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in bfd_pef_parse_symbols function in bfd/pef.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35495
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
libbinutils |
CVE-2020-35496 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in bfd_pef_scan_start_address function in bfd/pef.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35496
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
libbinutils |
CVE-2020-35507 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in bfd_pef_parse_function_stubs function in bfd/pef.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35507
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-01-24 16:10
|
libbinutils |
CVE-2021-20197 |
低危 |
2.31.1.4-1+dde |
|
binutils: Race window allows users to own arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20197
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15
|
libsmbclient |
CVE-2020-27840 |
低危 |
2:4.9.5.18-1+dde |
|
samba: Heap corruption via crafted DN strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27840
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-12 15:15 修改: 2023-11-07 03:21
|
libsmbclient |
CVE-2021-20277 |
低危 |
2:4.9.5.18-1+dde |
|
samba: Out of bounds read in AD DC LDAP server
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20277
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-12 14:15 修改: 2023-11-07 03:29
|
libsmbclient |
CVE-2021-43566 |
低危 |
2:4.9.5.18-1+dde |
|
samba: Symlink race error can allow directory creation outside of the exported share
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43566
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-11 16:15 修改: 2022-10-14 11:42
|
libbinutils |
CVE-2021-20284 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20284
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15
|
libbinutils |
CVE-2021-20294 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack buffer overflow WRITE may lead to a DoS via a crafted ELF
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20294
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-04-29 16:15 修改: 2023-11-07 03:29
|
libbinutils |
CVE-2021-32256 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack-overflow issue in demangle_type in rust-demangle.c.
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32256
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-07-18 14:15 修改: 2023-08-24 19:15
|
libbinutils |
CVE-2021-3530 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack memory exhaustion in demangle_path() in rust-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3530
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-06-02 15:15 修改: 2022-09-28 20:03
|
libbinutils |
CVE-2021-3549 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3549
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-05-26 21:15 修改: 2022-10-07 20:28
|
libbinutils |
CVE-2021-3826 |
低危 |
2.31.1.4-1+dde |
|
libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3826
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-09-01 21:15 修改: 2024-01-22 15:01
|
libbinutils |
CVE-2021-45078 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45078
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-12-15 20:15 修改: 2023-11-07 03:39
|
libbinutils |
CVE-2021-46174 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46174
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:40
|
libbinutils |
CVE-2021-46195 |
低危 |
2.31.1.4-1+dde |
|
gcc: uncontrolled recursion in libiberty/rust-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46195
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-01-14 20:15 修改: 2022-01-22 01:38
|
libsqlite3-0 |
CVE-2019-19244 |
低危 |
3.27.2.3-1+security |
|
sqlite: allows a crash if a sub-select uses both DISTINCT and window functions and also has certain ORDER BY usage
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19244
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-11-25 20:15 修改: 2022-04-15 16:12
|
libsqlite3-0 |
CVE-2020-11656 |
低危 |
3.27.2.3-1+security |
|
sqlite: use-after-free in the ALTER TABLE implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11656
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-04-09 03:15 修改: 2022-04-08 10:34
|
libsqlite3-0 |
CVE-2021-36690 |
低危 |
3.27.2.3-1+security |
|
A segmentation fault can occur in the sqlite3.exe command-line compone ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36690
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2021-08-24 14:15 修改: 2024-08-04 01:15
|
libsqlite3-0 |
CVE-2021-45346 |
低危 |
3.27.2.3-1+security |
|
sqlite: crafted SQL query allows a malicious user to obtain sensitive information
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45346
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-02-14 19:15 修改: 2024-08-04 05:15
|
libsqlite3-0 |
CVE-2022-35737 |
低危 |
3.27.2.3-1+security |
|
sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35737
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2022-08-03 06:15 修改: 2024-03-27 16:05
|
libbinutils |
CVE-2022-35205 |
低危 |
2.31.1.4-1+dde |
|
binutils: reachable assertion in display_debug_names() in dwarf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35205
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15
|
libbinutils |
CVE-2022-35206 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in read_and_display_attr_value() in dwarf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35206
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-31 00:36
|
libbinutils |
CVE-2022-38533 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38533
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-08-26 00:15 修改: 2023-11-07 03:50
|
libbinutils |
CVE-2022-4285 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4285
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-01-27 18:15 修改: 2023-11-07 03:57
|
libbinutils |
CVE-2022-44840 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in find_section_in_set() in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44840
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libbinutils |
CVE-2022-45703 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in display_debug_section() in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45703
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15
|
libbinutils |
CVE-2022-47007 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in stab_demangle_v3_arg() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47007
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libbinutils |
CVE-2022-47008 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in make_tempdir() and make_tempname() in bucomm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47008
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libbinutils |
CVE-2022-47010 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in pr_function_type() in prdbg.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47010
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libbinutils |
CVE-2022-47011 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in parse_stab_struct_fields() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47011
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libbinutils |
CVE-2022-47673 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libbinutils |
CVE-2022-47695 |
低危 |
2.31.1.4-1+dde |
|
binutils: uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47695
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35
|
libbinutils |
CVE-2022-47696 |
低危 |
2.31.1.4-1+dde |
|
binutils: segmentation fault in compare_symbols() in objdump.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35
|
libbinutils |
CVE-2022-48063 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory consumption in load_separate_debug_files() in dwarf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48063
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56
|
libbinutils |
CVE-2022-48064 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48064
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56
|
libbinutils |
CVE-2022-48065 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in find_abstract_instance() in dwarf2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48065
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-15 02:36
|
libbinutils |
CVE-2023-1579 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1579
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-04-03 23:15 修改: 2023-11-07 04:04
|
libbinutils |
CVE-2023-1972 |
低危 |
2.31.1.4-1+dde |
|
binutils: Illegal memory access when accessing a zer0-lengthverdef table
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1972
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-05-17 22:15 修改: 2023-09-30 10:15
|
libbinutils |
CVE-2023-25584 |
低危 |
2.31.1.4-1+dde |
|
binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51
|
libbinutils |
CVE-2023-25585 |
低危 |
2.31.1.4-1+dde |
|
binutils: Field `file_table` of `struct module *module` is uninitialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
libbinutils |
CVE-2023-25586 |
低危 |
2.31.1.4-1+dde |
|
binutils: Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25586
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
libbinutils |
CVE-2023-25588 |
低危 |
2.31.1.4-1+dde |
|
binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab`
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
binutils-x86-64-linux-gnu |
CVE-2020-19724 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in get_data() in nm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19724
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19
|
libssl1.1 |
CVE-2024-2511 |
低危 |
1.1.1d.6-1 |
|
openssl: Unbounded memory growth with session handling in TLSv1.3
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15
|
libssl1.1 |
CVE-2024-9143 |
低危 |
1.1.1d.6-1 |
|
openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-10-16 17:15 修改: 2024-10-18 12:53
|
binutils-x86-64-linux-gnu |
CVE-2020-19726 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19726
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2024-10-07 19:36
|
libblkid-dev |
CVE-2022-0563 |
低危 |
2.33.1-0.1 |
|
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
libstdc++-8-dev |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
binutils-x86-64-linux-gnu |
CVE-2020-21490 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in get_field() in microblaze-dis.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21490
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19
|
binutils-x86-64-linux-gnu |
CVE-2020-35342 |
低危 |
2.31.1.4-1+dde |
|
binutils: uninitialized heap memory in tic4x_print_cond() in opcodes/tic4x-dis.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35342
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15
|
libstdc++6 |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
libblkid1 |
CVE-2022-0563 |
低危 |
2.33.1-0.1 |
|
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
binutils-x86-64-linux-gnu |
CVE-2020-35448 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35448
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-27 04:15 修改: 2023-11-07 03:21
|
binutils-x86-64-linux-gnu |
CVE-2020-35493 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35493
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
binutils-x86-64-linux-gnu |
CVE-2020-35494 |
低危 |
2.31.1.4-1+dde |
|
binutils: usage of unitialized heap in tic4x_print_cond function in opcodes/tic4x-dis.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35494
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
binutils-x86-64-linux-gnu |
CVE-2020-35495 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in bfd_pef_parse_symbols function in bfd/pef.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35495
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
binutils-x86-64-linux-gnu |
CVE-2020-35496 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in bfd_pef_scan_start_address function in bfd/pef.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35496
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
binutils-x86-64-linux-gnu |
CVE-2020-35507 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in bfd_pef_parse_function_stubs function in bfd/pef.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35507
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-01-24 16:10
|
binutils-x86-64-linux-gnu |
CVE-2021-20197 |
低危 |
2.31.1.4-1+dde |
|
binutils: Race window allows users to own arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20197
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15
|
libbluetooth3 |
CVE-2016-9797 |
低危 |
5.50.22-1+dde |
|
bluez: buffer over-read in l2cap_dump()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9797
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2019-05-30 14:29
|
libbluetooth3 |
CVE-2016-9798 |
低危 |
5.50.22-1+dde |
|
bluez: use-after-free in conf_opt()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9798
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2019-05-30 14:29
|
libbluetooth3 |
CVE-2016-9799 |
低危 |
5.50.22-1+dde |
|
bluez: buffer overflow in pklg_read_hci()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9799
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:34
|
libbluetooth3 |
CVE-2016-9800 |
低危 |
5.50.22-1+dde |
|
bluez: buffer overflow in pin_code_reply_dump()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9800
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:32
|
libbluetooth3 |
CVE-2016-9801 |
低危 |
5.50.22-1+dde |
|
bluez: buffer overflow in set_ext_ctrl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9801
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:32
|
libbluetooth3 |
CVE-2016-9802 |
低危 |
5.50.22-1+dde |
|
bluez: buffer over-read in l2cap_packet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9802
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2019-05-30 14:29
|
libbluetooth3 |
CVE-2016-9803 |
低危 |
5.50.22-1+dde |
|
bluez: out-of-bounds read in le_meta_ev_dump()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9803
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:28
|
libbluetooth3 |
CVE-2016-9804 |
低危 |
5.50.22-1+dde |
|
bluez: buffer overflow in commands_dump()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9804
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:29
|
libbluetooth3 |
CVE-2016-9917 |
低危 |
5.50.22-1+dde |
|
bluez: Heap-based buffer overflow vulnerability in read_n()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9917
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-08 08:59 修改: 2019-12-19 17:46
|
libbluetooth3 |
CVE-2016-9918 |
低危 |
5.50.22-1+dde |
|
bluez: Out of bounds stack read in packet_hexdump()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9918
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-08 08:59 修改: 2019-04-12 13:29
|
libswresample3 |
CVE-2020-20450 |
低危 |
7:4.1.8.1-1+dde |
|
FFmpeg 4.2 is affected by null pointer dereference passed as argument ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20450
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 19:38
|
libswresample3 |
CVE-2020-20451 |
低危 |
7:4.1.8.1-1+dde |
|
Denial of Service issue in FFmpeg 4.2 due to resource management error ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20451
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 21:59
|
libswresample3 |
CVE-2020-20898 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_prewitt in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20898
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:45
|
libswresample3 |
CVE-2020-22038 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22038
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:36
|
libswresample3 |
CVE-2020-22039 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22039
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libswresample3 |
CVE-2020-22040 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 idue to a memor ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22040
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libswresample3 |
CVE-2020-22041 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22041
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 22:00
|
libswresample3 |
CVE-2020-22042 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22042
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 18:54
|
libswresample3 |
CVE-2020-22043 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:33
|
libswresample3 |
CVE-2020-22044 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22044
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 21:15 修改: 2021-11-30 22:00
|
libswresample3 |
CVE-2020-22046 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22046
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libswresample3 |
CVE-2020-22048 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22048
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libswresample3 |
CVE-2020-22051 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22051
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 17:15 修改: 2023-11-07 03:19
|
libswresample3 |
CVE-2020-22056 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22056
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 18:15 修改: 2021-06-07 15:31
|
libswresample3 |
CVE-2021-38090 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_roberts in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38090
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libswresample3 |
CVE-2021-38091 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_sobel in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38091
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libswresample3 |
CVE-2021-38092 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_prewitt in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38092
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libswresample3 |
CVE-2021-38093 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_robert in libavfilte ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38093
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
libswresample3 |
CVE-2021-38094 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_sobel in libavfilter ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38094
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
libbluetooth3 |
CVE-2018-10910 |
低危 |
5.50.22-1+dde |
|
bluez: failure in disabling Bluetooth discoverability in certain cases may lead to the unauthorized pairing of Bluetooth devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10910
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-01-28 15:29 修改: 2023-02-13 04:51
|
libbluetooth3 |
CVE-2023-51594 |
低危 |
5.50.22-1+dde |
|
bluez: OBEX library out-of-bounds read information disclosure vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51594
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48
|
binutils-x86-64-linux-gnu |
CVE-2021-20284 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20284
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15
|
binutils-x86-64-linux-gnu |
CVE-2021-20294 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack buffer overflow WRITE may lead to a DoS via a crafted ELF
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20294
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-04-29 16:15 修改: 2023-11-07 03:29
|
binutils-x86-64-linux-gnu |
CVE-2021-32256 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack-overflow issue in demangle_type in rust-demangle.c.
