apache2 |
CVE-2022-22720 |
严重 |
2.4.52-r0 |
2.4.53-r0 |
httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22720
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-03-14 11:15 修改: 2023-11-07 03:43
|
apache2 |
CVE-2022-22721 |
严重 |
2.4.52-r0 |
2.4.53-r0 |
httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22721
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-03-14 11:15 修改: 2023-11-07 03:43
|
apache2 |
CVE-2022-23943 |
严重 |
2.4.52-r0 |
2.4.53-r0 |
httpd: mod_sed: Read/write beyond bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23943
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-03-14 11:15 修改: 2023-11-07 03:44
|
apache2 |
CVE-2022-28615 |
严重 |
2.4.52-r0 |
2.4.54-r0 |
httpd: Out-of-bounds read in ap_strcmp_match()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28615
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2023-11-07 03:45
|
apache2 |
CVE-2022-31813 |
严重 |
2.4.52-r0 |
2.4.54-r0 |
httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31813
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2023-11-07 03:47
|
apache2 |
CVE-2022-36760 |
严重 |
2.4.52-r0 |
2.4.55-r0 |
httpd: mod_proxy_ajp: Possible request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36760
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-01-17 20:15 修改: 2023-09-08 22:15
|
apache2 |
CVE-2023-25690 |
严重 |
2.4.52-r0 |
2.4.56-r0 |
httpd: HTTP request splitting with mod_rewrite and mod_proxy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25690
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-07 16:15 修改: 2024-01-02 16:15
|
apache2-ssl |
CVE-2022-22720 |
严重 |
2.4.52-r0 |
2.4.53-r0 |
httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22720
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-03-14 11:15 修改: 2023-11-07 03:43
|
apache2-ssl |
CVE-2022-22721 |
严重 |
2.4.52-r0 |
2.4.53-r0 |
httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22721
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-03-14 11:15 修改: 2023-11-07 03:43
|
apache2-ssl |
CVE-2022-23943 |
严重 |
2.4.52-r0 |
2.4.53-r0 |
httpd: mod_sed: Read/write beyond bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23943
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-03-14 11:15 修改: 2023-11-07 03:44
|
apache2-ssl |
CVE-2022-28615 |
严重 |
2.4.52-r0 |
2.4.54-r0 |
httpd: Out-of-bounds read in ap_strcmp_match()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28615
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2023-11-07 03:45
|
apache2-ssl |
CVE-2022-31813 |
严重 |
2.4.52-r0 |
2.4.54-r0 |
httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31813
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2023-11-07 03:47
|
apache2-ssl |
CVE-2022-36760 |
严重 |
2.4.52-r0 |
2.4.55-r0 |
httpd: mod_proxy_ajp: Possible request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36760
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-01-17 20:15 修改: 2023-09-08 22:15
|
apache2-ssl |
CVE-2023-25690 |
严重 |
2.4.52-r0 |
2.4.56-r0 |
httpd: HTTP request splitting with mod_rewrite and mod_proxy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25690
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-07 16:15 修改: 2024-01-02 16:15
|
apr |
CVE-2022-24963 |
严重 |
1.7.0-r0 |
1.7.1-r0 |
apr: integer overflow/wraparound in apr_encode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24963
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-01-31 16:15 修改: 2023-09-08 17:15
|
apr |
CVE-2022-28331 |
严重 |
1.7.0-r0 |
1.7.1-r0 |
apr: Windows out-of-bounds write in apr_socket_sendv function
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28331
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-01-31 16:15 修改: 2023-07-07 16:15
|
curl |
CVE-2022-32207 |
严重 |
7.79.1-r0 |
7.79.1-r2 |
curl: Unpreserved file permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32207
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
curl |
CVE-2023-23914 |
严重 |
7.79.1-r0 |
7.79.1-r5 |
curl: HSTS ignored on multiple requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23914
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55
|
expat |
CVE-2022-22822 |
严重 |
2.4.1-r0 |
2.4.3-r0 |
expat: Integer overflow in addBinding in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22822
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-01-10 14:12 修改: 2022-10-06 15:29
|
expat |
CVE-2022-22823 |
严重 |
2.4.1-r0 |
2.4.3-r0 |
expat: Integer overflow in build_model in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22823
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47
|
expat |
CVE-2022-22824 |
严重 |
2.4.1-r0 |
2.4.3-r0 |
expat: Integer overflow in defineAttribute in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22824
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47
|
expat |
CVE-2022-23852 |
严重 |
2.4.1-r0 |
2.4.4-r0 |
expat: Integer overflow in function XML_GetBuffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23852
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-01-24 02:15 修改: 2022-10-29 02:44
|
expat |
CVE-2022-25235 |
严重 |
2.4.1-r0 |
2.4.5-r0 |
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25235
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-16 01:15 修改: 2023-11-07 03:44
|
expat |
CVE-2022-25236 |
严重 |
2.4.1-r0 |
2.4.5-r0 |
expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25236
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-16 01:15 修改: 2023-11-07 03:44
|
expat |
CVE-2022-25315 |
严重 |
2.4.1-r0 |
2.4.5-r0 |
expat: Integer overflow in storeRawNames()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25315
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44
|
freetype |
CVE-2022-27404 |
严重 |
2.10.4-r1 |
2.10.4-r2 |
FreeType: Buffer overflow in sfnt_init_face
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27404
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34
|
libcurl |
CVE-2022-32207 |
严重 |
7.79.1-r0 |
7.79.1-r2 |
curl: Unpreserved file permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32207
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
libcurl |
CVE-2023-23914 |
严重 |
7.79.1-r0 |
7.79.1-r5 |
curl: HSTS ignored on multiple requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23914
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55
|
pcre2 |
CVE-2022-1586 |
严重 |
10.36-r0 |
10.36-r1 |
pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1586
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-05-16 21:15 修改: 2023-11-07 03:42
|
pcre2 |
CVE-2022-1587 |
严重 |
10.36-r0 |
10.36-r1 |
pcre2: Out-of-bounds read in get_recurse_data_length in pcre2_jit_compile.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1587
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-05-16 21:15 修改: 2023-11-07 03:42
|
