| glibc | CVE-2024-2961 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.1 | glibc: Out of bounds write in iconv may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | glibc | CVE-2024-33599 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.2 | glibc: stack-based buffer overflow in netgroup cache 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | glibc | CVE-2024-33600 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.2 | glibc: null pointer dereferences after failed netgroup cache insertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | glibc | CVE-2024-33601 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.2 | glibc: netgroup cache may terminate daemon on memory allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | glibc | CVE-2024-33602 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.2 | glibc: netgroup cache assumes NSS callback uses in-buffer strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | glibc-common | CVE-2024-2961 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.1 | glibc: Out of bounds write in iconv may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | glibc-common | CVE-2024-33599 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.2 | glibc: stack-based buffer overflow in netgroup cache 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | glibc-common | CVE-2024-33600 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.2 | glibc: null pointer dereferences after failed netgroup cache insertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | glibc-common | CVE-2024-33601 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.2 | glibc: netgroup cache may terminate daemon on memory allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | glibc-common | CVE-2024-33602 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.2 | glibc: netgroup cache assumes NSS callback uses in-buffer strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | glibc-minimal-langpack | CVE-2024-2961 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.1 | glibc: Out of bounds write in iconv may lead to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | glibc-minimal-langpack | CVE-2024-33599 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.2 | glibc: stack-based buffer overflow in netgroup cache 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | glibc-minimal-langpack | CVE-2024-33600 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.2 | glibc: null pointer dereferences after failed netgroup cache insertion 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | glibc-minimal-langpack | CVE-2024-33601 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.2 | glibc: netgroup cache may terminate daemon on memory allocation failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | glibc-minimal-langpack | CVE-2024-33602 | 高危 | 2.28-236.0.1.el8.7 | 2.28-251.0.2.el8_10.2 | glibc: netgroup cache assumes NSS callback uses in-buffer strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15 | 
                            
                            
                                | libgcrypt | CVE-2021-40528 | 高危 | 1.8.5-7.el8_6 | 10:1.8.5-7.el8_6_fips | libgcrypt: ElGamal implementation allows plaintext recovery 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40528 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2021-09-06 19:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | python39 | CVE-2023-6597 | 高危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.19-1.module+el8.10.0+90341+71ca88f4 | python: Path traversal on tempfile.TemporaryDirectory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python39 | CVE-2024-6345 | 高危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.19-7.module+el8.10.0+90395+b6c4aad1 | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | python39-libs | CVE-2023-6597 | 高危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.19-1.module+el8.10.0+90341+71ca88f4 | python: Path traversal on tempfile.TemporaryDirectory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python39-libs | CVE-2024-6345 | 高危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.19-7.module+el8.10.0+90395+b6c4aad1 | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | python39-pip | CVE-2023-6597 | 高危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python: Path traversal on tempfile.TemporaryDirectory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python39-pip | CVE-2024-6345 | 高危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | python39-pip-wheel | CVE-2023-6597 | 高危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python: Path traversal on tempfile.TemporaryDirectory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python39-pip-wheel | CVE-2024-6345 | 高危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | python39-setuptools | CVE-2023-6597 | 高危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-5.module+el8.10.0+90269+2fa22b99 | python: Path traversal on tempfile.TemporaryDirectory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python39-setuptools | CVE-2024-6345 | 高危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-6.module+el8.10.0+90395+b6c4aad1 | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | python39-setuptools-wheel | CVE-2023-6597 | 高危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-5.module+el8.10.0+90269+2fa22b99 | python: Path traversal on tempfile.TemporaryDirectory 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python39-setuptools-wheel | CVE-2024-6345 | 高危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-6.module+el8.10.0+90395+b6c4aad1 | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | gnutls | CVE-2024-0553 | 中危 | 3.6.16-7.el8 | 10:3.6.16-8.el8_9.1_fips | gnutls: incomplete fix for CVE-2023-5981 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0553 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-01-16 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | gnutls | CVE-2024-28834 | 中危 | 3.6.16-7.el8 | 10:3.6.16-8.el8_9.3_fips | gnutls: vulnerable to Minerva side-channel information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28834 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-03-21 14:15 修改: 2024-09-12 20:15 | 
                            