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32256
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-07-18 14:15 修改: 2023-08-24 19:15
|
libc-bin |
CVE-2010-4756 |
低危 |
2.28.17-1+eagle |
|
glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15
|
libc-bin |
CVE-2018-20796 |
低危 |
2.28.17-1+eagle |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56
|
libc-bin |
CVE-2019-1010022 |
低危 |
2.28.17-1+eagle |
|
glibc: stack guard protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc-bin |
CVE-2019-1010023 |
低危 |
2.28.17-1+eagle |
|
glibc: running ldd on malicious ELF leads to code execution because of wrong size computation
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc-bin |
CVE-2019-1010024 |
低危 |
2.28.17-1+eagle |
|
glibc: ASLR bypass using cache of thread stack and heap
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc-bin |
CVE-2019-1010025 |
低危 |
2.28.17-1+eagle |
|
glibc: information disclosure of heap addresses of pthread_created thread
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc-bin |
CVE-2019-9192 |
低危 |
2.28.17-1+eagle |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15
|
binutils-x86-64-linux-gnu |
CVE-2021-3530 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack memory exhaustion in demangle_path() in rust-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3530
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-06-02 15:15 修改: 2022-09-28 20:03
|
binutils-x86-64-linux-gnu |
CVE-2021-3549 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3549
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-05-26 21:15 修改: 2022-10-07 20:28
|
binutils-x86-64-linux-gnu |
CVE-2021-3826 |
低危 |
2.31.1.4-1+dde |
|
libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3826
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-09-01 21:15 修改: 2024-01-22 15:01
|
libc-dev-bin |
CVE-2010-4756 |
低危 |
2.28.17-1+eagle |
|
glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15
|
libc-dev-bin |
CVE-2018-20796 |
低危 |
2.28.17-1+eagle |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56
|
libc-dev-bin |
CVE-2019-1010022 |
低危 |
2.28.17-1+eagle |
|
glibc: stack guard protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libswscale5 |
CVE-2020-20450 |
低危 |
7:4.1.8.1-1+dde |
|
FFmpeg 4.2 is affected by null pointer dereference passed as argument ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20450
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 19:38
|
libswscale5 |
CVE-2020-20451 |
低危 |
7:4.1.8.1-1+dde |
|
Denial of Service issue in FFmpeg 4.2 due to resource management error ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20451
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 21:59
|
libswscale5 |
CVE-2020-20898 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_prewitt in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20898
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:45
|
libswscale5 |
CVE-2020-22038 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22038
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:36
|
libswscale5 |
CVE-2020-22039 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22039
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libswscale5 |
CVE-2020-22040 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 idue to a memor ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22040
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libswscale5 |
CVE-2020-22041 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22041
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 22:00
|
libswscale5 |
CVE-2020-22042 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22042
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 18:54
|
libswscale5 |
CVE-2020-22043 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:33
|
libswscale5 |
CVE-2020-22044 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22044
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 21:15 修改: 2021-11-30 22:00
|
libswscale5 |
CVE-2020-22046 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22046
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libswscale5 |
CVE-2020-22048 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22048
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libswscale5 |
CVE-2020-22051 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22051
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 17:15 修改: 2023-11-07 03:19
|
libswscale5 |
CVE-2020-22056 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22056
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 18:15 修改: 2021-06-07 15:31
|
libswscale5 |
CVE-2021-38090 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_roberts in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38090
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libswscale5 |
CVE-2021-38091 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_sobel in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38091
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libswscale5 |
CVE-2021-38092 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_prewitt in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38092
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libswscale5 |
CVE-2021-38093 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_robert in libavfilte ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38093
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
libswscale5 |
CVE-2021-38094 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_sobel in libavfilter ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38094
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
libc-dev-bin |
CVE-2019-1010023 |
低危 |
2.28.17-1+eagle |
|
glibc: running ldd on malicious ELF leads to code execution because of wrong size computation
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc-dev-bin |
CVE-2019-1010024 |
低危 |
2.28.17-1+eagle |
|
glibc: ASLR bypass using cache of thread stack and heap
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc-dev-bin |
CVE-2019-1010025 |
低危 |
2.28.17-1+eagle |
|
glibc: information disclosure of heap addresses of pthread_created thread
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc-dev-bin |
CVE-2019-9192 |
低危 |
2.28.17-1+eagle |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15
|
binutils-x86-64-linux-gnu |
CVE-2021-45078 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45078
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-12-15 20:15 修改: 2023-11-07 03:39
|
binutils-x86-64-linux-gnu |
CVE-2021-46174 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46174
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:40
|
binutils-x86-64-linux-gnu |
CVE-2021-46195 |
低危 |
2.31.1.4-1+dde |
|
gcc: uncontrolled recursion in libiberty/rust-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46195
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-01-14 20:15 修改: 2022-01-22 01:38
|
libsystemd0 |
CVE-2013-4392 |
低危 |
241.26-1+dde |
|
systemd: TOCTOU race condition when updating file permissions and SELinux security contexts
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49
|
libsystemd0 |
CVE-2019-20386 |
低危 |
241.26-1+dde |
|
systemd: memory leak in button_open() in login/logind-button.c when udev events are received
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20386
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2020-01-21 06:15 修改: 2023-11-07 03:09
|
libsystemd0 |
CVE-2020-13529 |
低危 |
241.26-1+dde |
|
systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16
|
libsystemd0 |
CVE-2023-31437 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can modify a seale ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
libsystemd0 |
CVE-2023-31438 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can truncate a sea ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
libsystemd0 |
CVE-2023-31439 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can modify the con ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
libc-l10n |
CVE-2010-4756 |
低危 |
2.28.17-1+eagle |
|
glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15
|
libtasn1-6 |
CVE-2018-1000654 |
低危 |
4.13-3 |
|
libtasn1: Infinite loop in _asn1_expand_object_id(ptree) leads to memory exhaustion
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000654
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2018-08-20 19:31 修改: 2023-11-07 02:51
|
libtcl8.6 |
CVE-2021-35331 |
低危 |
8.6.9+dfsg-2 |
|
In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35331
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2021-07-05 15:15 修改: 2024-08-04 01:15
|
libc-l10n |
CVE-2018-20796 |
低危 |
2.28.17-1+eagle |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56
|
libc-l10n |
CVE-2019-1010022 |
低危 |
2.28.17-1+eagle |
|
glibc: stack guard protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc-l10n |
CVE-2019-1010023 |
低危 |
2.28.17-1+eagle |
|
glibc: running ldd on malicious ELF leads to code execution because of wrong size computation
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc-l10n |
CVE-2019-1010024 |
低危 |
2.28.17-1+eagle |
|
glibc: ASLR bypass using cache of thread stack and heap
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libtiff5 |
CVE-2017-16232 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: Memory leaks in tif_open.c, tif_lzw.c, and tif_aux.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16232
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15
|
libtiff5 |
CVE-2017-17973 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: heap-based use after free in tiff2pdf.c:t2p_writeproc
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17973
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-29 21:29 修改: 2024-08-05 21:15
|
libtiff5 |
CVE-2017-5563 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: Heap-buffer overflow in LZWEncode tif_lzw.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5563
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-01-23 07:59 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-9117 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: Heap-based buffer over-read in bmp2tiff
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9117
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-05-21 19:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2018-10126 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10126
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-04-21 21:29 修改: 2024-08-20 05:15
|
libtiff5 |
CVE-2020-35521 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: Memory allocation failure in tiff2rgba
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35521
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-03-09 20:15 修改: 2023-11-07 03:21
|
libtiff5 |
CVE-2020-35522 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: Memory allocation failure in tiff2rgba
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35522
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-03-09 20:15 修改: 2023-11-07 03:21
|
libtiff5 |
CVE-2022-1056 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: heap-based buffer overflow in _TIFFmemcpy() in tif_unix.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1056
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-03-28 19:15 修改: 2023-02-22 17:35
|
libtiff5 |
CVE-2022-1210 |
低危 |
4.1.0+git191117.1-1+security |
|
tiff: Malicious file leads to a denial of service in TIFF File Handler
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1210
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-04-03 09:15 修改: 2023-07-24 13:46
|
libtiff5 |
CVE-2022-2519 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: Double free or corruption in rotateImage() function at tiffcrop.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2519
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:57
|
libtiff5 |
CVE-2022-2520 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: Assertion fail in rotateImage() function at tiffcrop.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2520
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-31 16:15 修改: 2023-02-28 15:39
|
libtiff5 |
CVE-2022-2521 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: Invalid pointer free operation in TIFFClose() at tif_close.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2521
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-31 16:15 修改: 2023-02-23 15:59
|
libtiff5 |
CVE-2022-2953 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: tiffcrop: heap-buffer-overflow in extractImageSection in tiffcrop.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2953
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-29 15:15 修改: 2023-02-23 16:01
|
libtiff5 |
CVE-2023-1916 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: out-of-bounds read in extractImageSection() in tools/tiffcrop.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1916
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-04-10 22:15 修改: 2023-12-23 07:15
|
libtiff5 |
CVE-2023-30775 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30775
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-05-19 15:15 修改: 2023-07-03 16:15
|
libtiff5 |
CVE-2023-3164 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: heap-buffer-overflow in extractImageSection()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3164
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-11-02 12:15 修改: 2024-03-08 19:38
|
libtiff5 |
CVE-2023-6228 |
低危 |
4.1.0+git191117.1-1+security |
|
libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6228
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-12-18 14:15 修改: 2024-10-11 16:15
|
libc-l10n |
CVE-2019-1010025 |
低危 |
2.28.17-1+eagle |
|
glibc: information disclosure of heap addresses of pthread_created thread
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libtinfo6 |
CVE-2023-45918 |
低危 |
6.1+20181013.1-1+dde+rb2 |
|
ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15
|
libtinyxml2-6a |
CVE-2018-11210 |
低危 |
7.0.0+dfsg-1 |
|
tinyxml2: heap-based buffer over-read in the XMLDocument::Parse function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11210
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-05-16 15:29 修改: 2024-08-05 08:15
|
libc-l10n |
CVE-2019-9192 |
低危 |
2.28.17-1+eagle |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15
|
binutils-x86-64-linux-gnu |
CVE-2022-35205 |
低危 |
2.31.1.4-1+dde |
|
binutils: reachable assertion in display_debug_names() in dwarf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35205
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15
|
binutils-x86-64-linux-gnu |
CVE-2022-35206 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in read_and_display_attr_value() in dwarf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35206
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-31 00:36
|
binutils-x86-64-linux-gnu |
CVE-2022-38533 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38533
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-08-26 00:15 修改: 2023-11-07 03:50
|
libtsan0 |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
libc6 |
CVE-2010-4756 |
低危 |
2.28.17-1+eagle |
|
glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15
|
libc6 |
CVE-2018-20796 |
低危 |
2.28.17-1+eagle |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56
|
libubsan1 |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
libc6 |
CVE-2019-1010022 |
低危 |
2.28.17-1+eagle |
|
glibc: stack guard protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc6 |
CVE-2019-1010023 |
低危 |
2.28.17-1+eagle |
|
glibc: running ldd on malicious ELF leads to code execution because of wrong size computation
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc6 |
CVE-2019-1010024 |
低危 |
2.28.17-1+eagle |
|
glibc: ASLR bypass using cache of thread stack and heap
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc6 |
CVE-2019-1010025 |
低危 |
2.28.17-1+eagle |
|
glibc: information disclosure of heap addresses of pthread_created thread
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc6 |
CVE-2019-9192 |
低危 |
2.28.17-1+eagle |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15
|
binutils-x86-64-linux-gnu |
CVE-2022-4285 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4285
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-01-27 18:15 修改: 2023-11-07 03:57
|
binutils-x86-64-linux-gnu |
CVE-2022-44840 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in find_section_in_set() in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44840
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libudev1 |
CVE-2013-4392 |
低危 |
241.26-1+dde |
|
systemd: TOCTOU race condition when updating file permissions and SELinux security contexts
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49
|
libudev1 |
CVE-2019-20386 |
低危 |
241.26-1+dde |
|
systemd: memory leak in button_open() in login/logind-button.c when udev events are received
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20386
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2020-01-21 06:15 修改: 2023-11-07 03:09
|
libudev1 |
CVE-2020-13529 |
低危 |
241.26-1+dde |
|
systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16
|
libudev1 |
CVE-2023-31437 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can modify a seale ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
libudev1 |
CVE-2023-31438 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can truncate a sea ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
libudev1 |
CVE-2023-31439 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can modify the con ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
binutils-x86-64-linux-gnu |
CVE-2022-45703 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in display_debug_section() in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45703
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15
|
libc6-dev |
CVE-2010-4756 |
低危 |
2.28.17-1+eagle |
|
glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15
|
libc6-dev |
CVE-2018-20796 |
低危 |
2.28.17-1+eagle |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56
|
libc6-dev |
CVE-2019-1010022 |
低危 |
2.28.17-1+eagle |
|
glibc: stack guard protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc6-dev |
CVE-2019-1010023 |
低危 |
2.28.17-1+eagle |
|
glibc: running ldd on malicious ELF leads to code execution because of wrong size computation
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc6-dev |
CVE-2019-1010024 |
低危 |
2.28.17-1+eagle |
|
glibc: ASLR bypass using cache of thread stack and heap
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc6-dev |
CVE-2019-1010025 |
低危 |
2.28.17-1+eagle |
|
glibc: information disclosure of heap addresses of pthread_created thread
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
libc6-dev |
CVE-2019-9192 |
低危 |
2.28.17-1+eagle |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15
|
binutils-x86-64-linux-gnu |
CVE-2022-47007 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in stab_demangle_v3_arg() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47007
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
binutils-x86-64-linux-gnu |
CVE-2022-47008 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in make_tempdir() and make_tempname() in bucomm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47008
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
binutils-x86-64-linux-gnu |
CVE-2022-47010 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in pr_function_type() in prdbg.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47010
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libcaca0 |
CVE-2022-0856 |
低危 |
0.99.beta19-2.1 |
|
libcaca is affected by a Divide By Zero issue via img2txt, which allow ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0856
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-03-10 17:44 修改: 2023-11-07 03:41
|
libcairo-gobject2 |
CVE-2017-7475 |
低危 |
1.16.0.1-1+eagle |
|
cairo: NULL pointer dereference with a crafted font file
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7475
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-05-19 20:29 修改: 2023-02-12 23:30
|
libusageenvironment3 |
CVE-2019-15232 |
低危 |
2018.11.26.1-1+eagle |
|
Live555 before 2019.08.16 has a Use-After-Free because GenericMediaSer ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15232
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-08-20 00:15 修改: 2023-03-29 16:23
|
libusageenvironment3 |
CVE-2019-7732 |
低危 |
2018.11.26.1-1+eagle |
|
In Live555 0.95, a setup packet can cause a memory leak leading to DoS ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7732
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-02-11 17:29 修改: 2020-08-24 17:37
|
libusageenvironment3 |
CVE-2019-7733 |
低危 |
2018.11.26.1-1+eagle |
|
In Live555 0.95, there is a buffer overflow via a large integer in a C ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7733
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-02-11 17:29 修改: 2020-05-15 00:15
|
libcairo-gobject2 |
CVE-2018-18064 |
低危 |
1.16.0.1-1+eagle |
|
cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18064
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-10-08 18:29 修改: 2023-11-07 02:54
|
libcairo-gobject2 |
CVE-2019-6461 |
低危 |
1.16.0.1-1+eagle |
|
cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6461
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13