php7-bcmath |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-bcmath |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-common |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-common |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-ctype |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-ctype |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-dom |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-dom |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-fileinfo |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-fileinfo |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-fpm |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-fpm |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-gd |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-gd |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-gettext |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-gettext |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-json |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-json |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-ldap |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-ldap |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-mbstring |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-mbstring |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-mysqli |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-mysqli |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-mysqlnd |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-mysqlnd |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-openssl |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-openssl |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-session |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-session |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-simplexml |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-simplexml |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-sockets |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-sockets |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-xmlreader |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-xmlreader |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
php7-xmlwriter |
CVE-2021-21708 |
严重 |
7.4.26-r0 |
7.4.32-r0 |
php: Use after free due to php_filter_float() failing for ints
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21708
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-27 08:15 修改: 2022-10-07 14:31
|
php7-xmlwriter |
CVE-2022-37454 |
严重 |
7.4.26-r0 |
7.4.33-r0 |
XKCP: buffer overflow in the SHA-3 reference implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37454
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-21 06:15 修改: 2023-05-03 11:15
|
zlib |
CVE-2022-37434 |
严重 |
1.2.11-r3 |
1.2.12-r2 |
zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37434
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2022-08-05 07:15 修改: 2023-07-19 00:56
|
libcurl |
CVE-2022-27781 |
高危 |
7.79.1-r0 |
7.79.1-r2 |
curl: CERTINFO never-ending busy-loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01
|
libcurl |
CVE-2022-27782 |
高危 |
7.79.1-r0 |
7.79.1-r2 |
curl: TLS and SSH connection too eager reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01
|
libcurl |
CVE-2022-43551 |
高危 |
7.79.1-r0 |
7.79.1-r4 |
curl: HSTS bypass via IDN
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43551
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-12-23 15:15 修改: 2024-03-27 14:58
|
libcurl |
CVE-2023-27533 |
高危 |
7.79.1-r0 |
8.0.1-r0 |
curl: TELNET option IAC injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54
|
libcurl |
CVE-2023-27534 |
高危 |
7.79.1-r0 |
8.0.1-r0 |
curl: SFTP path ~ resolving discrepancy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54
|
libretls |
CVE-2022-0778 |
高危 |
3.3.3p1-r2 |
3.3.3p1-r3 |
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15
|
libsasl |
CVE-2022-24407 |
高危 |
2.1.27-r12 |
2.1.28-r0 |
cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24407
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-24 15:15 修改: 2023-11-07 03:44
|
libssl1.1 |
CVE-2022-0778 |
高危 |
1.1.1l-r0 |
1.1.1n-r0 |
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2022-4450 |
高危 |
1.1.1l-r0 |
1.1.1t-r0 |
openssl: double free after calling PEM_read_bio_ex
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2023-0215 |
高危 |
1.1.1l-r0 |
1.1.1t-r0 |
openssl: use-after-free following BIO_new_NDEF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2023-0286 |
高危 |
1.1.1l-r0 |
1.1.1t-r0 |
openssl: X.400 address type confusion in X.509 GeneralName
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2023-0464 |
高危 |
1.1.1l-r0 |
1.1.1t-r1 |
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15
|
libxml2 |
CVE-2022-2309 |
高危 |
2.9.12-r1 |
2.9.14-r1 |
lxml: NULL Pointer Dereference in lxml
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2309
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-05 10:15 修改: 2023-11-07 03:46
|
libxml2 |
CVE-2022-23308 |
高危 |
2.9.12-r1 |
2.9.13-r0 |
libxml2: Use-after-free of ID and IDREF attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23308
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-26 05:15 修改: 2023-11-07 03:44
|
libxml2 |
CVE-2022-40303 |
高危 |
2.9.12-r1 |
2.9.14-r2 |
libxml2: integer overflows with XML_PARSE_HUGE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40303
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-23 00:15 修改: 2023-11-07 03:52
|
libxml2 |
CVE-2022-40304 |
高危 |
2.9.12-r1 |
2.9.14-r2 |
libxml2: dict corruption caused by entity reference cycles
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40304
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-23 18:15 修改: 2023-11-07 03:52
|
libxpm |
CVE-2022-44617 |
高危 |
3.5.13-r0 |
3.5.15-r0 |
libXpm: Runaway loop on width of 0 and enormous height
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44617
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-06 23:15 修改: 2023-11-07 03:54
|
libxpm |
CVE-2022-46285 |
高危 |
3.5.13-r0 |
3.5.15-r0 |
libXpm: Infinite loop on unclosed comments
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46285
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-07 19:15 修改: 2023-10-17 15:55
|
libxpm |
CVE-2022-4883 |
高危 |
3.5.13-r0 |
3.5.15-r0 |
libXpm: compression commands depend on $PATH
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4883
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-07 19:15 修改: 2023-10-17 15:55
|
mariadb-client |
CVE-2018-25032 |
高危 |
10.5.13-r0 |
10.5.17-r0 |
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-25032
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-03-25 09:15 修改: 2023-11-07 02:56
|
mariadb-client |
CVE-2022-24048 |
高危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24048
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44
|
mariadb-client |
CVE-2022-24050 |
高危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: lack of validating the existence of an object prior to performing operations on the object
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24050
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44
|
mariadb-client |
CVE-2022-24051 |
高危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: lack of proper validation of a user-supplied string before using it as a format specifier
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24051
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44
|
mariadb-client |
CVE-2022-24052 |
高危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: CONNECT storage engine heap-based buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24052
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44
|
mariadb-client |
CVE-2022-27376 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: assertion failure in Item_args::walk_arg
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27376
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:28
|
mariadb-client |
CVE-2022-27377 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: use-after-poison when complex conversion is involved in blob