                            
                                | krb5-libs | CVE-2024-37370 | 中危 | 1.18.2-26.0.1.el8_9 | 1.18.2-29.0.1.el8_10 | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48 | 
                            
                            
                                | krb5-libs | CVE-2024-37371 | 中危 | 1.18.2-26.0.1.el8_9 | 1.18.2-29.0.1.el8_10 | krb5: GSS message token handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39 | 
                            
                            
                                | libcurl | CVE-2023-28322 | 中危 | 7.61.1-33.el8 | 7.61.1-33.el8_9.5 | curl: more POST-after-PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15 | 
                            
                            
                                | libcurl | CVE-2023-38546 | 中危 | 7.61.1-33.el8 | 7.61.1-33.el8_9.5 | curl: cookie injection with none file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15 | 
                            
                            
                                | libcurl | CVE-2023-46218 | 中危 | 7.61.1-33.el8 | 7.61.1-33.el8_9.5 | curl: information disclosure by exploiting a mixed case flaw 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15 | 
                            
                            
                                | libcurl | CVE-2024-2398 | 中危 | 7.61.1-33.el8 | 7.61.1-34.el8_10.2 | curl: HTTP/2 push headers memory-leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15 | 
                            
                            
                                | expat | CVE-2024-45492 | 中危 | 2.2.5-11.0.1.el8 | 2.2.5-15.0.1.el8_10 | libexpat: integer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28 | 
                            
                            
                                | libgcrypt | CVE-2021-33560 | 中危 | 1.8.5-7.el8_6 | 10:1.8.5-6.el8_fips | libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33560 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2021-06-08 11:15 修改: 2023-11-07 03:35 | 
                            
                            
                                | libnghttp2 | CVE-2024-28182 | 中危 | 1.33.0-5.el8_9 | 1.33.0-6.el8_10.1 | nghttp2: CONTINUATION frames DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28182 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-04-04 15:15 修改: 2024-05-01 18:15 | 
                            
                            
                                | libssh | CVE-2023-48795 | 中危 | 0.9.6-10.el8_8 | 0.9.6-13.el8_9 | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48795 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-12-18 16:15 修改: 2024-05-01 18:15 | 
                            
                            
                                | libssh-config | CVE-2023-48795 | 中危 | 0.9.6-10.el8_8 | 0.9.6-13.el8_9 | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48795 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-12-18 16:15 修改: 2024-05-01 18:15 | 
                            
                            
                                | libxml2 | CVE-2023-39615 | 中危 | 2.9.7-16.el8_8.1 | 2.9.7-18.el8_9 | libxml2: crafted xml can cause global buffer overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39615 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-08-29 17:15 修改: 2024-08-02 19:15 | 
                            
                            
                                | libxml2 | CVE-2024-25062 | 中危 | 2.9.7-16.el8_8.1 | 2.9.7-18.el8_10.1 | libxml2: use-after-free in XMLReader 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25062 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-02-04 16:15 修改: 2024-02-13 00:40 | 
                            
                            
                                | curl | CVE-2023-28322 | 中危 | 7.61.1-33.el8 | 7.61.1-33.el8_9.5 | curl: more POST-after-PUT confusion 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15 | 
                            
                            
                                | curl | CVE-2023-38546 | 中危 | 7.61.1-33.el8 | 7.61.1-33.el8_9.5 | curl: cookie injection with none file 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15 | 
                            
                            
                                | python39 | CVE-2022-40897 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.18-3.module+el8.10.0+90269+2fa22b99 | pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40897 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2022-12-23 00:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | python39 | CVE-2023-23931 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.18-3.module+el8.10.0+90269+2fa22b99 | python-cryptography: memory corruption via immutable objects 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23931 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-02-07 21:15 修改: 2024-09-05 16:09 | 
                            