|
libuuid1 |
CVE-2022-0563 |
低危 |
2.33.1-0.1 |
|
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
libcairo-gobject2 |
CVE-2019-6462 |
低危 |
1.16.0.1-1+eagle |
|
cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6462
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13
|
libcairo2 |
CVE-2017-7475 |
低危 |
1.16.0.1-1+eagle |
|
cairo: NULL pointer dereference with a crafted font file
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7475
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-05-19 20:29 修改: 2023-02-12 23:30
|
libcairo2 |
CVE-2018-18064 |
低危 |
1.16.0.1-1+eagle |
|
cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18064
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-10-08 18:29 修改: 2023-11-07 02:54
|
libcairo2 |
CVE-2019-6461 |
低危 |
1.16.0.1-1+eagle |
|
cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6461
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13
|
libcairo2 |
CVE-2019-6462 |
低危 |
1.16.0.1-1+eagle |
|
cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6462
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13
|
binutils-x86-64-linux-gnu |
CVE-2022-47011 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in parse_stab_struct_fields() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47011
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
binutils-x86-64-linux-gnu |
CVE-2022-47673 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libcc1-0 |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
libcolord2 |
CVE-2021-42523 |
低危 |
1.4.3-4 |
|
colord: potential memory leak, forgetting to free error message of libsqlite3 API 'sqlite3_exec' -1
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42523
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-25 18:15 修改: 2023-07-17 15:18
|
binutils-x86-64-linux-gnu |
CVE-2022-47695 |
低危 |
2.31.1.4-1+dde |
|
binutils: uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47695
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35
|
libcroco3 |
CVE-2017-8834 |
低危 |
0.6.12.1-1+dde |
|
libcroco: Memory allocation failure in the cr_tknzr_parse_comment function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8834
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2017-06-12 06:29 修改: 2020-08-19 19:17
|
libcroco3 |
CVE-2017-8871 |
低危 |
0.6.12.1-1+dde |
|
libcroco: Infinite loop in the cr_parser_parse_selector_core function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8871
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2017-06-12 06:29 修改: 2020-08-19 19:12
|
libcroco3 |
CVE-2020-12825 |
低危 |
0.6.12.1-1+dde |
|
libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12825
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-05-12 18:15 修改: 2022-10-27 01:04
|
binutils-x86-64-linux-gnu |
CVE-2022-47696 |
低危 |
2.31.1.4-1+dde |
|
binutils: segmentation fault in compare_symbols() in objdump.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35
|
binutils-x86-64-linux-gnu |
CVE-2022-48063 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory consumption in load_separate_debug_files() in dwarf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48063
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56
|
binutils-x86-64-linux-gnu |
CVE-2022-48064 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48064
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56
|
libvpx5 |
CVE-2017-0641 |
低危 |
1.7.0.2-1+dde |
|
libvpx: Weak limit for frames
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-0641
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-06-14 13:29 修改: 2019-10-03 00:03
|
binutils-x86-64-linux-gnu |
CVE-2022-48065 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in find_abstract_instance() in dwarf2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48065
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-15 02:36
|
binutils-x86-64-linux-gnu |
CVE-2023-1579 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1579
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-04-03 23:15 修改: 2023-11-07 04:04
|
libwavpack1 |
CVE-2021-44269 |
低危 |
5.1.0.1-1+dde |
|
wavpack: Heap out-of-bounds read in WavpackPackSamples()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44269
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-03-10 17:44 修改: 2023-11-07 03:39
|
libcrypto++6 |
CVE-2016-7420 |
低危 |
5.6.4-8 |
|
Crypto++ (aka cryptopp) through 5.6.4 does not document the requiremen ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7420
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-09-16 05:59 修改: 2023-09-28 18:15
|
libcrypto++6 |
CVE-2019-14318 |
低危 |
5.6.4-8 |
|
Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA sig ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14318
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-07-30 17:15 修改: 2019-08-20 18:15
|
binutils-x86-64-linux-gnu |
CVE-2023-1972 |
低危 |
2.31.1.4-1+dde |
|
binutils: Illegal memory access when accessing a zer0-lengthverdef table
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1972
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-05-17 22:15 修改: 2023-09-30 10:15
|
libcups2 |
CVE-2014-8166 |
低危 |
2.3.0+deepin2.3-1+security |
|
cups: code execution via unescape ANSI escape sequences
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-8166
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2018-01-12 17:29 修改: 2020-10-23 13:22
|
binutils-x86-64-linux-gnu |
CVE-2023-25584 |
低危 |
2.31.1.4-1+dde |
|
binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51
|
binutils-x86-64-linux-gnu |
CVE-2023-25585 |
低危 |
2.31.1.4-1+dde |
|
binutils: Field `file_table` of `struct module *module` is uninitialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
binutils-x86-64-linux-gnu |
CVE-2023-25586 |
低危 |
2.31.1.4-1+dde |
|
binutils: Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25586
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
binutils-x86-64-linux-gnu |
CVE-2023-25588 |
低危 |
2.31.1.4-1+dde |
|
binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab`
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
apt |
CVE-2011-3374 |
低危 |
1.8.2.8-1+dde |
|
It was found that apt-key in apt, all versions, do not correctly valid ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3374
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-11-26 00:15 修改: 2021-02-09 16:08
|
libcurl3-gnutls |
CVE-2020-19909 |
低危 |
7.64.1.6-4+security |
|
Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19909
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-08-22 19:16 修改: 2024-08-04 15:15
|
libcurl3-gnutls |
CVE-2021-22922 |
低危 |
7.64.1.6-4+security |
|
curl: Content not matching hash in Metalink is not being discarded
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22922
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:12
|
libcurl3-gnutls |
CVE-2021-22923 |
低危 |
7.64.1.6-4+security |
|
curl: Metalink download sends credentials
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22923
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11
|
libcurl3-gnutls |
CVE-2023-28320 |
低危 |
7.64.1.6-4+security |
|
curl: siglongjmp race condition may lead to crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28320
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-05-26 21:15 修改: 2023-10-20 18:42
|
libcurl3-gnutls |
CVE-2024-2379 |
低危 |
7.64.1.6-4+security |
|
curl: QUIC certificate check bypass with wolfSSL
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2379
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15
|
apt-transport-https |
CVE-2011-3374 |
低危 |
1.8.2.8-1+dde |
|
It was found that apt-key in apt, all versions, do not correctly valid ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3374
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-11-26 00:15 修改: 2021-02-09 16:08
|
accountsservice |
CVE-2012-6655 |
低危 |
0.6.45-2 |
|
accountsservice: local encrypted password disclosure when changing password
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-6655
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-11-27 18:15 修改: 2020-08-18 15:05
|
bash |
CVE-2019-18276 |
低危 |
5.0.1.1-1+dde |
|
bash: when effective UID is not equal to its real UID the saved UID is not dropped
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18276
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-11-28 01:15 修改: 2023-11-07 03:06
|
bash |
TEMP-0841856-B18BAF |
低危 |
5.0.1.1-1+dde |
|
[Privilege escalation possible to other user than root]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
binutils |
CVE-2017-13716 |
低危 |
2.31.1.4-1+dde |
|
binutils: Memory leak with the C++ symbol demangler routine in libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2017-08-28 21:29 修改: 2019-10-03 00:03
|
libcurl4 |
CVE-2020-19909 |
低危 |
7.64.1.6-4+security |
|
Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19909
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2024-08-04 15:15
|
libcurl4 |
CVE-2021-22922 |
低危 |
7.64.1.6-4+security |
|
curl: Content not matching hash in Metalink is not being discarded
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22922
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:12
|
libcurl4 |
CVE-2021-22923 |
低危 |
7.64.1.6-4+security |
|
curl: Metalink download sends credentials
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22923
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11
|
libcurl4 |
CVE-2023-28320 |
低危 |
7.64.1.6-4+security |
|
curl: siglongjmp race condition may lead to crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28320
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-05-26 21:15 修改: 2023-10-20 18:42
|
libcurl4 |
CVE-2024-2379 |
低危 |
7.64.1.6-4+security |
|
curl: QUIC certificate check bypass with wolfSSL
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2379
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15
|
binutils |
CVE-2018-1000876 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow leads to heap-based buffer overflow in objdump
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000876
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-20 17:29 修改: 2023-11-07 02:51
|
bluez-obexd |
CVE-2016-9797 |
低危 |
5.50.22-1+dde |
|
bluez: buffer over-read in l2cap_dump()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9797
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2019-05-30 14:29
|
bluez-obexd |
CVE-2016-9798 |
低危 |
5.50.22-1+dde |
|
bluez: use-after-free in conf_opt()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9798
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2019-05-30 14:29
|
bluez-obexd |
CVE-2016-9799 |
低危 |
5.50.22-1+dde |
|
bluez: buffer overflow in pklg_read_hci()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9799
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:34
|
bluez-obexd |
CVE-2016-9800 |
低危 |
5.50.22-1+dde |
|
bluez: buffer overflow in pin_code_reply_dump()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9800
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:32
|
bluez-obexd |
CVE-2016-9801 |
低危 |
5.50.22-1+dde |
|
bluez: buffer overflow in set_ext_ctrl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9801
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:32
|
bluez-obexd |
CVE-2016-9802 |
低危 |
5.50.22-1+dde |
|
bluez: buffer over-read in l2cap_packet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9802
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2019-05-30 14:29
|
bluez-obexd |
CVE-2016-9803 |
低危 |
5.50.22-1+dde |
|
bluez: out-of-bounds read in le_meta_ev_dump()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9803
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:28
|
bluez-obexd |
CVE-2016-9804 |
低危 |
5.50.22-1+dde |
|
bluez: buffer overflow in commands_dump()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9804
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-03 06:59 修改: 2016-12-07 19:29
|
bluez-obexd |
CVE-2016-9917 |
低危 |
5.50.22-1+dde |
|
bluez: Heap-based buffer overflow vulnerability in read_n()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9917
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-08 08:59 修改: 2019-12-19 17:46
|
bluez-obexd |
CVE-2016-9918 |
低危 |
5.50.22-1+dde |
|
bluez: Out of bounds stack read in packet_hexdump()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9918
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2016-12-08 08:59 修改: 2019-04-12 13:29
|
bluez-obexd |
CVE-2018-10910 |
低危 |
5.50.22-1+dde |
|
bluez: failure in disabling Bluetooth discoverability in certain cases may lead to the unauthorized pairing of Bluetooth devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10910
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-01-28 15:29 修改: 2023-02-13 04:51
|
bluez-obexd |
CVE-2023-51594 |
低危 |
5.50.22-1+dde |
|
bluez: OBEX library out-of-bounds read information disclosure vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51594
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-03 03:16 修改: 2024-05-03 12:48
|
binutils |
CVE-2018-12697 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c.
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12697
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15
|
binutils |
CVE-2018-12698 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory consumption in demangle_template in cplus-dem.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12698
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-23 23:29 修改: 2019-10-03 00:03
|
bsdutils |
CVE-2022-0563 |
低危 |
1:2.33.1-0.1 |
|
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
binutils |
CVE-2018-12699 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in finish_stab in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12699
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15
|
binutils |
CVE-2018-12934 |
低危 |
2.31.1.4-1+dde |
|
binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12934
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-28 14:29 修改: 2020-04-21 22:15
|
binutils |
CVE-2018-17358 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid memory access in _bfd_stab_section_find_nearest_line in syms.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17358
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15
|
binutils |
CVE-2018-17359 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid memory access in bfd_zalloc in opncls.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17359
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15
|
libwbclient0 |
CVE-2020-27840 |
低危 |
2:4.9.5.18-1+dde |
|
samba: Heap corruption via crafted DN strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27840
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-12 15:15 修改: 2023-11-07 03:21
|
libwbclient0 |
CVE-2021-20277 |
低危 |
2:4.9.5.18-1+dde |
|
samba: Out of bounds read in AD DC LDAP server
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20277
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-12 14:15 修改: 2023-11-07 03:29
|
libwbclient0 |
CVE-2021-43566 |
低危 |
2:4.9.5.18-1+dde |
|
samba: Symlink race error can allow directory creation outside of the exported share
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43566
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-11 16:15 修改: 2022-10-14 11:42
|
binutils |
CVE-2018-17360 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer over-read in bfd_getl32 in libbfd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17360
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15
|
binutils |
CVE-2018-17794 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in libiberty/cplus-dem.c:work_stuff_copy_to_from() via crafted input
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17794
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-30 20:29 修改: 2020-04-21 22:15
|
binutils |
CVE-2018-17985 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack consumption problem caused by the cplus_demangle_type
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17985
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-04 23:29 修改: 2019-10-31 01:15
|
binutils |
CVE-2018-18309 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid memory address dereference in read_reloc in reloc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18309
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-15 02:29 修改: 2023-11-07 02:55
|
binutils |
CVE-2018-18483 |
低危 |
2.31.1.4-1+dde |
|
binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18483
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-18 21:29 修改: 2019-10-31 01:15
|
binutils |
CVE-2018-18484 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack exhaustion in cp-demangle.c allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18484
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-18 21:29 修改: 2020-08-24 17:37
|
binutils |
CVE-2018-18605 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer over-read in sec_merge_hash_lookup in merge.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18605
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55
|
binutils |
CVE-2018-18606 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in _bfd_add_merge_section in merge_strings function in merge.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18606
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55
|
libegl-mesa0 |
CVE-2023-45913 |
低危 |
20.3.4.2-1 |
|
Mesa v23.0.4 was discovered to contain a NULL pointer dereference via ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45913
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 04:15 修改: 2024-08-02 21:15
|
libegl-mesa0 |
CVE-2023-45919 |
低危 |
20.3.4.2-1 |
|
Mesa 23.0.4 was discovered to contain a buffer over-read in glXQuerySe ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45919
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libegl-mesa0 |
CVE-2023-45922 |
低危 |
20.3.4.2-1 |
|
glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45922
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libegl-mesa0 |
CVE-2023-45931 |
低危 |
20.3.4.2-1 |
|
Mesa 23.0.4 was discovered to contain a NULL pointer dereference in ch ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45931
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 04:15 修改: 2024-09-04 15:35
|
libegl1 |
CVE-2023-45924 |
低危 |
1.3.2-1 |
|
libglxproto.c in OpenGL libglvnd bb06db5a was discovered to contain a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45924
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
binutils |
CVE-2018-18607 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in elf_link_input_bfd in elflink.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18607
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55
|
libelf1 |
CVE-2021-33294 |
低危 |
0.176-1.1 |
|
elfutils: an infinite loop was found in the function handle_symtab in readelf.c which causes denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33294
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-07-18 14:15 修改: 2023-07-27 15:19
|
libelf1 |
CVE-2024-25260 |
低危 |
0.176-1.1 |
|
elfutils: global-buffer-overflow exists in the function ebl_machine_flag_name in eblmachineflagname.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25260
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-02-20 18:15 修改: 2024-08-01 13:47
|
binutils |
CVE-2018-18700 |
低危 |
2.31.1.4-1+dde |
|
binutils: Recursive Stack Overflow within function d_name, d_encoding, and d_local_name in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18700
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15
|
binutils |
CVE-2018-18701 |
低危 |
2.31.1.4-1+dde |
|
binutils: infinite recursion in next_is_type_qual and cplus_demangle_type functions in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18701
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15
|
binutils |
CVE-2018-19931 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-based buffer overflow in bfd_elf32_swap_phdr_in function resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19931
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55
|
binutils |
CVE-2018-19932 |
低危 |
2.31.1.4-1+dde |
|
binutils: Integer overflow due to the IS_CONTAINED_BY_LMA macro resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19932
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55
|
binutils |
CVE-2018-20002 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in _bfd_generic_read_minisymbols function in syms.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20002
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-10 02:29 修改: 2023-11-07 02:56
|
busybox |
CVE-2018-1000500 |
低危 |
1:1.30.1.2-1+dde |
|
busybox: wget: Missing SSL certificate validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000500
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-06-26 16:29 修改: 2020-09-24 20:15
|
busybox |
CVE-2021-42373 |
低危 |
1:1.30.1.2-1+dde |
|
busybox: NULL pointer dereference in man applet leads to denial of service when a section name is supplied but no page argument is given
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42373
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2021-42374 |
低危 |
1:1.30.1.2-1+dde |
|
busybox: out-of-bounds read in unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42374
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2021-42375 |
低危 |
1:1.30.1.2-1+dde |
|
busybox: incorrect handling of a special element in ash applet leads to denial of service when processing a crafted shell command