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27377
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:08
|
mariadb-client |
CVE-2022-27378 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: server crash in create_tmp_table::finalize
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27378
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:17
|
mariadb-client |
CVE-2022-27379 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: server crash in component arg_comparator::compare_real_fixed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27379
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:19
|
mariadb-client |
CVE-2022-27380 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: server crash at my_decimal::operator=
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27380
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-11-08 19:32
|
mariadb-client |
CVE-2022-27381 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: server crash at Field::set_default via specially crafted SQL statements
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27381
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:27
|
mariadb-client |
CVE-2022-27382 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27382
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-07-19 13:25
|
mariadb-client |
CVE-2022-27383 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27383
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:28
|
mariadb-client |
CVE-2022-27384 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: crash via component Item_subselect::init_expr_cache_tracker
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27384
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:26
|
mariadb-client |
CVE-2022-27386 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: server crashes in query_arena::set_query_arena upon SELECT from view
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27386
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:26
|
mariadb-client |
CVE-2022-27387 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: assertion failures in decimal_bin_size
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27387
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:22
|
mariadb-client |
CVE-2022-27444 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: crash when using HAVING with NOT EXIST predicate in an equality
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27444
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-07-19 13:32
|
mariadb-client |
CVE-2022-27445 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: assertion failure in compare_order_elements
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27445
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-09-29 16:33
|
mariadb-client |
CVE-2022-27446 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: crash when using HAVING with IS NULL predicate in an equality
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27446
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-07-19 13:35
|
mariadb-client |
CVE-2022-27447 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: use-after-poison in Binary_string::free_buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27447
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:12
|
mariadb-client |
CVE-2022-27448 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: crash in multi-update and implicit grouping
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27448
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:15
|
mariadb-client |
CVE-2022-27449 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: assertion failure in sql/item_func.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27449
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-10-07 18:59
|
mariadb-client |
CVE-2022-27451 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: crash via window function in expression in ORDER BY
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27451
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-06-30 12:52
|
mariadb-client |
CVE-2022-27452 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: assertion failure in sql/item_cmpfunc.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27452
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-09-29 16:33
|
mariadb-client |
CVE-2022-27455 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27455
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-06-30 12:56
|
mariadb-client |
CVE-2022-27456 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27456
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:09
|
mariadb-client |
CVE-2022-27457 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: incorrect key in "dup value" error after long unique
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27457
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-06-30 12:56
|
mariadb-client |
CVE-2022-27458 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: use-after-poison in Binary_string::free_buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27458
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2024-05-01 22:15
|
mariadb-client |
CVE-2022-32081 |
高危 |
10.5.13-r0 |
10.5.17-r0 |
mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32081
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47
|
mariadb-client |
CVE-2022-32082 |
高危 |
10.5.13-r0 |
10.5.17-r0 |
mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32082
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47
|
mariadb-client |
CVE-2022-32084 |
高危 |
10.5.13-r0 |
10.5.17-r0 |
mariadb: segmentation fault via the component sub_select
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32084
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47
|
mariadb-client |
CVE-2022-32089 |
高危 |
10.5.13-r0 |
10.5.17-r0 |
mariadb: server crash in st_select_lex_unit::exclude_level
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32089
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47
|
mariadb-client |
CVE-2022-32091 |
高危 |
10.5.13-r0 |
10.5.17-r0 |
mariadb: server crash in JOIN_CACHE::free or in copy_fields
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32091
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47
|
mariadb-common |
CVE-2018-25032 |
高危 |
10.5.13-r0 |
10.5.17-r0 |
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-25032
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-03-25 09:15 修改: 2023-11-07 02:56
|
mariadb-common |
CVE-2022-24048 |
高危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24048
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44
|
mariadb-common |
CVE-2022-24050 |
高危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: lack of validating the existence of an object prior to performing operations on the object
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24050
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44
|
mariadb-common |
CVE-2022-24051 |
高危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: lack of proper validation of a user-supplied string before using it as a format specifier
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24051
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44
|
mariadb-common |
CVE-2022-24052 |
高危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: CONNECT storage engine heap-based buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24052