                            
                                | python39 | CVE-2023-27043 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.18-3.module+el8.10.0+90269+2fa22b99 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python39 | CVE-2023-43804 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.18-3.module+el8.10.0+90269+2fa22b99 | python-urllib3: Cookie request header isn't stripped during cross-origin redirects 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43804 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-10-04 17:15 修改: 2024-02-01 00:55 | 
                            
                            
                                | python39 | CVE-2024-0450 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.19-1.module+el8.10.0+90341+71ca88f4 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python39 | CVE-2024-3651 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.19-1.module+el8.10.0+90341+71ca88f4 | python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-07-07 18:15 修改: 2024-07-11 14:58 | 
                            
                            
                                | python39 | CVE-2024-4032 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.19-7.module+el8.10.0+90395+b6c4aad1 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | python39 | CVE-2024-6232 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.20-1.module+el8.10.0+90419+54594e05 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python39 | CVE-2024-6923 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.19-7.module+el8.10.0+90395+b6c4aad1 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python39 | CVE-2024-8088 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.19-7.module+el8.10.0+90395+b6c4aad1 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | curl | CVE-2023-46218 | 中危 | 7.61.1-33.el8 | 7.61.1-33.el8_9.5 | curl: information disclosure by exploiting a mixed case flaw 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15 | 
                            
                            
                                | curl | CVE-2024-2398 | 中危 | 7.61.1-33.el8 | 7.61.1-34.el8_10.2 | curl: HTTP/2 push headers memory-leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15 | 
                            
                            
                                | python39-libs | CVE-2022-40897 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.18-3.module+el8.10.0+90269+2fa22b99 | pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40897 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2022-12-23 00:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | python39-libs | CVE-2023-23931 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.18-3.module+el8.10.0+90269+2fa22b99 | python-cryptography: memory corruption via immutable objects 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23931 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-02-07 21:15 修改: 2024-09-05 16:09 | 
                            
                            
                                | python39-libs | CVE-2023-27043 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.18-3.module+el8.10.0+90269+2fa22b99 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python39-libs | CVE-2023-43804 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.18-3.module+el8.10.0+90269+2fa22b99 | python-urllib3: Cookie request header isn't stripped during cross-origin redirects 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43804 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-10-04 17:15 修改: 2024-02-01 00:55 | 
                            
                            
                                | python39-libs | CVE-2024-0450 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.19-1.module+el8.10.0+90341+71ca88f4 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python39-libs | CVE-2024-3651 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.19-1.module+el8.10.0+90341+71ca88f4 | python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-07-07 18:15 修改: 2024-07-11 14:58 | 
                            
                            
                                | python39-libs | CVE-2024-4032 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.19-7.module+el8.10.0+90395+b6c4aad1 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | python39-libs | CVE-2024-6232 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.20-1.module+el8.10.0+90419+54594e05 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python39-libs | CVE-2024-6923 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.19-7.module+el8.10.0+90395+b6c4aad1 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python39-libs | CVE-2024-8088 | 中危 | 3.9.18-1.module+el8.9.0+90071+8dc52a4f | 3.9.19-7.module+el8.10.0+90395+b6c4aad1 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | expat | CVE-2023-52425 | 中危 | 2.2.5-11.0.1.el8 | 2.2.5-11.0.1.el8_9.1 | expat: parsing large tokens can trigger a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-02-04 20:15 修改: 2024-08-26 20:35 | 
                            
                            
                                | expat | CVE-2024-45490 | 中危 | 2.2.5-11.0.1.el8 | 2.2.5-15.0.1.el8_10 | libexpat: Negative Length Parsing Vulnerability in libexpat 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24 | 
                            
                            
                                | python39-pip | CVE-2022-40897 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40897 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2022-12-23 00:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | python39-pip | CVE-2023-23931 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python-cryptography: memory corruption via immutable objects 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23931 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-02-07 21:15 修改: 2024-09-05 16:09 | 
                            