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42375
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2021-42376 |
低危 |
1:1.30.1.2-1+dde |
|
busybox: NULL pointer dereference in hush applet leads to denial of service when processing a crafted shell command
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42376
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39
|
busybox |
CVE-2022-30065 |
低危 |
1:1.30.1.2-1+dde |
|
busybox: A use-after-free in Busybox's awk applet leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30065
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-05-18 15:15 修改: 2023-02-11 17:44
|
coreutils |
CVE-2016-2781 |
低危 |
8.30-3 |
|
coreutils: Non-privileged session can escape to the parent session in chroot
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2781
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2017-02-07 15:59 修改: 2023-11-07 02:32
|
coreutils |
CVE-2017-18018 |
低危 |
8.30-3 |
|
coreutils: race condition vulnerability in chown and chgrp
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18018
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2018-01-04 04:29 修改: 2018-01-19 15:46
|
binutils |
CVE-2018-20623 |
低危 |
2.31.1.4-1+dde |
|
binutils: Use-after-free in the error function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20623
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-31 19:29 修改: 2019-10-31 01:15
|
binutils |
CVE-2018-20651 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in elf_link_add_object_symbols function resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20651
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-01 16:29 修改: 2023-11-07 02:56
|
cpp-8 |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
binutils |
CVE-2018-20671 |
低危 |
2.31.1.4-1+dde |
|
binutils: Integer overflow in load_specific_debug_section function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20671
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-04 16:29 修改: 2023-11-07 02:56
|
binutils |
CVE-2018-20673 |
低危 |
2.31.1.4-1+dde |
|
libiberty: Integer overflow in demangle_template() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20673
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-04 18:29 修改: 2020-08-24 17:37
|
binutils |
CVE-2018-20712 |
低危 |
2.31.1.4-1+dde |
|
libiberty: heap-based buffer over-read in d_expression_1
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20712
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-15 00:29 修改: 2019-10-03 00:03
|
binutils |
CVE-2018-9138 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack Exhaustion in the the C++ demangling functions provided by libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9138
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-03-30 08:29 修改: 2020-04-21 22:15
|
binutils |
CVE-2018-9996 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack-overflow in libiberty/cplus-dem.c causes crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9996
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-04-10 22:29 修改: 2019-10-03 00:03
|
libexpat1 |
CVE-2013-0340 |
低危 |
2.2.6-2+deb10u1 |
|
expat: internal entity expansion
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-0340
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2014-01-21 18:55 修改: 2023-11-07 02:13
|
libexpat1 |
CVE-2023-52426 |
低危 |
2.2.6-2+deb10u1 |
|
expat: recursive XML entity expansion vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52426
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-02-04 20:15 修改: 2024-03-07 17:15
|
libexpat1 |
CVE-2024-28757 |
低危 |
2.2.6-2+deb10u1 |
|
expat: XML Entity Expansion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28757
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-10 05:15 修改: 2024-05-01 19:15
|
curl |
CVE-2020-19909 |
低危 |
7.64.1.6-4+security |
|
Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19909
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2024-08-04 15:15
|
curl |
CVE-2021-22922 |
低危 |
7.64.1.6-4+security |
|
curl: Content not matching hash in Metalink is not being discarded
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22922
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:12
|
curl |
CVE-2021-22923 |
低危 |
7.64.1.6-4+security |
|
curl: Metalink download sends credentials
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22923
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11
|
curl |
CVE-2023-28320 |
低危 |
7.64.1.6-4+security |
|
curl: siglongjmp race condition may lead to crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28320
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-05-26 21:15 修改: 2023-10-20 18:42
|
curl |
CVE-2024-2379 |
低危 |
7.64.1.6-4+security |
|
curl: QUIC certificate check bypass with wolfSSL
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2379
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15
|
binutils |
CVE-2019-1010180 |
低危 |
2.31.1.4-1+dde |
|
gdb: buffer overflow while opening an ELF for debugging leads to Dos, information dislosure and code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010180
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-24 13:15 修改: 2021-07-21 11:39
|
binutils |
CVE-2019-1010204 |
低危 |
2.31.1.4-1+dde |
|
binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010204
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-23 14:15 修改: 2023-11-07 03:02
|
binutils |
CVE-2019-12972 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bounds read in setup_group in bfd/elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12972
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-06-26 14:15 修改: 2023-11-07 03:03
|
binutils |
CVE-2019-14250 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow in simple-object-elf.c leads to a heap-based buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14250
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-24 04:15 修改: 2023-03-01 18:01
|
binutils |
CVE-2019-14444 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow in function apply_relocation in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14444
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-30 13:15 修改: 2023-03-01 17:58
|
binutils |
CVE-2019-17450 |
低危 |
2.31.1.4-1+dde |
|
binutils: denial of service via crafted ELF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17450
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-10-10 17:15 修改: 2023-02-27 15:32
|
binutils |
CVE-2019-17451 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17451
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-10-10 17:15 修改: 2023-11-07 03:06
|
binutils |
CVE-2019-9070 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer over-read in function d_expression_1 in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9070
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17
|
binutils |
CVE-2019-9071 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack consumption in function d_count_templates_scopes in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9071
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 19:32
|
dirmngr |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
libfdisk1 |
CVE-2022-0563 |
低危 |
2.33.1-0.1 |
|
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
dirmngr |
CVE-2022-3219 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31
|
binutils |
CVE-2019-9073 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory allocation in function _bfd_elf_slurp_version_tables in elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9073
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:09
|
binutils |
CVE-2019-9074 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bound read in function bfd_getl32 in libbfd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9074
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:11
|
binutils |
CVE-2019-9075 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in function _bfd_archive_64_bit_slurp_armap in archive64.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9075
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:19
|
binutils |
CVE-2019-9077 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in function process_mips_specific in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9077
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17
|
binutils |
CVE-2020-16590 |
低危 |
2.31.1.4-1+dde |
|
binutils: double free vulnerability in process_symbol_table could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16590
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
binutils |
CVE-2020-16591 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid read in process_symbol_table could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16591
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
dnsmasq-base |
CVE-2019-14834 |
低危 |
2.80.4-1+dde |
|
dnsmasq: memory leak in the create_helper() function in /src/helper.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14834
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-01-07 17:15 修改: 2023-02-12 23:34
|
dnsmasq-base |
CVE-2021-45951 |
低危 |
2.80.4-1+dde |
|
dnsmasq: a heap-based buffer overflow in check_bad_address
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45951
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-01 00:15 修改: 2024-08-04 05:15
|
dnsmasq-base |
CVE-2021-45952 |
低危 |
2.80.4-1+dde |
|
dnsmasq: a heap-based buffer overflow in dhcp_reply
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45952
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-01 00:15 修改: 2024-08-04 05:15
|
dnsmasq-base |
CVE-2021-45953 |
低危 |
2.80.4-1+dde |
|
dnsmasq: a heap-based buffer overflow in extract_name
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45953
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-01 00:15 修改: 2024-08-04 05:15
|
dnsmasq-base |
CVE-2021-45954 |
低危 |
2.80.4-1+dde |
|
dnsmasq: a heap-based buffer overflow in extract_name
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45954
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-01 00:15 修改: 2024-08-04 05:15
|
dnsmasq-base |
CVE-2021-45955 |
低危 |
2.80.4-1+dde |
|
dnsmasq: heap-based buffer overflow in resize_packet
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45955
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-01 00:15 修改: 2024-08-04 05:15
|
dnsmasq-base |
CVE-2021-45956 |
低危 |
2.80.4-1+dde |
|
dnsmasq: a heap-based buffer overflow in print_mac
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45956
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-01 00:15 修改: 2024-08-04 05:15
|
dnsmasq-base |
CVE-2021-45957 |
低危 |
2.80.4-1+dde |
|
dnsmasq: a heap-based buffer overflow in answer_request
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45957
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-01 00:15 修改: 2024-08-04 05:15
|
dnsmasq-base |
CVE-2023-49441 |
低危 |
2.80.4-1+dde |
|
dnsmasq: vulnerable to Integer Overflow via forward_query
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49441
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-06 22:15 修改: 2024-10-10 20:00
|
binutils |
CVE-2020-16592 |
低危 |
2.31.1.4-1+dde |
|
binutils: use-after-free in bfd_hash_lookup could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16592
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
binutils |
CVE-2020-16593 |
低危 |
2.31.1.4-1+dde |
|
binutils: Null Pointer Dereference in scan_unit_for_symbols could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16593
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
binutils |
CVE-2020-16599 |
低危 |
2.31.1.4-1+dde |
|
binutils: Null Pointer Dereference in _bfd_elf_get_symbol_version_string could result in DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16599
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-09 21:15 修改: 2023-11-07 03:18
|
binutils |
CVE-2020-19724 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in get_data() in nm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19724
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19
|
libwebkit2gtk-4.0-37 |
CVE-2022-2294 |
低危 |
2.32.4.1-1~deb10u1.1 |
2.36.6-1~deb10u1 |
Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.11 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2294
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-07-28 02:15 修改: 2024-06-28 14:08
|
binutils |
CVE-2020-19726 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_getl32() in bfd/libbfd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-19726
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2024-10-07 19:36
|
fdisk |
CVE-2022-0563 |
低危 |
2.33.1-0.1 |
|
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
binutils |
CVE-2020-21490 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in get_field() in microblaze-dis.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-21490
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:19
|
binutils |
CVE-2020-35342 |
低危 |
2.31.1.4-1+dde |
|
binutils: uninitialized heap memory in tic4x_print_cond() in opcodes/tic4x-dis.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35342
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15
|
g++-8 |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
binutils |
CVE-2020-35448 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35448
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-27 04:15 修改: 2023-11-07 03:21
|
libfreetype6 |
CVE-2022-31782 |
低危 |
2.9.1-3+deb10u2 |
|
ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based bu ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31782
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-06-02 14:15 修改: 2022-06-10 18:08
|
libxml2 |
CVE-2024-34459 |
低危 |
2.9.4.5-1+dde |
|
libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2024-05-14 15:39 修改: 2024-08-22 18:35
|
binutils |
CVE-2020-35493 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35493
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
gcc-8 |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
binutils |
CVE-2020-35494 |
低危 |
2.31.1.4-1+dde |
|
binutils: usage of unitialized heap in tic4x_print_cond function in opcodes/tic4x-dis.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35494
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
binutils |
CVE-2020-35495 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in bfd_pef_parse_symbols function in bfd/pef.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35495
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
gcc-8-base |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
libgbm1 |
CVE-2023-45913 |
低危 |
20.3.4.2-1 |
|
Mesa v23.0.4 was discovered to contain a NULL pointer dereference via ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45913
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 04:15 修改: 2024-08-02 21:15
|
libgbm1 |
CVE-2023-45919 |
低危 |
20.3.4.2-1 |
|
Mesa 23.0.4 was discovered to contain a buffer over-read in glXQuerySe ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45919
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libxml2-dev |
CVE-2024-34459 |
低危 |
2.9.4.5-1+dde |
|
libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-14 15:39 修改: 2024-08-22 18:35
|
libgbm1 |
CVE-2023-45922 |
低危 |
20.3.4.2-1 |
|
glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45922
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libgbm1 |
CVE-2023-45931 |
低危 |
20.3.4.2-1 |
|
Mesa 23.0.4 was discovered to contain a NULL pointer dereference in ch ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45931
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 04:15 修改: 2024-09-04 15:35
|
binutils |
CVE-2020-35496 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in bfd_pef_scan_start_address function in bfd/pef.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35496
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-11-07 03:21
|
binutils |
CVE-2020-35507 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in bfd_pef_parse_function_stubs function in bfd/pef.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35507
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-01-04 15:15 修改: 2023-01-24 16:10
|
libgcc-8-dev |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
libxslt1.1 |
CVE-2015-9019 |
低危 |
1.1.32.3-1+dde |
|
libxslt: math.random() in xslt uses unseeded randomness
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-9019
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-04-05 21:59 修改: 2017-04-11 19:57
|
binutils |
CVE-2021-20197 |
低危 |
2.31.1.4-1+dde |
|
binutils: Race window allows users to own arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20197
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15
|
binutils |
CVE-2021-20284 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20284
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15
|
libgcc1 |
CVE-2023-4039 |
低危 |
1:8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
gnome-keyring |
CVE-2018-19358 |
低危 |
3.28.2-5 |
|
gnome-keyring: login credentials retrieval via a Secret Service API call
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19358
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2018-11-18 19:29 修改: 2024-08-05 12:15
|
binutils |
CVE-2021-20294 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack buffer overflow WRITE may lead to a DoS via a crafted ELF
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20294
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-04-29 16:15 修改: 2023-11-07 03:29
|
gnupg |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
libgcrypt20 |
CVE-2018-6829 |
低危 |
1.8.4.2-1+dde |
|
libgcrypt: ElGamal implementation doesn't have semantic security due to incorrectly encoded plaintexts possibly allowing to obtain sensitive information
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6829
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2018-02-07 23:29 修改: 2020-01-15 20:15
|
gnupg |
CVE-2022-3219 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31
|
libgd3 |
CVE-2021-40145 |
低危 |
2.2.5.3-1+dde |
|
gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka LibGD) throu ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40145
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-08-26 01:15 修改: 2024-08-04 03:15
|
binutils |
CVE-2021-32256 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack-overflow issue in demangle_type in rust-demangle.c.
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32256
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-07-18 14:15 修改: 2023-08-24 19:15
|
locales |
CVE-2010-4756 |
低危 |
2.28.17-1+eagle |
|
glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15
|
locales |
CVE-2018-20796 |
低危 |
2.28.17-1+eagle |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56
|
locales |
CVE-2019-1010022 |
低危 |
2.28.17-1+eagle |
|
glibc: stack guard protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
locales |
CVE-2019-1010023 |
低危 |
2.28.17-1+eagle |
|
glibc: running ldd on malicious ELF leads to code execution because of wrong size computation
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
locales |
CVE-2019-1010024 |
低危 |
2.28.17-1+eagle |
|
glibc: ASLR bypass using cache of thread stack and heap
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
locales |
CVE-2019-1010025 |
低危 |
2.28.17-1+eagle |
|
glibc: information disclosure of heap addresses of pthread_created thread
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
locales |
CVE-2019-9192 |
低危 |
2.28.17-1+eagle |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15
|
gnupg-l10n |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
libgl1 |
CVE-2023-45924 |
低危 |
1.3.2-1 |
|
libglxproto.c in OpenGL libglvnd bb06db5a was discovered to contain a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45924
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libgl1-mesa-dri |
CVE-2023-45913 |
低危 |
20.3.4.2-1 |
|
Mesa v23.0.4 was discovered to contain a NULL pointer dereference via ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45913
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 04:15 修改: 2024-08-02 21:15
|
locales-all |
CVE-2010-4756 |
低危 |
2.28.17-1+eagle |
|
glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15
|
locales-all |
CVE-2018-20796 |
低危 |
2.28.17-1+eagle |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56
|
locales-all |
CVE-2019-1010022 |
低危 |
2.28.17-1+eagle |
|
glibc: stack guard protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
locales-all |
CVE-2019-1010023 |
低危 |
2.28.17-1+eagle |
|
glibc: running ldd on malicious ELF leads to code execution because of wrong size computation
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
locales-all |
CVE-2019-1010024 |
低危 |
2.28.17-1+eagle |
|
glibc: ASLR bypass using cache of thread stack and heap
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
locales-all |
CVE-2019-1010025 |
低危 |
2.28.17-1+eagle |
|
glibc: information disclosure of heap addresses of pthread_created thread
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15
|
locales-all |
CVE-2019-9192 |
低危 |
2.28.17-1+eagle |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15
|
libgl1-mesa-dri |
CVE-2023-45919 |
低危 |
20.3.4.2-1 |
|
Mesa 23.0.4 was discovered to contain a buffer over-read in glXQuerySe ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45919
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