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-18 20:15 修改: 2023-11-07 03:44
|
mariadb-common |
CVE-2022-27376 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: assertion failure in Item_args::walk_arg
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27376
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:28
|
mariadb-common |
CVE-2022-27377 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: use-after-poison when complex conversion is involved in blob
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27377
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:08
|
mariadb-common |
CVE-2022-27378 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: server crash in create_tmp_table::finalize
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27378
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:17
|
mariadb-common |
CVE-2022-27379 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: server crash in component arg_comparator::compare_real_fixed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27379
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-10-08 03:19
|
mariadb-common |
CVE-2022-27380 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: server crash at my_decimal::operator=
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27380
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-11-08 19:32
|
mariadb-common |
CVE-2022-27381 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: server crash at Field::set_default via specially crafted SQL statements
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27381
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:27
|
mariadb-common |
CVE-2022-27382 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: assertion failure via component Item_field::used_tables/update_depend_map_for_order
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27382
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-07-19 13:25
|
mariadb-common |
CVE-2022-27383 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: use-after-poison in my_strcasecmp_8bit() of ctype-simple.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27383
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:28
|
mariadb-common |
CVE-2022-27384 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: crash via component Item_subselect::init_expr_cache_tracker
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27384
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:26
|
mariadb-common |
CVE-2022-27386 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: server crashes in query_arena::set_query_arena upon SELECT from view
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27386
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:26
|
mariadb-common |
CVE-2022-27387 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: assertion failures in decimal_bin_size
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27387
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-12 20:15 修改: 2022-09-29 16:22
|
mariadb-common |
CVE-2022-27444 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: crash when using HAVING with NOT EXIST predicate in an equality
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27444
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-07-19 13:32
|
mariadb-common |
CVE-2022-27445 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: assertion failure in compare_order_elements
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27445
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-09-29 16:33
|
mariadb-common |
CVE-2022-27446 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: crash when using HAVING with IS NULL predicate in an equality
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27446
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-07-19 13:35
|
mariadb-common |
CVE-2022-27447 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: use-after-poison in Binary_string::free_buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27447
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:12
|
mariadb-common |
CVE-2022-27448 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: crash in multi-update and implicit grouping
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27448
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:15
|
mariadb-common |
CVE-2022-27449 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: assertion failure in sql/item_func.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27449
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-10-07 18:59
|
mariadb-common |
CVE-2022-27451 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: crash via window function in expression in ORDER BY
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27451
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-06-30 12:52
|
mariadb-common |
CVE-2022-27452 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: assertion failure in sql/item_cmpfunc.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27452
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-09-29 16:33
|
mariadb-common |
CVE-2022-27455 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: use-after-free when WHERE has subquery with an outer reference in HAVING
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27455
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-06-30 12:56
|
mariadb-common |
CVE-2022-27456 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: assertion failure in VDec::VDec at /sql/sql_type.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27456
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-10-08 03:09
|
mariadb-common |
CVE-2022-27457 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: incorrect key in "dup value" error after long unique
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27457
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2022-06-30 12:56
|
mariadb-common |
CVE-2022-27458 |
高危 |
10.5.13-r0 |
10.5.16-r0 |
mariadb: use-after-poison in Binary_string::free_buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27458
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-14 13:15 修改: 2024-05-01 22:15
|
mariadb-common |
CVE-2022-32081 |
高危 |
10.5.13-r0 |
10.5.17-r0 |
mariadb: use-after-poison in prepare_inplace_add_virtual in handler0alter.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32081
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47
|
mariadb-common |
CVE-2022-32082 |
高危 |
10.5.13-r0 |
10.5.17-r0 |
mariadb: assertion failure at table->get_ref_count() == 0 in dict0dict.cc
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32082
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47
|
mariadb-common |
CVE-2022-32084 |
高危 |
10.5.13-r0 |
10.5.17-r0 |
mariadb: segmentation fault via the component sub_select
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32084
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47
|
mariadb-common |
CVE-2022-32089 |
高危 |
10.5.13-r0 |
10.5.17-r0 |
mariadb: server crash in st_select_lex_unit::exclude_level
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32089
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47
|
mariadb-common |
CVE-2022-32091 |
高危 |
10.5.13-r0 |
10.5.17-r0 |
mariadb: server crash in JOIN_CACHE::free or in copy_fields
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32091
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-01 20:15 修改: 2023-11-07 03:47