                            
                                | python39-pip | CVE-2023-27043 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python39-pip | CVE-2023-43804 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python-urllib3: Cookie request header isn't stripped during cross-origin redirects 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43804 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-10-04 17:15 修改: 2024-02-01 00:55 | 
                            
                            
                                | python39-pip | CVE-2024-0450 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python39-pip | CVE-2024-3651 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-07-07 18:15 修改: 2024-07-11 14:58 | 
                            
                            
                                | python39-pip | CVE-2024-4032 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | python39-pip | CVE-2024-6232 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python39-pip | CVE-2024-6923 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python39-pip | CVE-2024-8088 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | expat | CVE-2024-45491 | 中危 | 2.2.5-11.0.1.el8 | 2.2.5-15.0.1.el8_10 | libexpat: Integer Overflow or Wraparound 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28 | 
                            
                            
                                | gmp | CVE-2021-43618 | 中危 | 1:6.1.2-10.el8 | 1:6.1.2-11.el8 | gmp: Integer overflow and resultant buffer overflow via crafted input 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43618 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2021-11-15 04:15 修改: 2023-09-29 15:15 | 
                            
                            
                                | python39-pip-wheel | CVE-2022-40897 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40897 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2022-12-23 00:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | python39-pip-wheel | CVE-2023-23931 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python-cryptography: memory corruption via immutable objects 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23931 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-02-07 21:15 修改: 2024-09-05 16:09 | 
                            
                            
                                | python39-pip-wheel | CVE-2023-27043 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python39-pip-wheel | CVE-2023-43804 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python-urllib3: Cookie request header isn't stripped during cross-origin redirects 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43804 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-10-04 17:15 修改: 2024-02-01 00:55 | 
                            
                            
                                | python39-pip-wheel | CVE-2024-0450 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python39-pip-wheel | CVE-2024-3651 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-07-07 18:15 修改: 2024-07-11 14:58 | 
                            
                            
                                | python39-pip-wheel | CVE-2024-4032 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | python39-pip-wheel | CVE-2024-6232 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python39-pip-wheel | CVE-2024-6923 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python39-pip-wheel | CVE-2024-8088 | 中危 | 20.2.4-8.module+el8.9.0+90016+9c2d6573 | 20.2.4-9.module+el8.10.0+90269+2fa22b99 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | gnutls | CVE-2021-20231 | 中危 | 3.6.16-7.el8 | 10:3.6.16-4.0.1.el8_fips | gnutls: Use after free in client key_share extension 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20231 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2021-03-12 19:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | gnutls | CVE-2021-20232 | 中危 | 3.6.16-7.el8 | 10:3.6.16-4.0.1.el8_fips | gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20232 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2021-03-12 19:15 修改: 2023-11-07 03:29 | 
                            
                            
                                | python39-setuptools | CVE-2022-40897 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-5.module+el8.10.0+90269+2fa22b99 | pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40897 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2022-12-23 00:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | python39-setuptools | CVE-2023-23931 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-5.module+el8.10.0+90269+2fa22b99 | python-cryptography: memory corruption via immutable objects 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23931 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-02-07 21:15 修改: 2024-09-05 16:09 | 
                            
                            
                                | python39-setuptools | CVE-2023-27043 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-5.module+el8.10.0+90269+2fa22b99 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python39-setuptools | CVE-2023-43804 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-5.module+el8.10.0+90269+2fa22b99 | python-urllib3: Cookie request header isn't stripped during cross-origin redirects 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43804 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-10-04 17:15 修改: 2024-02-01 00:55 | 
                            
                            
                                | python39-setuptools | CVE-2024-0450 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-5.module+el8.10.0+90269+2fa22b99 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python39-setuptools | CVE-2024-3651 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-5.module+el8.10.0+90269+2fa22b99 | python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-07-07 18:15 修改: 2024-07-11 14:58 | 
                            