login |
CVE-2007-5686 |
低危 |
1:4.5.1-1+dde |
|
initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2007-5686
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2007-10-28 17:08 修改: 2018-10-15 21:45
|
login |
CVE-2013-4235 |
低危 |
1:4.5.1-1+dde |
|
shadow-utils: TOCTOU race conditions by copying and removing directory trees
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4235
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-12-03 15:15 修改: 2023-02-13 00:28
|
login |
CVE-2018-7169 |
低危 |
1:4.5.1-1+dde |
|
shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7169
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2018-02-15 20:29 修改: 2019-10-03 00:03
|
login |
CVE-2019-19882 |
低危 |
1:4.5.1-1+dde |
|
shadow-utils: local users can obtain root access because setuid programs are misconfigured
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19882
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-12-18 16:15 修改: 2020-08-25 15:15
|
login |
CVE-2023-29383 |
低危 |
1:4.5.1-1+dde |
|
shadow: Improper input validation in shadow-utils package utility chfn
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05
|
login |
TEMP-0628843-DBAD28 |
低危 |
1:4.5.1-1+dde |
|
[more related to CVE-2005-4890]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
m4 |
CVE-2008-1687 |
低危 |
1.4.18-2 |
|
m4: unquoted output of maketemp and mkstemp
漏洞详情: https://avd.aquasec.com/nvd/cve-2008-1687
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2008-04-09 19:05 修改: 2017-08-08 01:30
|
m4 |
CVE-2008-1688 |
低危 |
1.4.18-2 |
|
m4: code execution via -F argument
漏洞详情: https://avd.aquasec.com/nvd/cve-2008-1688
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2008-04-09 19:05 修改: 2017-08-08 01:30
|
mesa-va-drivers |
CVE-2023-45913 |
低危 |
20.3.4.2-1 |
|
Mesa v23.0.4 was discovered to contain a NULL pointer dereference via ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45913
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-27 04:15 修改: 2024-08-02 21:15
|
mesa-va-drivers |
CVE-2023-45919 |
低危 |
20.3.4.2-1 |
|
Mesa 23.0.4 was discovered to contain a buffer over-read in glXQuerySe ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45919
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
mesa-va-drivers |
CVE-2023-45922 |
低危 |
20.3.4.2-1 |
|
glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45922
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
mesa-va-drivers |
CVE-2023-45931 |
低危 |
20.3.4.2-1 |
|
Mesa 23.0.4 was discovered to contain a NULL pointer dereference in ch ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45931
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-27 04:15 修改: 2024-09-04 15:35
|
libgl1-mesa-dri |
CVE-2023-45922 |
低危 |
20.3.4.2-1 |
|
glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45922
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libgl1-mesa-dri |
CVE-2023-45931 |
低危 |
20.3.4.2-1 |
|
Mesa 23.0.4 was discovered to contain a NULL pointer dereference in ch ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45931
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 04:15 修改: 2024-09-04 15:35
|
mount |
CVE-2022-0563 |
低危 |
2.33.1-0.1 |
|
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
libglapi-mesa |
CVE-2023-45913 |
低危 |
20.3.4.2-1 |
|
Mesa v23.0.4 was discovered to contain a NULL pointer dereference via ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45913
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 04:15 修改: 2024-08-02 21:15
|
libglapi-mesa |
CVE-2023-45919 |
低危 |
20.3.4.2-1 |
|
Mesa 23.0.4 was discovered to contain a buffer over-read in glXQuerySe ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45919
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
ncurses-base |
CVE-2023-45918 |
低危 |
6.1+20181013.1-1+dde+rb2 |
|
ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15
|
libglapi-mesa |
CVE-2023-45922 |
低危 |
20.3.4.2-1 |
|
glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45922
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
ncurses-bin |
CVE-2023-45918 |
低危 |
6.1+20181013.1-1+dde+rb2 |
|
ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15
|
network-manager |
CVE-2020-10754 |
低危 |
1.14.6.5-3 |
|
NetworkManager: user configuration not honoured leaving the connection unauthenticated via insecure defaults
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10754
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-06-08 18:15 修改: 2023-11-07 03:14
|
network-manager |
CVE-2024-6501 |
低危 |
1.14.6.5-3 |
|
NetworkManager: Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6501
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-09 20:15 修改: 2024-07-11 13:06
|
libglapi-mesa |
CVE-2023-45931 |
低危 |
20.3.4.2-1 |
|
Mesa 23.0.4 was discovered to contain a NULL pointer dereference in ch ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45931
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 04:15 修改: 2024-09-04 15:35
|
openssh-client |
CVE-2007-2243 |
低危 |
1:7.9p1.6-1+dde |
|
OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabl ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2007-2243
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2007-04-25 16:19 修改: 2017-07-29 01:31
|
openssh-client |
CVE-2007-2768 |
低危 |
1:7.9p1.6-1+dde |
|
OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2007-2768
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2007-05-21 20:30 修改: 2021-04-01 15:32
|
openssh-client |
CVE-2008-3234 |
低危 |
1:7.9p1.6-1+dde |
|
sshd in OpenSSH 4 on Debian GNU/Linux, and the 20070303 OpenSSH snapsh ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2008-3234
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2008-07-18 16:41 修改: 2017-09-29 01:31
|
openssh-client |
CVE-2016-20012 |
低危 |
1:7.9p1.6-1+dde |
|
openssh: Public key information leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-20012
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2021-09-15 20:15 修改: 2024-08-06 04:16
|
openssh-client |
CVE-2018-15919 |
低危 |
1:7.9p1.6-1+dde |
|
openssh: User enumeration via malformed packets in authentication requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15919
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2018-08-28 08:29 修改: 2019-03-07 16:29
|
openssh-client |
CVE-2019-16905 |
低危 |
1:7.9p1.6-1+dde |
|
openssh: an integer overflow in the private key parsing code for the XMSS key type
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16905
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2019-10-09 20:15 修改: 2023-03-01 01:56
|
openssh-client |
CVE-2019-6110 |
低危 |
1:7.9p1.6-1+dde |
|
openssh: Acceptance and display of arbitrary stderr allows for spoofing of scp client output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6110
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2019-01-31 18:29 修改: 2023-02-23 23:29
|
openssh-client |
CVE-2020-12062 |
低危 |
1:7.9p1.6-1+dde |
|
openssh: scp can send duplicate responses to the server upon a utimes system call failure leading to overwrite of arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12062
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2020-06-01 16:15 修改: 2024-08-04 12:15
|
openssh-client |
CVE-2020-14145 |
低危 |
1:7.9p1.6-1+dde |
|
openssh: Observable discrepancy leading to an information leak in the algorithm negotiation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14145
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2020-06-29 18:15 修改: 2022-04-28 19:34
|
openssh-client |
CVE-2020-15778 |
低危 |
1:7.9p1.6-1+dde |
|
openssh: scp allows command injection when using backtick characters in the destination argument
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15778
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2020-07-24 14:15 修改: 2024-08-04 14:15
|
openssh-client |
CVE-2021-36368 |
低危 |
1:7.9p1.6-1+dde |
|
openssh: possible bypass of fido 2 devices and ssh-askpass
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36368
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2022-03-13 00:15 修改: 2024-08-04 01:15
|
openssh-client |
CVE-2023-51767 |
低危 |
1:7.9p1.6-1+dde |
|
openssh: authentication bypass via row hammer attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51767
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2023-12-24 07:15 修改: 2024-02-27 15:51
|
openssh-client |
CVE-2024-39894 |
低危 |
1:7.9p1.6-1+dde |
|
openssh: Logic error in ObscureKeystrokeTiming
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39894
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-07-02 18:15 修改: 2024-09-11 16:15
|
libgles2 |
CVE-2023-45924 |
低危 |
1.3.2-1 |
|
libglxproto.c in OpenGL libglvnd bb06db5a was discovered to contain a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45924
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libglib2.0-0 |
CVE-2012-0039 |
低危 |
2.58.3.6-1+eagle |
|
glib2: hash table collisions CPU usage DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-0039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2012-01-14 17:55 修改: 2024-08-06 18:15
|
libglib2.0-0 |
CVE-2020-35457 |
低危 |
2.58.3.6-1+eagle |
|
GNOME GLib before 2.65.3 has an integer overflow, that might lead to a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35457
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-14 23:15 修改: 2024-08-04 17:15
|
libglib2.0-bin |
CVE-2012-0039 |
低危 |
2.58.3.6-1+eagle |
|
glib2: hash table collisions CPU usage DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-0039
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2012-01-14 17:55 修改: 2024-08-06 18:15
|
libglib2.0-bin |
CVE-2020-35457 |
低危 |
2.58.3.6-1+eagle |
|
GNOME GLib before 2.65.3 has an integer overflow, that might lead to a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35457
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-12-14 23:15 修改: 2024-08-04 17:15
|
libglib2.0-data |
CVE-2012-0039 |
低危 |
2.58.3.6-1+eagle |
|
glib2: hash table collisions CPU usage DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-0039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2012-01-14 17:55 修改: 2024-08-06 18:15
|
libglib2.0-data |
CVE-2020-35457 |
低危 |
2.58.3.6-1+eagle |
|
GNOME GLib before 2.65.3 has an integer overflow, that might lead to a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35457
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-12-14 23:15 修改: 2024-08-04 17:15
|
libglib2.0-dev |
CVE-2012-0039 |
低危 |
2.58.3.6-1+eagle |
|
glib2: hash table collisions CPU usage DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-0039
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2012-01-14 17:55 修改: 2024-08-06 18:15
|
libglib2.0-dev |
CVE-2020-35457 |
低危 |
2.58.3.6-1+eagle |
|
GNOME GLib before 2.65.3 has an integer overflow, that might lead to a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35457
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-12-14 23:15 修改: 2024-08-04 17:15
|
libglib2.0-dev-bin |
CVE-2012-0039 |
低危 |
2.58.3.6-1+eagle |
|
glib2: hash table collisions CPU usage DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-0039
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2012-01-14 17:55 修改: 2024-08-06 18:15
|
libglib2.0-dev-bin |
CVE-2020-35457 |
低危 |
2.58.3.6-1+eagle |
|
GNOME GLib before 2.65.3 has an integer overflow, that might lead to a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35457
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-12-14 23:15 修改: 2024-08-04 17:15
|
libglvnd0 |
CVE-2023-45924 |
低危 |
1.3.2-1 |
|
libglxproto.c in OpenGL libglvnd bb06db5a was discovered to contain a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45924
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libglx-mesa0 |
CVE-2023-45913 |
低危 |
20.3.4.2-1 |
|
Mesa v23.0.4 was discovered to contain a NULL pointer dereference via ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45913
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 04:15 修改: 2024-08-02 21:15
|
libglx-mesa0 |
CVE-2023-45919 |
低危 |
20.3.4.2-1 |
|
Mesa 23.0.4 was discovered to contain a buffer over-read in glXQuerySe ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45919
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libglx-mesa0 |
CVE-2023-45922 |
低危 |
20.3.4.2-1 |
|
glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45922
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
libglx-mesa0 |
CVE-2023-45931 |
低危 |
20.3.4.2-1 |
|
Mesa 23.0.4 was discovered to contain a NULL pointer dereference in ch ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45931
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 04:15 修改: 2024-09-04 15:35
|
libglx0 |
CVE-2023-45924 |
低危 |
1.3.2-1 |
|
libglxproto.c in OpenGL libglvnd bb06db5a was discovered to contain a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45924
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-03-27 05:15 修改: 2024-08-02 21:15
|
gnupg-l10n |
CVE-2022-3219 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31
|
openssl |
CVE-2024-2511 |
低危 |
1.1.1d.6-1 |
|
openssl: Unbounded memory growth with session handling in TLSv1.3
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15
|
openssl |
CVE-2024-9143 |
低危 |
1.1.1d.6-1 |
|
openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2024-10-16 17:15 修改: 2024-10-18 12:53
|
libgnutls30 |
CVE-2011-3389 |
低危 |
3.6.7.5-1+security |
|
HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)
漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3389
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2011-09-06 19:55 修改: 2022-11-29 15:56
|
passwd |
CVE-2007-5686 |
低危 |
1:4.5.1-1+dde |
|
initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2007-5686
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2007-10-28 17:08 修改: 2018-10-15 21:45
|
passwd |
CVE-2013-4235 |
低危 |
1:4.5.1-1+dde |
|
shadow-utils: TOCTOU race conditions by copying and removing directory trees
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4235
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-12-03 15:15 修改: 2023-02-13 00:28
|
passwd |
CVE-2018-7169 |
低危 |
1:4.5.1-1+dde |
|
shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7169
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2018-02-15 20:29 修改: 2019-10-03 00:03
|
passwd |
CVE-2019-19882 |
低危 |
1:4.5.1-1+dde |
|
shadow-utils: local users can obtain root access because setuid programs are misconfigured
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19882
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-12-18 16:15 修改: 2020-08-25 15:15
|
passwd |
CVE-2023-29383 |
低危 |
1:4.5.1-1+dde |
|
shadow: Improper input validation in shadow-utils package utility chfn
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05
|
passwd |
TEMP-0628843-DBAD28 |
低危 |
1:4.5.1-1+dde |
|
[more related to CVE-2005-4890]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
patch |
CVE-2010-4651 |
低危 |
2.7.6-3+deb10u1 |
|
patch: directory traversal flaw allows for arbitrary file creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4651
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2011-03-11 22:55 修改: 2016-11-28 19:07
|
patch |
CVE-2018-6951 |
低危 |
2.7.6-3+deb10u1 |
|
patch: NULL pointer dereference in pch.c:intuit_diff_type() causes a crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6951
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-02-13 19:29 修改: 2019-04-17 20:29
|
patch |
CVE-2018-6952 |
低危 |
2.7.6-3+deb10u1 |
|
patch: Double free of memory in pch.c:another_hunk() causes a crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6952
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-02-13 19:29 修改: 2019-04-17 20:29
|
patch |
CVE-2021-45261 |
低危 |
2.7.6-3+deb10u1 |
|
patch: Invalid Pointer via another_hunk function
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45261
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-12-22 18:15 修改: 2021-12-28 14:24
|
binutils |
CVE-2021-3530 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack memory exhaustion in demangle_path() in rust-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3530
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-06-02 15:15 修改: 2022-09-28 20:03
|
gnupg-utils |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
perl |
CVE-2011-4116 |
低危 |
5.28.1.2-6+deb10u1 |
|
perl: File:: Temp insecure temporary file handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-01-31 18:15 修改: 2020-02-05 22:10
|
perl |
CVE-2023-31486 |
低危 |
5.28.1.2-6+deb10u1 |
|
http-tiny: insecure TLS cert default
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31486
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-04-29 00:15 修改: 2023-06-21 18:19
|
libgomp1 |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
gnupg-utils |
CVE-2022-3219 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31
|
perl-base |
CVE-2011-4116 |
低危 |
5.28.1.2-6+deb10u1 |
|
perl: File:: Temp insecure temporary file handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2020-01-31 18:15 修改: 2020-02-05 22:10
|
perl-base |
CVE-2023-31486 |
低危 |
5.28.1.2-6+deb10u1 |
|
http-tiny: insecure TLS cert default
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31486
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-04-29 00:15 修改: 2023-06-21 18:19
|
binutils |
CVE-2021-3549 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in avr_elf32_load_records_from_section() via large section parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3549
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-05-26 21:15 修改: 2022-10-07 20:28
|
gpg |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
perl-modules-5.28 |
CVE-2011-4116 |
低危 |
5.28.1.2-6+deb10u1 |
|
perl: File:: Temp insecure temporary file handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2020-01-31 18:15 修改: 2020-02-05 22:10
|
perl-modules-5.28 |
CVE-2023-31486 |
低危 |
5.28.1.2-6+deb10u1 |
|
http-tiny: insecure TLS cert default
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31486
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-04-29 00:15 修改: 2023-06-21 18:19
|
policykit-1 |
CVE-2016-2568 |
低危 |
0.105.10.6-1+eagle |
|
polkit: Program run via pkexec as unprivileged user can escape to parent session via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2568
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-02-13 18:59 修改: 2022-04-18 17:59
|
procps |
CVE-2023-4016 |
低危 |
2:3.3.15-2 |
|
procps: ps buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4016
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-08-02 05:15 修改: 2023-12-15 18:19
|
python |
CVE-2008-4108 |
低危 |
2.7.16-1 |
|
python: Generic FAQ wizard moving tool insecure auxiliary /tmp file usage (symlink attack possible)
漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4108
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2008-09-18 17:59 修改: 2017-08-08 01:32
|
python-minimal |
CVE-2008-4108 |
低危 |
2.7.16-1 |
|
python: Generic FAQ wizard moving tool insecure auxiliary /tmp file usage (symlink attack possible)
漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4108
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2008-09-18 17:59 修改: 2017-08-08 01:32
|
python2 |
CVE-2008-4108 |
低危 |
2.7.16-1 |
|
python: Generic FAQ wizard moving tool insecure auxiliary /tmp file usage (symlink attack possible)
漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4108
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2008-09-18 17:59 修改: 2017-08-08 01:32
|
python2-minimal |
CVE-2008-4108 |
低危 |
2.7.16-1 |
|
python: Generic FAQ wizard moving tool insecure auxiliary /tmp file usage (symlink attack possible)
漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4108
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2008-09-18 17:59 修改: 2017-08-08 01:32
|
gpg |
CVE-2022-3219 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31
|
binutils |
CVE-2021-3826 |
低危 |
2.31.1.4-1+dde |
|
libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3826
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-09-01 21:15 修改: 2024-01-22 15:01
|
gpg-agent |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
gpg-agent |
CVE-2022-3219 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31
|
binutils |
CVE-2021-45078 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45078
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2021-12-15 20:15 修改: 2023-11-07 03:39
|
gpg-wks-client |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
python2.7 |
CVE-2013-7040 |
低危 |
2.7.16.2-1+eagle |
|
python: hash secret can be recovered remotely
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-7040
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2014-05-19 14:55 修改: 2019-10-25 11:53
|
python2.7 |
CVE-2017-17522 |
低危 |
2.7.16.2-1+eagle |
|
python: Command injection in Lib/webbrowser.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15
|
python2.7 |
CVE-2019-18348 |
低危 |
2.7.16.2-1+eagle |
|
python: CRLF injection via the host part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06
|
python2.7 |
CVE-2019-9674 |
低危 |
2.7.16.2-1+eagle |
|
python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40
|
python2.7 |
CVE-2020-27619 |
低危 |
2.7.16.2-1+eagle |
|
python: Unsafe use of eval() on data retrieved via HTTP in the test suite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15
|
python2.7 |
CVE-2021-28861 |
低危 |
2.7.16.2-1+eagle |
|
python: open redirection vulnerability in lib/http/server.py may lead to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15