|
ncurses-libs |
CVE-2022-29458 |
高危 |
6.2_p20210612-r0 |
6.2_p20210612-r1 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
ncurses-terminfo-base |
CVE-2022-29458 |
高危 |
6.2_p20210612-r0 |
6.2_p20210612-r1 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
openssl |
CVE-2022-0778 |
高危 |
1.1.1l-r0 |
1.1.1n-r0 |
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2022-4450 |
高危 |
1.1.1l-r0 |
1.1.1t-r0 |
openssl: double free after calling PEM_read_bio_ex
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2023-0215 |
高危 |
1.1.1l-r0 |
1.1.1t-r0 |
openssl: use-after-free following BIO_new_NDEF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2023-0286 |
高危 |
1.1.1l-r0 |
1.1.1t-r0 |
openssl: X.400 address type confusion in X.509 GeneralName
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
openssl |
CVE-2023-0464 |
高危 |
1.1.1l-r0 |
1.1.1t-r1 |
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15
|
apache2 |
CVE-2006-20001 |
高危 |
2.4.52-r0 |
2.4.55-r0 |
httpd: mod_dav: out-of-bounds read/write of zero byte
漏洞详情: https://avd.aquasec.com/nvd/cve-2006-20001
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-01-17 20:15 修改: 2023-09-08 22:15
|
apache2 |
CVE-2022-22719 |
高危 |
2.4.52-r0 |
2.4.53-r0 |
httpd: mod_lua: Use of uninitialized value of in r:parsebody
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22719
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-03-14 11:15 修改: 2023-11-07 03:43
|
apr |
CVE-2021-35940 |
高危 |
1.7.0-r0 |
1.7.0-r1 |
apr: Regression of CVE-2017-12613 fix in apr 1.7
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35940
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2021-08-23 10:15 修改: 2023-11-07 03:36
|
busybox |
CVE-2022-28391 |
高危 |
1.33.1-r6 |
1.33.1-r7 |
busybox: remote attackers may execute arbitrary code if netstat is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28391
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2022-04-03 21:15 修改: 2022-08-11 18:44
|
php7-bcmath |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-bcmath |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-bcmath |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
apache2 |
CVE-2022-26377 |
高危 |
2.4.52-r0 |
2.4.54-r0 |
httpd: mod_proxy_ajp: Possible request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26377
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2023-11-07 03:44
|
apache2 |
CVE-2022-29404 |
高危 |
2.4.52-r0 |
2.4.54-r0 |
httpd: mod_lua: DoS in r:parsebody
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29404
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2023-11-07 03:46
|
php7-common |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-common |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-common |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
curl |
CVE-2022-22576 |
高危 |
7.79.1-r0 |
7.79.1-r1 |
curl: OAUTH2 bearer bypass in connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02
|
curl |
CVE-2022-27775 |
高危 |
7.79.1-r0 |
7.79.1-r1 |
curl: bad local IPv6 connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27775
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
php7-ctype |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-ctype |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-ctype |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
curl |
CVE-2022-27781 |
高危 |
7.79.1-r0 |
7.79.1-r2 |
curl: CERTINFO never-ending busy-loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01
|
curl |
CVE-2022-27782 |
高危 |
7.79.1-r0 |
7.79.1-r2 |
curl: TLS and SSH connection too eager reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01
|
php7-dom |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-dom |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-dom |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
curl |
CVE-2022-43551 |
高危 |
7.79.1-r0 |
7.79.1-r4 |
curl: HSTS bypass via IDN
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43551
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-12-23 15:15 修改: 2024-03-27 14:58
|
curl |
CVE-2023-27533 |
高危 |
7.79.1-r0 |
8.0.1-r0 |
curl: TELNET option IAC injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27533
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54
|
php7-fileinfo |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-fileinfo |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-fileinfo |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
curl |
CVE-2023-27534 |
高危 |
7.79.1-r0 |
8.0.1-r0 |
curl: SFTP path ~ resolving discrepancy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27534
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:54
|
apache2 |
CVE-2022-30522 |
高危 |
2.4.52-r0 |
2.4.54-r0 |
httpd: mod_sed: DoS vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30522
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2023-11-07 03:47
|
php7-fpm |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-fpm |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-fpm |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
apache2 |
CVE-2022-30556 |
高危 |
2.4.52-r0 |
2.4.54-r0 |
httpd: mod_lua: Information disclosure with websockets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30556
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2023-11-07 03:47
|
apache2 |
CVE-2023-27522 |
高危 |
2.4.52-r0 |
2.4.56-r0 |
httpd: mod_proxy_uwsgi HTTP response splitting
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27522
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-07 16:15 修改: 2024-10-23 17:35
|
php7-gd |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-gd |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-gd |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
apache2-ssl |
CVE-2006-20001 |
高危 |
2.4.52-r0 |
2.4.55-r0 |
httpd: mod_dav: out-of-bounds read/write of zero byte
漏洞详情: https://avd.aquasec.com/nvd/cve-2006-20001
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-01-17 20:15 修改: 2023-09-08 22:15
|
apache2-ssl |
CVE-2022-22719 |
高危 |
2.4.52-r0 |
2.4.53-r0 |
httpd: mod_lua: Use of uninitialized value of in r:parsebody
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22719
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-03-14 11:15 修改: 2023-11-07 03:43
|
php7-gettext |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-gettext |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-gettext |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
apache2-ssl |
CVE-2022-26377 |
高危 |
2.4.52-r0 |
2.4.54-r0 |
httpd: mod_proxy_ajp: Possible request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26377
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2023-11-07 03:44
|
apache2-ssl |
CVE-2022-29404 |
高危 |
2.4.52-r0 |
2.4.54-r0 |
httpd: mod_lua: DoS in r:parsebody
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29404
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2023-11-07 03:46
|
php7-json |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-json |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-json |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
expat |
CVE-2021-45960 |
高危 |
2.4.1-r0 |
2.4.3-r0 |
expat: Large number of prefixed XML attributes on a single tag can crash libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45960
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-01-01 19:15 修改: 2022-10-06 19:08
|
expat |
CVE-2021-46143 |
高危 |
2.4.1-r0 |
2.4.3-r0 |