                            
                                | python39-setuptools | CVE-2024-4032 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-6.module+el8.10.0+90395+b6c4aad1 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | python39-setuptools | CVE-2024-6232 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-6.module+el8.10.0+90395+b6c4aad1 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python39-setuptools | CVE-2024-6923 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-6.module+el8.10.0+90395+b6c4aad1 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python39-setuptools | CVE-2024-8088 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-6.module+el8.10.0+90395+b6c4aad1 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | gnutls | CVE-2021-3580 | 中危 | 3.6.16-7.el8 | 10:3.6.16-4.0.1.el8_fips | nettle: Remote crash in RSA decryption via manipulated ciphertext 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3580 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2021-08-05 21:15 修改: 2024-01-16 15:15 | 
                            
                            
                                | gnutls | CVE-2023-5981 | 中危 | 3.6.16-7.el8 | 3.6.16-8.el8_9 | gnutls: timing side-channel in the RSA-PSK authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-11-28 12:15 修改: 2024-09-16 13:15 | 
                            
                            
                                | python39-setuptools-wheel | CVE-2022-40897 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-5.module+el8.10.0+90269+2fa22b99 | pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40897 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2022-12-23 00:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | python39-setuptools-wheel | CVE-2023-23931 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-5.module+el8.10.0+90269+2fa22b99 | python-cryptography: memory corruption via immutable objects 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23931 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-02-07 21:15 修改: 2024-09-05 16:09 | 
                            
                            
                                | python39-setuptools-wheel | CVE-2023-27043 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-5.module+el8.10.0+90269+2fa22b99 | python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27 | 
                            
                            
                                | python39-setuptools-wheel | CVE-2023-43804 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-5.module+el8.10.0+90269+2fa22b99 | python-urllib3: Cookie request header isn't stripped during cross-origin redirects 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43804 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2023-10-04 17:15 修改: 2024-02-01 00:55 | 
                            
                            
                                | python39-setuptools-wheel | CVE-2024-0450 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-5.module+el8.10.0+90269+2fa22b99 | python: The zipfile module is vulnerable to zip-bombs leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | python39-setuptools-wheel | CVE-2024-3651 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-5.module+el8.10.0+90269+2fa22b99 | python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-07-07 18:15 修改: 2024-07-11 14:58 | 
                            
                            
                                | python39-setuptools-wheel | CVE-2024-4032 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-6.module+el8.10.0+90395+b6c4aad1 | python: incorrect IPv4 and IPv6 private ranges 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35 | 
                            
                            
                                | python39-setuptools-wheel | CVE-2024-6232 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-6.module+el8.10.0+90395+b6c4aad1 | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python39-setuptools-wheel | CVE-2024-6923 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-6.module+el8.10.0+90395+b6c4aad1 | cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15 | 
                            
                            
                                | python39-setuptools-wheel | CVE-2024-8088 | 中危 | 50.3.2-4.module+el8.9.0+90016+9c2d6573 | 50.3.2-6.module+el8.10.0+90395+b6c4aad1 | python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088 镜像层: sha256:2df70ea252590bf421400d7b687ec1d7dfd664f0f33051300d424bddf3a156f2 发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15 | 
                            
                            
                                | rpm | CVE-2021-35937 | 中危 | 4.14.3-26.el8 | 4.14.3-28.0.2.el8_9 | rpm: TOCTOU race in checks for unsafe symlinks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35937 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2022-08-25 20:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | rpm | CVE-2021-35938 | 中危 | 4.14.3-26.el8 | 4.14.3-28.0.2.el8_9 | rpm: races with chown/chmod/capabilities calls during installation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35938 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2022-08-25 20:15 修改: 2022-11-29 18:06 | 
                            
                            
                                | rpm | CVE-2021-35939 | 中危 | 4.14.3-26.el8 | 4.14.3-28.0.2.el8_9 | rpm: checks for unsafe symlinks are not performed for intermediary directories 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35939 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2022-08-26 16:15 修改: 2023-02-04 01:16 | 
                            