|
python2.7 |
CVE-2024-5642 |
低危 |
2.7.16.2-1+eagle |
|
python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-27 21:15 修改: 2024-07-28 14:15
|
libgroupsock8 |
CVE-2019-15232 |
低危 |
2018.11.26.1-1+eagle |
|
Live555 before 2019.08.16 has a Use-After-Free because GenericMediaSer ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15232
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-08-20 00:15 修改: 2023-03-29 16:23
|
libgroupsock8 |
CVE-2019-7732 |
低危 |
2018.11.26.1-1+eagle |
|
In Live555 0.95, a setup packet can cause a memory leak leading to DoS ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7732
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-02-11 17:29 修改: 2020-08-24 17:37
|
libgroupsock8 |
CVE-2019-7733 |
低危 |
2018.11.26.1-1+eagle |
|
In Live555 0.95, there is a buffer overflow via a large integer in a C ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7733
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-02-11 17:29 修改: 2020-05-15 00:15
|
gpg-wks-client |
CVE-2022-3219 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31
|
binutils |
CVE-2021-46174 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_getl32() in libbfd.c via objdump
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46174
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-25 19:40
|
gpg-wks-server |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
python2.7-minimal |
CVE-2013-7040 |
低危 |
2.7.16.2-1+eagle |
|
python: hash secret can be recovered remotely
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-7040
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2014-05-19 14:55 修改: 2019-10-25 11:53
|
python2.7-minimal |
CVE-2017-17522 |
低危 |
2.7.16.2-1+eagle |
|
python: Command injection in Lib/webbrowser.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15
|
python2.7-minimal |
CVE-2019-18348 |
低危 |
2.7.16.2-1+eagle |
|
python: CRLF injection via the host part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06
|
python2.7-minimal |
CVE-2019-9674 |
低危 |
2.7.16.2-1+eagle |
|
python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40
|
python2.7-minimal |
CVE-2020-27619 |
低危 |
2.7.16.2-1+eagle |
|
python: Unsafe use of eval() on data retrieved via HTTP in the test suite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15
|
python2.7-minimal |
CVE-2021-28861 |
低危 |
2.7.16.2-1+eagle |
|
python: open redirection vulnerability in lib/http/server.py may lead to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15
|
python2.7-minimal |
CVE-2024-5642 |
低危 |
2.7.16.2-1+eagle |
|
python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-27 21:15 修改: 2024-07-28 14:15
|
gpg-wks-server |
CVE-2022-3219 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31
|
binutils |
CVE-2021-46195 |
低危 |
2.31.1.4-1+dde |
|
gcc: uncontrolled recursion in libiberty/rust-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46195
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-01-14 20:15 修改: 2022-01-22 01:38
|
gpgconf |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
gpgconf |
CVE-2022-3219 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31
|
binutils |
CVE-2022-35205 |
低危 |
2.31.1.4-1+dde |
|
binutils: reachable assertion in display_debug_names() in dwarf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35205
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15
|
python3.7 |
CVE-2017-17522 |
低危 |
3.7.3.6-1+eagle |
|
python: Command injection in Lib/webbrowser.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15
|
python3.7 |
CVE-2019-18348 |
低危 |
3.7.3.6-1+eagle |
|
python: CRLF injection via the host part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06
|
python3.7 |
CVE-2019-9674 |
低危 |
3.7.3.6-1+eagle |
|
python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40
|
python3.7 |
CVE-2020-27619 |
低危 |
3.7.3.6-1+eagle |
|
python: Unsafe use of eval() on data retrieved via HTTP in the test suite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15
|
python3.7 |
CVE-2021-28861 |
低危 |
3.7.3.6-1+eagle |
|
python: open redirection vulnerability in lib/http/server.py may lead to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15
|
python3.7 |
CVE-2024-4032 |
低危 |
3.7.3.6-1+eagle |
|
python: incorrect IPv4 and IPv6 private ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35
|
python3.7 |
CVE-2024-5642 |
低危 |
3.7.3.6-1+eagle |
|
python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-27 21:15 修改: 2024-07-28 14:15
|
gpgsm |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
gpgsm |
CVE-2022-3219 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31
|
libgssapi-krb5-2 |
CVE-2018-5709 |
低危 |
1.17.4-1+eagle |
|
krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58
|
binutils |
CVE-2022-35206 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in read_and_display_attr_value() in dwarf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35206
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-31 00:36
|
gpgv |
CVE-2019-14855 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
python3.7-minimal |
CVE-2017-17522 |
低危 |
3.7.3.6-1+eagle |
|
python: Command injection in Lib/webbrowser.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17522
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-12-14 16:29 修改: 2024-08-05 21:15
|
python3.7-minimal |
CVE-2019-18348 |
低危 |
3.7.3.6-1+eagle |
|
python: CRLF injection via the host part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18348
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-10-23 17:15 修改: 2023-11-07 03:06
|
python3.7-minimal |
CVE-2019-9674 |
低危 |
3.7.3.6-1+eagle |
|
python: Nested zip file (Zip bomb) vulnerability in Lib/zipfile.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9674
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-02-04 15:15 修改: 2023-03-01 16:40
|
python3.7-minimal |
CVE-2020-27619 |
低危 |
3.7.3.6-1+eagle |
|
python: Unsafe use of eval() on data retrieved via HTTP in the test suite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27619
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-10-22 03:16 修改: 2024-02-03 07:15
|
python3.7-minimal |
CVE-2021-28861 |
低危 |
3.7.3.6-1+eagle |
|
python: open redirection vulnerability in lib/http/server.py may lead to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28861
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-08-23 01:15 修改: 2024-08-03 22:15
|
python3.7-minimal |
CVE-2024-4032 |
低危 |
3.7.3.6-1+eagle |
|
python: incorrect IPv4 and IPv6 private ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35
|
python3.7-minimal |
CVE-2024-5642 |
低危 |
3.7.3.6-1+eagle |
|
python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5642
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-06-27 21:15 修改: 2024-07-28 14:15
|
gpgv |
CVE-2022-3219 |
低危 |
2.2.12-1+deb10u1 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31
|
qdbus |
CVE-2009-3015 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
QtWeb 3.0 Builds 001 and 003 does not properly block javascript: and d ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3015
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2009-08-31 16:30 修改: 2017-08-17 01:31
|
qdbus |
CVE-2009-3272 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
Stack consumption vulnerability in WebKit.dll in WebKit in Apple Safar ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3272
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2009-09-21 19:30 修改: 2017-09-19 01:29
|
qdbus |
TEMP-0560108-565B70 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
[browser-based css info disclosure]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0560108-565B70
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
qdbus |
TEMP-0568486-B6FCB6 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
[browser javascript document.write denial-of-service]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0568486-B6FCB6
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
qml-module-qt-labs-folderlistmodel |
CVE-2022-40983 |
低危 |
5.15.1.2+dde-1+eagle |
|
An integer overflow vulnerability exists in the QML QtScript Reflect A ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40983
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 15:31
|
qml-module-qt-labs-folderlistmodel |
CVE-2022-43591 |
低危 |
5.15.1.2+dde-1+eagle |
|
A buffer overflow vulnerability exists in the QML QtScript Reflect API ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43591
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 07:55
|
qml-module-qt-labs-settings |
CVE-2022-40983 |
低危 |
5.15.1.2+dde-1+eagle |
|
An integer overflow vulnerability exists in the QML QtScript Reflect A ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40983
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 15:31
|
qml-module-qt-labs-settings |
CVE-2022-43591 |
低危 |
5.15.1.2+dde-1+eagle |
|
A buffer overflow vulnerability exists in the QML QtScript Reflect API ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43591
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 07:55
|
qml-module-qtqml |
CVE-2022-40983 |
低危 |
5.15.1.2+dde-1+eagle |
|
An integer overflow vulnerability exists in the QML QtScript Reflect A ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40983
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 15:31
|
qml-module-qtqml |
CVE-2022-43591 |
低危 |
5.15.1.2+dde-1+eagle |
|
A buffer overflow vulnerability exists in the QML QtScript Reflect API ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43591
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 07:55
|
qml-module-qtqml-models2 |
CVE-2022-40983 |
低危 |
5.15.1.2+dde-1+eagle |
|
An integer overflow vulnerability exists in the QML QtScript Reflect A ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40983
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 15:31
|
qml-module-qtqml-models2 |
CVE-2022-43591 |
低危 |
5.15.1.2+dde-1+eagle |
|
A buffer overflow vulnerability exists in the QML QtScript Reflect API ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43591
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 07:55
|
qml-module-qtquick-layouts |
CVE-2022-40983 |
低危 |
5.15.1.2+dde-1+eagle |
|
An integer overflow vulnerability exists in the QML QtScript Reflect A ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40983
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 15:31
|
qml-module-qtquick-layouts |
CVE-2022-43591 |
低危 |
5.15.1.2+dde-1+eagle |
|
A buffer overflow vulnerability exists in the QML QtScript Reflect API ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43591
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 07:55
|
qml-module-qtquick-window2 |
CVE-2022-40983 |
低危 |
5.15.1.2+dde-1+eagle |
|
An integer overflow vulnerability exists in the QML QtScript Reflect A ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40983
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 15:31
|
qml-module-qtquick-window2 |
CVE-2022-43591 |
低危 |
5.15.1.2+dde-1+eagle |
|
A buffer overflow vulnerability exists in the QML QtScript Reflect API ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43591
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 07:55
|
qml-module-qtquick2 |
CVE-2022-40983 |
低危 |
5.15.1.2+dde-1+eagle |
|
An integer overflow vulnerability exists in the QML QtScript Reflect A ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40983
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 15:31
|
qml-module-qtquick2 |
CVE-2022-43591 |
低危 |
5.15.1.2+dde-1+eagle |
|
A buffer overflow vulnerability exists in the QML QtScript Reflect API ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43591
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-01-12 17:15 修改: 2023-01-20 07:55
|
binutils |
CVE-2022-38533 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38533
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2022-08-26 00:15 修改: 2023-11-07 03:50
|
qtcore4-l10n |
CVE-2009-3015 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
QtWeb 3.0 Builds 001 and 003 does not properly block javascript: and d ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3015
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2009-08-31 16:30 修改: 2017-08-17 01:31
|
qtcore4-l10n |
CVE-2009-3272 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
Stack consumption vulnerability in WebKit.dll in WebKit in Apple Safar ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2009-3272
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2009-09-21 19:30 修改: 2017-09-19 01:29
|
qtcore4-l10n |
TEMP-0560108-565B70 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
[browser-based css info disclosure]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0560108-565B70
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
qtcore4-l10n |
TEMP-0568486-B6FCB6 |
低危 |
4:4.8.7.1+dfsg-1+dde |
|
[browser javascript document.write denial-of-service]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0568486-B6FCB6
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
binutils |
CVE-2022-4285 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4285
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-01-27 18:15 修改: 2023-11-07 03:57
|
initramfs-tools |
CVE-2008-4996 |
低危 |
0.137.26-1+dde |
|
init in initramfs-tools 0.92f allows local users to overwrite arbitrar ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4996
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2008-11-07 19:36 修改: 2024-08-07 11:15
|
rfkill |
CVE-2022-0563 |
低危 |
2.33.1-0.1 |
|
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
initramfs-tools-core |
CVE-2008-4996 |
低危 |
0.137.26-1+dde |
|
init in initramfs-tools 0.92f allows local users to overwrite arbitrar ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2008-4996
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2008-11-07 19:36 修改: 2024-08-07 11:15
|
libaccountsservice0 |
CVE-2012-6655 |
低危 |
0.6.45-2 |
|
accountsservice: local encrypted password disclosure when changing password
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-6655
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-11-27 18:15 修改: 2020-08-18 15:05
|
binutils |
CVE-2022-44840 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in find_section_in_set() in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44840
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
binutils |
CVE-2022-45703 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in display_debug_section() in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45703
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-10-06 15:15
|
libhunspell-1.7-0 |
CVE-2019-16707 |
低危 |
1.7.0-2 |
|
hunspell: out-of-bounds read in SuggestMgr::leftcommonsubstring in suggestmgr.cxx
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16707
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2019-09-23 12:15 修改: 2023-11-07 03:05
|
binutils |
CVE-2022-47007 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in stab_demangle_v3_arg() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47007
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libiniparser1 |
CVE-2023-33461 |
低危 |
4.1-4 |
|
iniparser: NULL pointer cause crash in iniparser_getboolean
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33461
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-01 03:15 修改: 2024-06-07 14:11
|
libapparmor1 |
CVE-2016-1585 |
低危 |
2.13.2-10 |
|
In all versions of AppArmor mount rules are accidentally widened when ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1585
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2019-04-22 16:29 修改: 2023-11-07 02:29
|
libapt-pkg5.0 |
CVE-2011-3374 |
低危 |
1.8.2.8-1+dde |
|
It was found that apt-key in apt, all versions, do not correctly valid ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3374
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-11-26 00:15 修改: 2021-02-09 16:08
|
libip4tc0 |
CVE-2012-2663 |
低危 |
1.8.2.1-1+dde |
|
iptables: --syn flag bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-2663
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2014-02-15 14:57 修改: 2023-11-07 02:10
|
libip4tc0 |
CVE-2019-11360 |
低危 |
1.8.2.1-1+dde |
|
iptables: buffer overflow in iptables-restore
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11360
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-07-12 14:15 修改: 2021-07-21 11:39
|
binutils |
CVE-2022-47008 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in make_tempdir() and make_tempname() in bucomm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47008
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
binutils |
CVE-2022-47010 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in pr_function_type() in prdbg.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47010
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
libitm1 |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
binutils |
CVE-2022-47011 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in parse_stab_struct_fields() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47011
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
binutils |
CVE-2022-47673 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bounds read in parse_module() in bfd/vms-alpha.c via addr2line
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47673
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-08-26 02:14
|
binutils |
CVE-2022-47695 |
低危 |
2.31.1.4-1+dde |
|
binutils: uninitialized field in bfd_mach_o_get_synthetic_symtab() in match-o.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47695
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35
|
binutils |
CVE-2022-47696 |
低危 |
2.31.1.4-1+dde |
|
binutils: segmentation fault in compare_symbols() in objdump.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47696
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2024-10-03 15:35
|
libjack-jackd2-0 |
CVE-2019-13351 |
低危 |
1.9.12~dfsg-2+rb2 |
|
posix/JackSocket.cpp in libjack in JACK2 1.9.1 through 1.9.12 (as dist ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13351
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-07-05 20:15 修改: 2020-08-24 17:37
|
libjansson4 |
CVE-2020-36325 |
低危 |
2.12-1 |
|
jansson: out-of-bounds read in json_loads() due to a parsing error
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36325
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-04-26 18:15 修改: 2024-08-04 18:15
|
binutils |
CVE-2022-48063 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory consumption in load_separate_debug_files() in dwarf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48063
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56
|
binutils |
CVE-2022-48064 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory consumption in _bfd_dwarf2_find_nearest_line_with_alt() in dwarf2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48064
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-07 03:56
|
binutils |
CVE-2022-48065 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in find_abstract_instance() in dwarf2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48065
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-08-22 19:16 修改: 2023-11-15 02:36
|
libasan5 |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
binutils |
CVE-2023-1579 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1579
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-04-03 23:15 修改: 2023-11-07 04:04
|
binutils |
CVE-2023-1972 |
低危 |
2.31.1.4-1+dde |
|
binutils: Illegal memory access when accessing a zer0-lengthverdef table
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1972
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-05-17 22:15 修改: 2023-09-30 10:15
|
binutils |
CVE-2023-25584 |
低危 |
2.31.1.4-1+dde |
|
binutils: Out of bounds read in parse_module function in bfd/vms-alpha.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25584
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2024-02-23 18:51
|
binutils |
CVE-2023-25585 |
低危 |
2.31.1.4-1+dde |
|
binutils: Field `file_table` of `struct module *module` is uninitialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25585
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
binutils |
CVE-2023-25586 |
低危 |
2.31.1.4-1+dde |
|
binutils: Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25586
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
libatomic1 |
CVE-2023-4039 |
低危 |
8.3.0.3-3+rebuild |
|
gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15
|
binutils |
CVE-2023-25588 |
低危 |
2.31.1.4-1+dde |
|
binutils: Field `the_bfd` of `asymbol` is uninitialized in function `bfd_mach_o_get_synthetic_symtab`
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25588
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2023-09-14 21:15 修改: 2023-11-07 04:09
|
binutils-common |
CVE-2017-13716 |
低危 |
2.31.1.4-1+dde |
|
binutils: Memory leak with the C++ symbol demangler routine in libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2017-08-28 21:29 修改: 2019-10-03 00:03
|
binutils-common |
CVE-2018-1000876 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow leads to heap-based buffer overflow in objdump
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000876
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-20 17:29 修改: 2023-11-07 02:51
|
binutils-common |
CVE-2018-12697 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus-dem.c.