expat: Integer overflow in doProlog in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46143
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-01-06 04:15 修改: 2022-10-06 19:11
|
php7-ldap |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-ldap |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-ldap |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
expat |
CVE-2022-22825 |
高危 |
2.4.1-r0 |
2.4.3-r0 |
expat: Integer overflow in lookup in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22825
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47
|
expat |
CVE-2022-22826 |
高危 |
2.4.1-r0 |
2.4.3-r0 |
expat: Integer overflow in nextScaffoldPart in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22826
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-01-10 14:12 修改: 2022-10-06 12:44
|
php7-mbstring |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-mbstring |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-mbstring |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
expat |
CVE-2022-22827 |
高危 |
2.4.1-r0 |
2.4.3-r0 |
expat: Integer overflow in storeAtts in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22827
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-01-10 14:12 修改: 2022-10-06 12:52
|
expat |
CVE-2022-23990 |
高危 |
2.4.1-r0 |
2.4.4-r0 |
expat: integer overflow in the doProlog function
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23990
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-01-26 19:15 修改: 2023-11-07 03:44
|
php7-mysqli |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-mysqli |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-mysqli |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
expat |
CVE-2022-25314 |
高危 |
2.4.1-r0 |
2.4.5-r0 |
expat: Integer overflow in copyString()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25314
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44
|
expat |
CVE-2022-40674 |
高危 |
2.4.1-r0 |
2.4.9-r0 |
expat: a use-after-free in the doContent function in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40674
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-14 11:15 修改: 2023-11-07 03:52
|
php7-mysqlnd |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-mysqlnd |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-mysqlnd |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
expat |
CVE-2022-43680 |
高危 |
2.4.1-r0 |
2.5.0-r0 |
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43680
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-10-24 14:15 修改: 2024-01-21 02:08
|
apache2-ssl |
CVE-2022-30522 |
高危 |
2.4.52-r0 |
2.4.54-r0 |
httpd: mod_sed: DoS vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30522
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2023-11-07 03:47
|
php7-openssl |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-openssl |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-openssl |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
freetype |
CVE-2022-27405 |
高危 |
2.10.4-r1 |
2.10.4-r3 |
FreeType: Segmentation violation via FNT_Size_Request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27405
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34
|
freetype |
CVE-2022-27406 |
高危 |
2.10.4-r1 |
2.10.4-r3 |
Freetype: Segmentation violation via FT_Request_Size
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27406
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-04-22 14:15 修改: 2024-02-29 01:34
|
php7-session |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-session |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-session |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
libcrypto1.1 |
CVE-2022-0778 |
高危 |
1.1.1l-r0 |
1.1.1n-r0 |
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2022-4450 |
高危 |
1.1.1l-r0 |
1.1.1t-r0 |
openssl: double free after calling PEM_read_bio_ex
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4450
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
php7-simplexml |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-simplexml |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-simplexml |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
libcrypto1.1 |
CVE-2023-0215 |
高危 |
1.1.1l-r0 |
1.1.1t-r0 |
openssl: use-after-free following BIO_new_NDEF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0215
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2023-02-08 20:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2023-0286 |
高危 |
1.1.1l-r0 |
1.1.1t-r0 |
openssl: X.400 address type confusion in X.509 GeneralName
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
php7-sockets |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-sockets |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-sockets |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
libcrypto1.1 |
CVE-2023-0464 |
高危 |
1.1.1l-r0 |
1.1.1t-r1 |
openssl: Denial of service by excessive resource usage in verifying X509 policy constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0464
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2023-03-22 17:15 修改: 2024-06-21 19:15
|
apache2-ssl |
CVE-2022-30556 |
高危 |
2.4.52-r0 |
2.4.54-r0 |
httpd: mod_lua: Information disclosure with websockets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30556
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2023-11-07 03:47
|
php7-xmlreader |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-xmlreader |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-xmlreader |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
apache2-ssl |
CVE-2023-27522 |
高危 |
2.4.52-r0 |
2.4.56-r0 |
httpd: mod_proxy_uwsgi HTTP response splitting
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27522
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-07 16:15 修改: 2024-10-23 17:35
|
libcurl |
CVE-2022-22576 |
高危 |
7.79.1-r0 |
7.79.1-r1 |
curl: OAUTH2 bearer bypass in connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02
|
php7-xmlwriter |
CVE-2022-31625 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: Uninitialized array in pg_query_params() leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31625
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-xmlwriter |
CVE-2022-31626 |
高危 |
7.4.26-r0 |
7.4.32-r0 |
php: password of excessive length triggers buffer overflow leading to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31626
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-16 06:15 修改: 2023-11-07 03:47
|
php7-xmlwriter |
CVE-2022-31630 |
高危 |
7.4.26-r0 |
7.4.33-r0 |
php: OOB read due to insufficient input validation in imageloadfont()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31630
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-14 07:15 修改: 2024-04-02 03:15
|
python3 |
CVE-2022-45061 |
高危 |
3.9.5-r2 |
3.9.16-r0 |
python: CPU denial of service via inefficient IDNA decoder
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45061
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-11-09 07:15 修改: 2023-11-07 03:54
|
ssl_client |
CVE-2022-28391 |
高危 |
1.33.1-r6 |
1.33.1-r7 |
busybox: remote attackers may execute arbitrary code if netstat is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28391
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2022-04-03 21:15 修改: 2022-08-11 18:44
|
xz-libs |
CVE-2022-1271 |
高危 |
5.2.5-r0 |
5.2.5-r1 |
gzip: arbitrary-file-write vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1271