                            
                                | rpm-libs | CVE-2021-35937 | 中危 | 4.14.3-26.el8 | 4.14.3-28.0.2.el8_9 | rpm: TOCTOU race in checks for unsafe symlinks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35937 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2022-08-25 20:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | rpm-libs | CVE-2021-35938 | 中危 | 4.14.3-26.el8 | 4.14.3-28.0.2.el8_9 | rpm: races with chown/chmod/capabilities calls during installation 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35938 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2022-08-25 20:15 修改: 2022-11-29 18:06 | 
                            
                            
                                | rpm-libs | CVE-2021-35939 | 中危 | 4.14.3-26.el8 | 4.14.3-28.0.2.el8_9 | rpm: checks for unsafe symlinks are not performed for intermediary directories 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35939 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2022-08-26 16:15 修改: 2023-02-04 01:16 | 
                            
                            
                                | sqlite-libs | CVE-2023-7104 | 中危 | 3.26.0-18.0.1.el8_8 | 3.26.0-19.0.1.el8_9 | sqlite: heap-buffer-overflow at sessionfuzz 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7104 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-12-29 10:15 修改: 2024-05-17 02:34 | 
                            
                            
                                | systemd-libs | CVE-2023-7008 | 中危 | 239-78.0.3.el8 | 239-82.0.1.el8 | systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-12-23 13:15 修改: 2024-09-16 17:16 | 
                            
                            
                                | openssl-libs | CVE-2024-5535 | 低危 | 1:1.1.1k-12.el8_9 | 1:1.1.1k-14.el8_6 | openssl: SSL_select_next_proto buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15 | 
                            
                            
                                | libssh | CVE-2023-6918 | 低危 | 0.9.6-10.el8_8 | 0.9.6-14.el8 | libssh: Missing checks for return values for digests 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6918 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-12-19 00:15 修改: 2024-09-16 18:15 | 
                            
                            
                                | krb5-libs | CVE-2024-26458 | 低危 | 1.18.2-26.0.1.el8_9 | 1.18.2-27.0.1.el8_10 | krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09 | 
                            
                            
                                | libssh-config | CVE-2023-6004 | 低危 | 0.9.6-10.el8_8 | 0.9.6-14.el8 | libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6004 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-01-03 17:15 修改: 2024-09-16 18:15 | 
                            
                            
                                | libssh-config | CVE-2023-6918 | 低危 | 0.9.6-10.el8_8 | 0.9.6-14.el8 | libssh: Missing checks for return values for digests 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6918 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-12-19 00:15 修改: 2024-09-16 18:15 | 
                            
                            
                                | krb5-libs | CVE-2024-26461 | 低危 | 1.18.2-26.0.1.el8_9 | 1.18.2-27.0.1.el8_10 | krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35 | 
                            
                            
                                | libssh | CVE-2023-6004 | 低危 | 0.9.6-10.el8_8 | 0.9.6-14.el8 | libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6004 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2024-01-03 17:15 修改: 2024-09-16 18:15 | 
                            
                            
                                | openldap | CVE-2023-2953 | 低危 | 2.4.46-18.el8 | 2.4.46-19.el8_10 | openldap: null pointer dereference in  ber_memalloc_x  function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2953 镜像层: sha256:d87ce14fed78c12cd6582ed0a1b4b03e2e01b14283b906f2d187dd9f020275bf 发布日期: 2023-05-30 22:15 修改: 2023-08-02 16:46 | 
                            
                            
                                | openssl | CVE-2024-5535 | 低危 | 1:1.1.1k-12.el8_9 | 1:1.1.1k-14.el8_6 | openssl: SSL_select_next_proto buffer overread 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535 镜像层: sha256:73667b4c596210b439a9a4a174e26c0e4312772a4945bd8a74e60c0428642da5 发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15 |