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12697
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15
|
binutils-common |
CVE-2018-12698 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory consumption in demangle_template in cplus-dem.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12698
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-23 23:29 修改: 2019-10-03 00:03
|
libavahi-client3 |
CVE-2017-6519 |
低危 |
0.7.5-4+deb10u1+security |
|
avahi: Multicast DNS responds to unicast queries outside of local network
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6519
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2017-05-01 01:59 修改: 2023-11-07 02:49
|
binutils-common |
CVE-2018-12699 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in finish_stab in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12699
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-23 23:29 修改: 2019-08-03 13:15
|
binutils-common |
CVE-2018-12934 |
低危 |
2.31.1.4-1+dde |
|
binutils: Uncontrolled Resource Consumption in remember_Ktype in cplus-dem.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12934
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-06-28 14:29 修改: 2020-04-21 22:15
|
binutils-common |
CVE-2018-17358 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid memory access in _bfd_stab_section_find_nearest_line in syms.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17358
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15
|
binutils-common |
CVE-2018-17359 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid memory access in bfd_zalloc in opncls.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17359
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15
|
samba-libs |
CVE-2020-27840 |
低危 |
2:4.9.5.18-1+dde |
|
samba: Heap corruption via crafted DN strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27840
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-12 15:15 修改: 2023-11-07 03:21
|
samba-libs |
CVE-2021-20277 |
低危 |
2:4.9.5.18-1+dde |
|
samba: Out of bounds read in AD DC LDAP server
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20277
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-12 14:15 修改: 2023-11-07 03:29
|
samba-libs |
CVE-2021-43566 |
低危 |
2:4.9.5.18-1+dde |
|
samba: Symlink race error can allow directory creation outside of the exported share
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43566
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-01-11 16:15 修改: 2022-10-14 11:42
|
binutils-common |
CVE-2018-17360 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer over-read in bfd_getl32 in libbfd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17360
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-23 18:29 修改: 2019-10-31 01:15
|
sudo |
CVE-2005-1119 |
低危 |
1.8.27.6-1+security |
|
Sudo VISudo 1.6.8 and earlier allows local users to corrupt arbitrary ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2005-1119
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2005-05-02 04:00 修改: 2008-09-05 20:48
|
sudo |
CVE-2019-19232 |
低危 |
1.8.27.6-1+security |
|
sudo: attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19232
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2019-12-19 21:15 修改: 2024-08-05 02:16
|
sudo |
CVE-2019-19234 |
低危 |
1.8.27.6-1+security |
|
sudo: by using ! character in the shadow file instead of a password hash can access to a run as all sudoer account
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19234
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2019-12-19 21:15 修改: 2024-08-05 02:16
|
sudo |
CVE-2021-23240 |
低危 |
1.8.27.6-1+security |
|
sudo: symbolic link attack in SELinux-enabled sudoedit
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23240
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2021-01-12 09:15 修改: 2023-11-07 03:30
|
sudo |
CVE-2022-43995 |
低危 |
1.8.27.6-1+security |
|
sudo: heap-based overflow with very small passwords
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43995
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2022-11-02 14:15 修改: 2022-12-06 00:15
|
libavahi-common-data |
CVE-2017-6519 |
低危 |
0.7.5-4+deb10u1+security |
|
avahi: Multicast DNS responds to unicast queries outside of local network
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6519
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2017-05-01 01:59 修改: 2023-11-07 02:49
|
binutils-common |
CVE-2018-17794 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in libiberty/cplus-dem.c:work_stuff_copy_to_from() via crafted input
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17794
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-09-30 20:29 修改: 2020-04-21 22:15
|
binutils-common |
CVE-2018-17985 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack consumption problem caused by the cplus_demangle_type
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17985
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-04 23:29 修改: 2019-10-31 01:15
|
binutils-common |
CVE-2018-18309 |
低危 |
2.31.1.4-1+dde |
|
binutils: invalid memory address dereference in read_reloc in reloc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18309
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-15 02:29 修改: 2023-11-07 02:55
|
binutils-common |
CVE-2018-18483 |
低危 |
2.31.1.4-1+dde |
|
binutils: Integer overflow in cplus-dem.c:get_count() allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18483
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-18 21:29 修改: 2019-10-31 01:15
|
binutils-common |
CVE-2018-18484 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack exhaustion in cp-demangle.c allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18484
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-18 21:29 修改: 2020-08-24 17:37
|
libavahi-common3 |
CVE-2017-6519 |
低危 |
0.7.5-4+deb10u1+security |
|
avahi: Multicast DNS responds to unicast queries outside of local network
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6519
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 2017-05-01 01:59 修改: 2023-11-07 02:49
|
systemd |
CVE-2013-4392 |
低危 |
241.26-1+dde |
|
systemd: TOCTOU race condition when updating file permissions and SELinux security contexts
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49
|
systemd |
CVE-2019-20386 |
低危 |
241.26-1+dde |
|
systemd: memory leak in button_open() in login/logind-button.c when udev events are received
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20386
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-01-21 06:15 修改: 2023-11-07 03:09
|
systemd |
CVE-2020-13529 |
低危 |
241.26-1+dde |
|
systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16
|
systemd |
CVE-2023-31437 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can modify a seale ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
systemd |
CVE-2023-31438 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can truncate a sea ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
systemd |
CVE-2023-31439 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can modify the con ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
binutils-common |
CVE-2018-18605 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer over-read in sec_merge_hash_lookup in merge.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18605
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55
|
binutils-common |
CVE-2018-18606 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in _bfd_add_merge_section in merge_strings function in merge.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18606
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55
|
binutils-common |
CVE-2018-18607 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in elf_link_input_bfd in elflink.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18607
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-23 17:29 修改: 2023-11-07 02:55
|
binutils-common |
CVE-2018-18700 |
低危 |
2.31.1.4-1+dde |
|
binutils: Recursive Stack Overflow within function d_name, d_encoding, and d_local_name in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18700
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15
|
binutils-common |
CVE-2018-18701 |
低危 |
2.31.1.4-1+dde |
|
binutils: infinite recursion in next_is_type_qual and cplus_demangle_type functions in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18701
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-10-29 12:29 修改: 2020-04-21 22:15
|
libavahi-glib1 |
CVE-2017-6519 |
低危 |
0.7.5-4+deb10u1+security |
|
avahi: Multicast DNS responds to unicast queries outside of local network
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6519
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-05-01 01:59 修改: 2023-11-07 02:49
|
binutils-common |
CVE-2018-19931 |
低危 |
2.31.1.4-1+dde |
|
binutils: Heap-based buffer overflow in bfd_elf32_swap_phdr_in function resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19931
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55
|
systemd-sysv |
CVE-2013-4392 |
低危 |
241.26-1+dde |
|
systemd: TOCTOU race condition when updating file permissions and SELinux security contexts
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49
|
systemd-sysv |
CVE-2019-20386 |
低危 |
241.26-1+dde |
|
systemd: memory leak in button_open() in login/logind-button.c when udev events are received
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20386
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-01-21 06:15 修改: 2023-11-07 03:09
|
systemd-sysv |
CVE-2020-13529 |
低危 |
241.26-1+dde |
|
systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16
|
systemd-sysv |
CVE-2023-31437 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can modify a seale ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
systemd-sysv |
CVE-2023-31438 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can truncate a sea ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
systemd-sysv |
CVE-2023-31439 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can modify the con ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
sysvinit-utils |
TEMP-0517018-A83CE6 |
低危 |
2.93-8 |
|
[sysvinit: no-root option in expert installer exposes locally exploitable security flaw]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
tar |
CVE-2005-2541 |
低危 |
1.30+dfsg.2-1 |
|
tar: does not properly warn the user when extracting setuid or setgid files
漏洞详情: https://avd.aquasec.com/nvd/cve-2005-2541
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2005-08-10 04:00 修改: 2023-11-07 01:57
|
tar |
CVE-2019-9923 |
低危 |
1.30+dfsg.2-1 |
|
tar: null-pointer dereference in pax_decode_header in sparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9923
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2019-03-22 08:29 修改: 2023-11-07 03:13
|
tar |
CVE-2021-20193 |
低危 |
1.30+dfsg.2-1 |
|
tar: Memory leak in read_header() in list.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20193
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2021-03-26 17:15 修改: 2024-10-24 18:15
|
tar |
CVE-2022-48303 |
低危 |
1.30+dfsg.2-1 |
|
tar: heap buffer overflow at from_header() in list.c via specially crafted checksum
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48303
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2023-01-30 04:15 修改: 2023-05-30 17:16
|
tar |
TEMP-0290435-0B57B5 |
低危 |
1.30+dfsg.2-1 |
|
[tar's rmt command may have undesired side effects]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
tcl8.6 |
CVE-2021-35331 |
低危 |
8.6.9+dfsg-2 |
|
In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35331
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2021-07-05 15:15 修改: 2024-08-04 01:15
|
binutils-common |
CVE-2018-19932 |
低危 |
2.31.1.4-1+dde |
|
binutils: Integer overflow due to the IS_CONTAINED_BY_LMA macro resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19932
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-07 07:29 修改: 2023-11-07 02:55
|
binutils-common |
CVE-2018-20002 |
低危 |
2.31.1.4-1+dde |
|
binutils: memory leak in _bfd_generic_read_minisymbols function in syms.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20002
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-10 02:29 修改: 2023-11-07 02:56
|
binutils-common |
CVE-2018-20623 |
低危 |
2.31.1.4-1+dde |
|
binutils: Use-after-free in the error function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20623
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-12-31 19:29 修改: 2019-10-31 01:15
|
binutils-common |
CVE-2018-20651 |
低危 |
2.31.1.4-1+dde |
|
binutils: NULL pointer dereference in elf_link_add_object_symbols function resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20651
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-01 16:29 修改: 2023-11-07 02:56
|
binutils-common |
CVE-2018-20671 |
低危 |
2.31.1.4-1+dde |
|
binutils: Integer overflow in load_specific_debug_section function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20671
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-04 16:29 修改: 2023-11-07 02:56
|
binutils-common |
CVE-2018-20673 |
低危 |
2.31.1.4-1+dde |
|
libiberty: Integer overflow in demangle_template() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20673
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-04 18:29 修改: 2020-08-24 17:37
|
binutils-common |
CVE-2018-20712 |
低危 |
2.31.1.4-1+dde |
|
libiberty: heap-based buffer over-read in d_expression_1
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20712
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-01-15 00:29 修改: 2019-10-03 00:03
|
udev |
CVE-2013-4392 |
低危 |
241.26-1+dde |
|
systemd: TOCTOU race condition when updating file permissions and SELinux security contexts
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49
|
udev |
CVE-2019-20386 |
低危 |
241.26-1+dde |
|
systemd: memory leak in button_open() in login/logind-button.c when udev events are received
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20386
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2020-01-21 06:15 修改: 2023-11-07 03:09
|
udev |
CVE-2020-13529 |
低危 |
241.26-1+dde |
|
systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16
|
udev |
CVE-2023-31437 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can modify a seale ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
udev |
CVE-2023-31438 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can truncate a sea ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
udev |
CVE-2023-31439 |
低危 |
241.26-1+dde |
|
An issue was discovered in systemd 253. An attacker can modify the con ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16
|
binutils-common |
CVE-2018-9138 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack Exhaustion in the the C++ demangling functions provided by libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9138
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-03-30 08:29 修改: 2020-04-21 22:15
|
binutils-common |
CVE-2018-9996 |
低危 |
2.31.1.4-1+dde |
|
binutils: Stack-overflow in libiberty/cplus-dem.c causes crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-9996
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-04-10 22:29 修改: 2019-10-03 00:03
|
util-linux |
CVE-2022-0563 |
低危 |
2.33.1-0.1 |
|
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
binutils-common |
CVE-2019-1010180 |
低危 |
2.31.1.4-1+dde |
|
gdb: buffer overflow while opening an ELF for debugging leads to Dos, information dislosure and code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010180
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-24 13:15 修改: 2021-07-21 11:39
|
binutils-common |
CVE-2019-1010204 |
低危 |
2.31.1.4-1+dde |
|
binutils: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read in gold/fileread.cc and elfcpp/elfcpp_file.h leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010204
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-23 14:15 修改: 2023-11-07 03:02
|
uuid-dev |
CVE-2022-0563 |
低危 |
2.33.1-0.1 |
|
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
binutils-common |
CVE-2019-12972 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bounds read in setup_group in bfd/elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12972
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-06-26 14:15 修改: 2023-11-07 03:03
|
binutils-common |
CVE-2019-14250 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow in simple-object-elf.c leads to a heap-based buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14250
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-24 04:15 修改: 2023-03-01 18:01
|
binutils-common |
CVE-2019-14444 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow in function apply_relocation in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14444
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-07-30 13:15 修改: 2023-03-01 17:58
|
binutils-common |
CVE-2019-17450 |
低危 |
2.31.1.4-1+dde |
|
binutils: denial of service via crafted ELF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17450
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-10-10 17:15 修改: 2023-02-27 15:32
|
binutils-common |
CVE-2019-17451 |
低危 |
2.31.1.4-1+dde |
|
binutils: integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17451
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-10-10 17:15 修改: 2023-11-07 03:06
|
binutils-common |
CVE-2019-9070 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer over-read in function d_expression_1 in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9070
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17
|
libavcodec58 |
CVE-2020-20450 |
低危 |
7:4.1.8.1-1+dde |
|
FFmpeg 4.2 is affected by null pointer dereference passed as argument ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20450
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 19:38
|
libavcodec58 |
CVE-2020-20451 |
低危 |
7:4.1.8.1-1+dde |
|
Denial of Service issue in FFmpeg 4.2 due to resource management error ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20451
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-05-25 19:15 修改: 2021-11-30 21:59
|
libavcodec58 |
CVE-2020-20898 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_prewitt in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-20898
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-24 21:45
|
libavcodec58 |
CVE-2020-22038 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22038
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:36
|
libavcodec58 |
CVE-2020-22039 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22039
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libavcodec58 |
CVE-2020-22040 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 idue to a memor ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22040
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:35
|
libavcodec58 |
CVE-2020-22041 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22041
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 22:00
|
libavcodec58 |
CVE-2020-22042 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22042
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-11-30 18:54
|
libavcodec58 |
CVE-2020-22043 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22043
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 20:15 修改: 2021-06-07 15:33
|
libavcodec58 |
CVE-2020-22044 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22044
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-01 21:15 修改: 2021-11-30 22:00
|
libavcodec58 |
CVE-2020-22046 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22046
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libavcodec58 |
CVE-2020-22048 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22048
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 16:15 修改: 2021-11-30 22:00
|
libavcodec58 |
CVE-2020-22051 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22051
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 17:15 修改: 2023-11-07 03:19
|
libavcodec58 |
CVE-2020-22056 |
低危 |
7:4.1.8.1-1+dde |
|
A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-22056
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-06-02 18:15 修改: 2021-06-07 15:31
|
libavcodec58 |
CVE-2021-38090 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_roberts in libavfi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38090
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavcodec58 |
CVE-2021-38091 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter16_sobel in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38091
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavcodec58 |
CVE-2021-38092 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_prewitt in libavfilt ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38092
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:10
|
libavcodec58 |
CVE-2021-38093 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_robert in libavfilte ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38093
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
libavcodec58 |
CVE-2021-38094 |
低危 |
7:4.1.8.1-1+dde |
|
Integer Overflow vulnerability in function filter_sobel in libavfilter ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38094
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-09-20 16:15 修改: 2021-09-23 15:09
|
binutils-common |
CVE-2019-9071 |
低危 |
2.31.1.4-1+dde |
|
binutils: stack consumption in function d_count_templates_scopes in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9071
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 19:32
|
binutils-common |
CVE-2019-9073 |
低危 |
2.31.1.4-1+dde |
|
binutils: excessive memory allocation in function _bfd_elf_slurp_version_tables in elf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9073
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:09
|
wpasupplicant |
CVE-2017-13084 |
低危 |
2:2.7.5-1+dde |
|
wpa_supplicant: reinstallation of the STK key in the PeerKey handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13084
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-10-17 13:29 修改: 2019-10-03 00:03
|
wpasupplicant |
CVE-2019-5061 |
低危 |
2:2.7.5-1+dde |
|
An exploitable denial-of-service vulnerability exists in the hostapd 2 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5061
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-12-12 22:15 修改: 2022-06-17 13:27
|
wpasupplicant |
CVE-2019-5062 |
低危 |
2:2.7.5-1+dde |
|
An exploitable denial-of-service vulnerability exists in the 802.11w s ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5062
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2019-12-12 22:15 修改: 2022-06-17 13:27
|
wpasupplicant |
CVE-2021-30004 |
低危 |
2:2.7.5-1+dde |
|
wpa_supplicant: mishandled AlgorithmIdentifier parameters may lead to forging attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30004
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2021-04-02 05:15 修改: 2023-09-30 11:15
|
xdg-user-dirs |
CVE-2017-15131 |
低危 |
0.17-2 |
|
gnome-session: Xsession creation of XDG user directories does not honor system umask policy
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15131
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2018-01-09 21:29 修改: 2023-02-12 23:28
|
binutils-common |
CVE-2019-9074 |
低危 |
2.31.1.4-1+dde |
|
binutils: out-of-bound read in function bfd_getl32 in libbfd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9074
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:11
|
binutils-common |
CVE-2019-9075 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in function _bfd_archive_64_bit_slurp_armap in archive64.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9075
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2021-12-10 20:19
|
binutils-common |
CVE-2019-9077 |
低危 |
2.31.1.4-1+dde |
|
binutils: heap-based buffer overflow in function process_mips_specific in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9077
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 2019-02-24 00:29 修改: 2023-08-16 14:17
|
libjavascriptcoregtk-4.0-18 |
CVE-2022-2294 |
低危 |
2.32.4.1-1~deb10u1.1 |
2.36.6-1~deb10u1 |
Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.11 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2294
镜像层: sha256:6ace211c9aa36ad5ca03de970671beb90221aa08f4b4f845d253130828626555
发布日期: 2022-07-28 02:15 修改: 2024-06-28 14:08
|
libjbig0 |
CVE-2017-9937 |
低危 |
2.1.1-1+rebuild |
|
libtiff: memory malloc failure in tif_jbig.c could cause DOS.