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-08-31 16:15 修改: 2024-08-26 10:47
|
libcurl |
CVE-2022-27775 |
高危 |
7.79.1-r0 |
7.79.1-r1 |
curl: bad local IPv6 connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27775
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
zlib |
CVE-2018-25032 |
高危 |
1.2.11-r3 |
1.2.12-r0 |
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-25032
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2022-03-25 09:15 修改: 2023-11-07 02:56
|
libcurl |
CVE-2022-32206 |
中危 |
7.79.1-r0 |
7.79.1-r2 |
curl: HTTP compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
libcurl |
CVE-2022-32208 |
中危 |
7.79.1-r0 |
7.79.1-r2 |
curl: FTP-KRB bad message verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
libcurl |
CVE-2022-43552 |
中危 |
7.79.1-r0 |
7.79.1-r4 |
curl: Use-after-free triggered by an HTTP proxy deny response
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35
|
libcurl |
CVE-2023-23915 |
中危 |
7.79.1-r0 |
7.79.1-r5 |
curl: HSTS amnesia with --parallel
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23915
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55
|
libcurl |
CVE-2023-23916 |
中危 |
7.79.1-r0 |
7.79.1-r5 |
curl: HTTP multi-header compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54
|
php7-gd |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-gd |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
libcurl |
CVE-2023-27535 |
中危 |
7.79.1-r0 |
8.0.1-r0 |
curl: FTP too eager connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47
|
libcurl |
CVE-2023-27536 |
中危 |
7.79.1-r0 |
8.0.1-r0 |
curl: GSS delegation too eager connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46
|
libcurl |
CVE-2023-27537 |
中危 |
7.79.1-r0 |
8.0.1-r0 |
curl: HSTS double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27537
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46
|
libcurl |
CVE-2023-27538 |
中危 |
7.79.1-r0 |
8.0.1-r0 |
curl: SSH connection too eager reuse still
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46
|
curl |
CVE-2022-43552 |
中危 |
7.79.1-r0 |
7.79.1-r4 |
curl: Use-after-free triggered by an HTTP proxy deny response
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35
|
php7-gettext |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-gettext |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
mariadb-common |
CVE-2021-46659 |
中危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: Crash executing query with VIEW, aggregate and subquery
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46659
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-01-29 23:15 修改: 2023-11-07 03:40
|
mariadb-common |
CVE-2021-46661 |
中危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46661
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40
|
mariadb-common |
CVE-2021-46663 |
中危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46663
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40
|
mariadb-common |
CVE-2021-46664 |
中危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46664
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40
|
mariadb-common |
CVE-2021-46665 |
中危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46665
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40
|
php7-json |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-json |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
mariadb-common |
CVE-2021-46668 |
中危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46668
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40
|
curl |
CVE-2023-23915 |
中危 |
7.79.1-r0 |
7.79.1-r5 |
curl: HSTS amnesia with --parallel
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23915
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:55
|
curl |
CVE-2023-23916 |
中危 |
7.79.1-r0 |
7.79.1-r5 |
curl: HTTP multi-header compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23916
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-23 20:15 修改: 2024-03-27 14:54
|
expat |
CVE-2022-25313 |
中危 |
2.4.1-r0 |
2.4.5-r0 |
expat: Stack exhaustion in doctype parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25313
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44
|
curl |
CVE-2023-27535 |
中危 |
7.79.1-r0 |
8.0.1-r0 |
curl: FTP too eager connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27535
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:47
|
php7-ldap |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-ldap |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
curl |
CVE-2023-27536 |
中危 |
7.79.1-r0 |
8.0.1-r0 |
curl: GSS delegation too eager connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27536
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46
|
curl |
CVE-2023-27537 |
中危 |
7.79.1-r0 |
8.0.1-r0 |
curl: HSTS double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27537
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46
|
libssl1.1 |
CVE-2022-2097 |
中危 |
1.1.1l-r0 |
1.1.1q-r0 |
openssl: AES OCB fails to encrypt some bytes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2022-2097 |
中危 |
1.1.1l-r0 |
1.1.1q-r0 |
openssl: AES OCB fails to encrypt some bytes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2022-4304 |
中危 |
1.1.1l-r0 |
1.1.1t-r0 |
openssl: timing attack in RSA Decryption implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
php7-mbstring |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-mbstring |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
openssl |
CVE-2023-0465 |
中危 |
1.1.1l-r0 |
1.1.1t-r2 |
openssl: Invalid certificate policies in leaf certificates are silently ignored
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2022-4304 |
中危 |
1.1.1l-r0 |
1.1.1t-r0 |
openssl: timing attack in RSA Decryption implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libssl1.1 |
CVE-2023-0465 |
中危 |
1.1.1l-r0 |
1.1.1t-r2 |
openssl: Invalid certificate policies in leaf certificates are silently ignored
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
libuuid |
CVE-2021-3995 |
中危 |
2.37.2-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of FUSE filesystems belonging to users with similar uid
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3995
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-08-23 20:15 修改: 2024-01-07 09:15
|
mariadb-client |
CVE-2021-46659 |
中危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: Crash executing query with VIEW, aggregate and subquery
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46659
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-01-29 23:15 修改: 2023-11-07 03:40
|
php7-mysqli |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-mysqli |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
mariadb-client |
CVE-2021-46661 |
中危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: MariaDB allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46661
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40
|
mariadb-client |
CVE-2021-46663 |
中危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46663
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40
|
mariadb-client |
CVE-2021-46664 |
中危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46664
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40
|
php7-bcmath |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-bcmath |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
php7-mysqlnd |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-mysqlnd |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