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9937
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2017-06-26 12:29 修改: 2023-11-07 02:50
|
libfreeimage3 |
CVE-2024-28567 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28567
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-02 19:35
|
libfreeimage3 |
CVE-2024-28568 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28568
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-02 19:35
|
libpostproc55 |
CVE-2024-32228 |
未知 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a SEGV at libavc ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32228
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-07-03 01:55
|
libvlccore9 |
CVE-2024-46461 |
未知 |
3.0.11.2-1 |
|
VLC media player 3.0.20 and earlier is vulnerable to denial of service ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46461
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-09-25 15:15 修改: 2024-09-26 13:32
|
libvlccore9 |
DSA-5165-1 |
未知 |
3.0.11.2-1 |
3.0.17.4-0+deb10u1 |
vlc - security update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
tzdata |
DLA-3788-1 |
未知 |
2021a.1-0+deb10u1 |
2024a-0+deb10u1 |
tzdata - new timezone database
漏洞详情:
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libvlccore9 |
TEMP-0000000-BCCC32 |
未知 |
3.0.11.2-1 |
3.0.17.4-0+deb10u1 |
[vlc issues fixed in 3.0.13]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0000000-BCCC32
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libpostproc55 |
DLA-3178-1 |
未知 |
7:4.1.8.1-1+dde |
7:4.1.10-0+deb10u1 |
ffmpeg - security update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libfreeimage3 |
CVE-2024-28569 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28569
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-05 19:35
|
libfreeimage3 |
CVE-2024-28570 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28570
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-02 17:35
|
libfreeimage3 |
CVE-2024-28571 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28571
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-03-20 13:00
|
libfreeimage3 |
CVE-2024-28572 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28572
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-05 19:35
|
libfreeimage3 |
CVE-2024-28573 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28573
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-02 19:35
|
man-db |
DLA-3731-1 |
未知 |
2.8.5-2 |
2.8.5-2+deb10u1 |
man-db - sandboxing fixes
漏洞详情:
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libfreeimage3 |
CVE-2024-28574 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28574
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-02 19:35
|
libfreeimage3 |
CVE-2024-28575 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28575
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-02 19:35
|
libfreeimage3 |
CVE-2024-28576 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28576
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-05 19:35
|
libfreeimage3 |
CVE-2024-28577 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Null Pointer Dereference vulnerability in open source FreeImage v.3.19 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28577
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-02 17:35
|
libswscale5 |
CVE-2024-32228 |
未知 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a SEGV at libavc ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32228
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-07-03 01:55
|
libswscale5 |
DLA-3178-1 |
未知 |
7:4.1.8.1-1+dde |
7:4.1.10-0+deb10u1 |
ffmpeg - security update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libfreeimage3 |
CVE-2024-28578 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28578
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-05 20:35
|
libfreeimage3 |
CVE-2024-28579 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28579
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-05 19:35
|
libfreeimage3 |
CVE-2024-28580 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28580
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-02 19:35
|
libfreeimage3 |
CVE-2024-28581 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28581
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-02 19:35
|
libfreeimage3 |
CVE-2024-28582 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28582
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-02 19:35
|
libfreeimage3 |
CVE-2024-28583 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28583
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-05 18:35
|
libfreeimage3 |
CVE-2024-28584 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Null Pointer Dereference vulnerability in open source FreeImage v.3.19 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28584
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-15 16:35
|
libopenexr23 |
CVE-2024-31047 |
未知 |
2.2.1.4-1 |
|
An issue in Academy Software Foundation openexr v.3.2.3 and before all ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31047
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-04-08 23:15 修改: 2024-08-01 13:50
|
libfreeimage3 |
CVE-2024-9029 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
A flaw was found in the freeimage library. Processing a crafted image ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9029
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-09-27 07:15 修改: 2024-09-30 12:46
|
bzip2 |
DLA-3112-1 |
未知 |
1.0.6-9.2~deb10u1 |
1.0.6-9.2~deb10u2 |
bzip2 - bugfix update
漏洞详情:
镜像层: sha256:a607a4c96d508a95a0a32d77c71bf957c1d4143efb4ab6d13a191e73b1ed7c1d
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
distro-info-data |
DLA-3171-1 |
未知 |
0.41+deb10u3 |
0.41+deb10u6 |
distro-info-data - database update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libavcodec58 |
CVE-2024-32228 |
未知 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a SEGV at libavc ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32228
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-07-03 01:55
|
libavcodec58 |
DLA-3178-1 |
未知 |
7:4.1.8.1-1+dde |
7:4.1.10-0+deb10u1 |
ffmpeg - security update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
vlc-data |
CVE-2024-46461 |
未知 |
3.0.11.2-1 |
|
VLC media player 3.0.20 and earlier is vulnerable to denial of service ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46461
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-09-25 15:15 修改: 2024-09-26 13:32
|
vlc-data |
DSA-5165-1 |
未知 |
3.0.11.2-1 |
3.0.17.4-0+deb10u1 |
vlc - security update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
vlc-data |
TEMP-0000000-BCCC32 |
未知 |
3.0.11.2-1 |
3.0.17.4-0+deb10u1 |
[vlc issues fixed in 3.0.13]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0000000-BCCC32
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libswresample3 |
CVE-2024-32228 |
未知 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a SEGV at libavc ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32228
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-07-03 01:55
|
libswresample3 |
DLA-3178-1 |
未知 |
7:4.1.8.1-1+dde |
7:4.1.10-0+deb10u1 |
ffmpeg - security update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libexpat1 |
DSA-5085-2 |
未知 |
2.2.6-2+deb10u1 |
2.2.6-2+deb10u4 |
expat - regression update
漏洞详情:
镜像层: sha256:03d94c8ec56bff66ff29b27a4ac9db836e3cc95f9de86fa42ff091be45ffc102
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libavresample4 |
CVE-2024-32228 |
未知 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a SEGV at libavc ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32228
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-07-03 01:55
|
libcrypto++6 |
CVE-2024-28285 |
未知 |
5.6.4-8 |
|
A Fault Injection vulnerability in the SymmetricDecrypt function in cr ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28285
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-05-14 15:14 修改: 2024-08-29 20:36
|
libbluray2 |
DLA-3159-1 |
未知 |
1:1.1.0-1 |
1:1.1.0-1+deb10u1 |
libbluray - bugfix update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libbz2-1.0 |
DLA-3112-1 |
未知 |
1.0.6-9.2~deb10u1 |
1.0.6-9.2~deb10u2 |
bzip2 - bugfix update
漏洞详情:
镜像层: sha256:2b9a7b26cc9ca3174da8a61f99294bcba084c65268680a5f12561e9bb8817bfe
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libbz2-dev |
DLA-3112-1 |
未知 |
1.0.6-9.2~deb10u1 |
1.0.6-9.2~deb10u2 |
bzip2 - bugfix update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
vlc-plugin-base |
CVE-2024-46461 |
未知 |
3.0.11.2-1 |
|
VLC media player 3.0.20 and earlier is vulnerable to denial of service ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46461
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-09-25 15:15 修改: 2024-09-26 13:32
|
vlc-plugin-base |
DSA-5165-1 |
未知 |
3.0.11.2-1 |
3.0.17.4-0+deb10u1 |
vlc - security update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
vlc-plugin-base |
TEMP-0000000-BCCC32 |
未知 |
3.0.11.2-1 |
3.0.17.4-0+deb10u1 |
[vlc issues fixed in 3.0.13]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0000000-BCCC32
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libavresample4 |
DLA-3178-1 |
未知 |
7:4.1.8.1-1+dde |
7:4.1.10-0+deb10u1 |
ffmpeg - security update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libavformat58 |
CVE-2024-32228 |
未知 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a SEGV at libavc ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32228
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-07-03 01:55
|
libavformat58 |
DLA-3178-1 |
未知 |
7:4.1.8.1-1+dde |
7:4.1.10-0+deb10u1 |
ffmpeg - security update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
distro-info-data |
DLA-3411-1 |
未知 |
0.41+deb10u3 |
0.41+deb10u7 |
distro-info-data - database update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
distro-info-data |
DLA-3639-1 |
未知 |
0.41+deb10u3 |
0.41+deb10u8 |
distro-info-data - database update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libavdevice58 |
CVE-2024-32228 |
未知 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a SEGV at libavc ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32228
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-07-03 01:55
|
libmpv1 |
TEMP-0950816-47D88A |
未知 |
0.29.1.34-1+eagle |
|
[mpv insecure lua loadpath]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0950816-47D88A
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libavdevice58 |
DLA-3178-1 |
未知 |
7:4.1.8.1-1+dde |
7:4.1.10-0+deb10u1 |
ffmpeg - security update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
vlc-plugin-video-output |
CVE-2024-46461 |
未知 |
3.0.11.2-1 |
|
VLC media player 3.0.20 and earlier is vulnerable to denial of service ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46461
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-09-25 15:15 修改: 2024-09-26 13:32
|
vlc-plugin-video-output |
DSA-5165-1 |
未知 |
3.0.11.2-1 |
3.0.17.4-0+deb10u1 |
vlc - security update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
vlc-plugin-video-output |
TEMP-0000000-BCCC32 |
未知 |
3.0.11.2-1 |
3.0.17.4-0+deb10u1 |
[vlc issues fixed in 3.0.13]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0000000-BCCC32
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
distro-info-data |
DLA-3806-1 |
未知 |
0.41+deb10u3 |
0.41+deb10u9 |
distro-info-data - database update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libavutil56 |
CVE-2024-32228 |
未知 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a SEGV at libavc ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32228
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-07-03 01:55
|
libavutil56 |
DLA-3178-1 |
未知 |
7:4.1.8.1-1+dde |
7:4.1.10-0+deb10u1 |
ffmpeg - security update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libavfilter7 |
CVE-2024-32228 |
未知 |
7:4.1.8.1-1+dde |
|
FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a SEGV at libavc ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32228
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-07-01 21:15 修改: 2024-07-03 01:55
|
libavfilter7 |
DLA-3178-1 |
未知 |
7:4.1.8.1-1+dde |
7:4.1.10-0+deb10u1 |
ffmpeg - security update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libvlc5 |
CVE-2024-46461 |
未知 |
3.0.11.2-1 |
|
VLC media player 3.0.20 and earlier is vulnerable to denial of service ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46461
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 2024-09-25 15:15 修改: 2024-09-26 13:32
|
libvlc5 |
DSA-5165-1 |
未知 |
3.0.11.2-1 |
3.0.17.4-0+deb10u1 |
vlc - security update
漏洞详情:
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libvlc5 |
TEMP-0000000-BCCC32 |
未知 |
3.0.11.2-1 |
3.0.17.4-0+deb10u1 |
[vlc issues fixed in 3.0.13]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0000000-BCCC32
镜像层: sha256:be2a4e591b801d4a2bf1c1f932979aaec812ad2bf227faaa831122c5a92a940a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libfreeimage3 |
CVE-2024-28562 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28562
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-07-03 01:51
|
libfreeimage3 |
CVE-2024-28563 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28563
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-07-03 01:51
|
libfreeimage3 |
CVE-2024-28564 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28564
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-05-01 18:15
|
libfreeimage3 |
CVE-2024-28565 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28565
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-05-01 18:15
|
libfreeimage3 |
CVE-2024-28566 |
未知 |
3.18.0+ds2-1+deb10u1 |
|
Buffer Overflow vulnerability in open source FreeImage v.3.19.0 [r1909 ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28566
镜像层: sha256:132b3f7f2894d92fbac60becc0dad3f6e04fbba69bacee1bdb5c39605c5332b1
发布日期: 2024-03-20 06:15 修改: 2024-08-02 19:35
|