mariadb-client |
CVE-2021-46665 |
中危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46665
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40
|
mariadb-client |
CVE-2021-46668 |
中危 |
10.5.13-r0 |
10.5.15-r0 |
mariadb: MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46668
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-01 02:15 修改: 2023-11-07 03:40
|
libuuid |
CVE-2021-3996 |
中危 |
2.37.2-r0 |
2.37.3-r0 |
util-linux: Unauthorized unmount of filesystems in libmount
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3996
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-08-23 20:15 修改: 2024-10-15 16:35
|
libuuid |
CVE-2022-0563 |
中危 |
2.37.2-r0 |
2.37.4-r0 |
util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15
|
curl |
CVE-2023-27538 |
中危 |
7.79.1-r0 |
8.0.1-r0 |
curl: SSH connection too eager reuse still
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27538
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-03-30 20:15 修改: 2024-03-27 14:46
|
php7-openssl |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-openssl |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
php7-common |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-common |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
apache2-ssl |
CVE-2022-37436 |
中危 |
2.4.52-r0 |
2.4.55-r0 |
httpd: mod_proxy: HTTP response splitting
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37436
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-01-17 20:15 修改: 2023-09-08 22:15
|
apache2 |
CVE-2022-37436 |
中危 |
2.4.52-r0 |
2.4.55-r0 |
httpd: mod_proxy: HTTP response splitting
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37436
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-01-17 20:15 修改: 2023-09-08 22:15
|
apache2 |
CVE-2022-28330 |
中危 |
2.4.52-r0 |
2.4.54-r0 |
httpd: mod_isapi: out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28330
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2022-06-24 16:15
|
php7-session |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-session |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
libxml2 |
CVE-2022-29824 |
中危 |
2.9.12-r1 |
2.9.14-r0 |
libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29824
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-05-03 03:15 修改: 2023-11-07 03:46
|
apache2 |
CVE-2022-28614 |
中危 |
2.4.52-r0 |
2.4.54-r0 |
httpd: Out-of-bounds read via ap_rwrite()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28614
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2023-11-07 03:45
|
php7-ctype |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-ctype |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
libcrypto1.1 |
CVE-2022-2097 |
中危 |
1.1.1l-r0 |
1.1.1q-r0 |
openssl: AES OCB fails to encrypt some bytes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2097
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2022-07-05 11:15 修改: 2024-06-21 19:15
|
php7-simplexml |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-simplexml |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
libcrypto1.1 |
CVE-2022-4304 |
中危 |
1.1.1l-r0 |
1.1.1t-r0 |
openssl: timing attack in RSA Decryption implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4304
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15
|
libcrypto1.1 |
CVE-2023-0465 |
中危 |
1.1.1l-r0 |
1.1.1t-r2 |
openssl: Invalid certificate policies in leaf certificates are silently ignored
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0465
镜像层: sha256:1a058d5342cc722ad5439cacae4b2b4eedde51d8fe8800fcf28444302355c16d
发布日期: 2023-03-28 15:15 修改: 2024-02-04 09:15
|
apr |
CVE-2022-25147 |
中危 |
1.7.0-r0 |
1.7.1-r0 |
apr-util: out-of-bounds writes in the apr_base64
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25147
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-01-31 16:15 修改: 2024-03-15 11:15
|
apr-util |
CVE-2022-25147 |
中危 |
1.6.1-r7 |
1.6.3-r0 |
apr-util: out-of-bounds writes in the apr_base64
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25147
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2023-01-31 16:15 修改: 2024-03-15 11:15
|
php7-dom |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-sockets |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-sockets |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
php7-dom |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
apache2-ssl |
CVE-2022-28330 |
中危 |
2.4.52-r0 |
2.4.54-r0 |
httpd: mod_isapi: out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28330
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2022-06-24 16:15
|
apache2-ssl |
CVE-2022-28614 |
中危 |
2.4.52-r0 |
2.4.54-r0 |
httpd: Out-of-bounds read via ap_rwrite()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28614
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-09 17:15 修改: 2023-11-07 03:45
|
curl |
CVE-2022-27774 |
中危 |
7.79.1-r0 |
7.79.1-r1 |
curl: credential leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
curl |
CVE-2022-27776 |
中危 |
7.79.1-r0 |
7.79.1-r1 |
curl: auth/cookie leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
php7-xmlreader |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-xmlreader |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
curl |
CVE-2022-32205 |
中危 |
7.79.1-r0 |
7.79.1-r2 |
curl: Set-Cookie denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32205
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:01
|
php7-fileinfo |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-fileinfo |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
curl |
CVE-2022-32206 |
中危 |
7.79.1-r0 |
7.79.1-r2 |
curl: HTTP compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
curl |
CVE-2022-32208 |
中危 |
7.79.1-r0 |
7.79.1-r2 |
curl: FTP-KRB bad message verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
php7-xmlwriter |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-xmlwriter |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
libcurl |
CVE-2022-27774 |
中危 |
7.79.1-r0 |
7.79.1-r1 |
curl: credential leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
libcurl |
CVE-2022-27776 |
中危 |
7.79.1-r0 |
7.79.1-r1 |
curl: auth/cookie leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
libcurl |
CVE-2022-32205 |
中危 |
7.79.1-r0 |
7.79.1-r2 |
curl: Set-Cookie denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32205
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:01
|
php7-fpm |
CVE-2022-31628 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: phar: infinite loop when decompressing quine gzip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31628
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2023-11-07 03:47
|
php7-fpm |
CVE-2022-31629 |
中危 |
7.4.26-r0 |
7.4.32-r0 |
php: standard insecure cookie could be treated as a '__Host-' or '__Secure-' cookie by PHP applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31629
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-28 23:15 修改: 2024-10-29 15:35
|
libcurl |
CVE-2022-35252 |
低危 |
7.79.1-r0 |
7.79.1-r3 |
curl: Incorrect handling of control code characters in cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00
|
curl |
CVE-2022-35252 |
低危 |
7.79.1-r0 |
7.79.1-r3 |
curl: Incorrect handling of control code characters in cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252
镜像层: sha256:365bfc2d542c96a98590d3cc9905d7b63b05604fd71208c4da3a64faaf8b6a48
发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00
|