bzip2 |
CVE-2019-12900 |
严重 |
1.0.6-7+b3 |
1.0.6-7+deb8u1 |
bzip2: out-of-bounds write in function BZ2_decompress
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12900
镜像层: sha256:ce6c8756685b2bff514e0b28f78eedb671380084555af2b3833e54bb191b262a
发布日期: 2019-06-19 23:15 修改: 2023-11-07 03:03
|
curl |
CVE-2016-7167 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: escape and unescape integer overflows
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7167
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2016-10-07 14:59 修改: 2023-11-07 02:34
|
curl |
CVE-2017-1000257 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u7 |
curl: IMAP FETCH response out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000257
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-10-31 21:29 修改: 2018-11-13 11:29
|
curl |
CVE-2017-8816 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u8 |
curl: NTLM buffer overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8816
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-11-29 18:29 修改: 2018-11-13 11:29
|
curl |
CVE-2017-8817 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u8 |
curl: FTP wildcard out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8817
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-11-29 18:29 修改: 2018-11-13 11:29
|
curl |
CVE-2018-1000007 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u9 |
curl: HTTP authentication leak in redirects
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000007
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-01-24 22:29 修改: 2022-06-13 19:10
|
curl |
CVE-2018-1000120 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: FTP path trickery leads to NIL byte out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000120
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-14 18:29 修改: 2019-06-18 22:15
|
curl |
CVE-2018-1000122 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: RTSP RTP buffer over-read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000122
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-14 18:29 修改: 2019-10-03 00:03
|
curl |
CVE-2018-1000301 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u11 |
curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000301
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-05-24 13:29 修改: 2019-10-03 00:03
|
curl |
CVE-2018-14618 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u12 |
curl: NTLM password overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14618
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-09-05 19:29 修改: 2019-04-22 17:48
|
curl |
CVE-2018-16839 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16839
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-10-31 18:29 修改: 2023-11-07 02:53
|
curl |
CVE-2018-16842 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Heap-based buffer over-read in the curl tool warning formatting
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16842
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-10-31 19:29 修改: 2019-08-06 17:15
|
curl |
CVE-2019-3822 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: NTLMv2 type-3 header stack buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3822
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
curl |
CVE-2019-5482 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u16 |
curl: heap buffer overflow in function tftp_receive_packet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5482
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-09-16 19:15 修改: 2023-11-07 03:11
|
git |
CVE-2018-17456 |
严重 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u7 |
git: arbitrary code execution via .gitmodules
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17456
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-10-06 14:29 修改: 2020-08-24 17:37
|
git |
CVE-2019-1353 |
严重 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u8 |
git: NTFS protections inactive when running Git in the Windows Subsystem for Linux
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1353
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-01-24 22:15 修改: 2023-11-07 03:08
|
git-man |
CVE-2018-17456 |
严重 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u7 |
git: arbitrary code execution via .gitmodules
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17456
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-10-06 14:29 修改: 2020-08-24 17:37
|
git-man |
CVE-2019-1353 |
严重 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u8 |
git: NTFS protections inactive when running Git in the Windows Subsystem for Linux
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1353
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-01-24 22:15 修改: 2023-11-07 03:08
|
inetutils-ping |
CVE-2020-10188 |
严重 |
2:1.9.2.39.3a460-3 |
2:1.9.2.39.3a460-3+deb8u1 |
telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10188
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2020-03-06 15:15 修改: 2023-11-07 03:14
|
libbsd0 |
CVE-2016-2090 |
严重 |
0.7.0-2 |
0.7.0-2+deb8u1 |
Off-by-one vulnerability in the fgetwln function in libbsd before 0.8. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2090
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-01-13 16:59 修改: 2023-11-07 02:30
|
libbsd0 |
CVE-2019-20367 |
严重 |
0.7.0-2 |
|
nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a com ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20367
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-01-08 17:15 修改: 2023-11-07 03:09
|
libbz2-1.0 |
CVE-2019-12900 |
严重 |
1.0.6-7+b3 |
1.0.6-7+deb8u1 |
bzip2: out-of-bounds write in function BZ2_decompress
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12900
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-06-19 23:15 修改: 2023-11-07 03:03
|
libcurl3 |
CVE-2016-7167 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: escape and unescape integer overflows
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7167
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2016-10-07 14:59 修改: 2023-11-07 02:34
|
libcurl3 |
CVE-2017-1000257 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u7 |
curl: IMAP FETCH response out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000257
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-10-31 21:29 修改: 2018-11-13 11:29
|
libcurl3 |
CVE-2017-8816 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u8 |
curl: NTLM buffer overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8816
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-11-29 18:29 修改: 2018-11-13 11:29
|
libcurl3 |
CVE-2017-8817 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u8 |
curl: FTP wildcard out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8817
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-11-29 18:29 修改: 2018-11-13 11:29
|
libcurl3 |
CVE-2018-1000007 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u9 |
curl: HTTP authentication leak in redirects
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000007
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-01-24 22:29 修改: 2022-06-13 19:10
|
libcurl3 |
CVE-2018-1000120 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: FTP path trickery leads to NIL byte out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000120
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-14 18:29 修改: 2019-06-18 22:15
|
libcurl3 |
CVE-2018-1000122 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: RTSP RTP buffer over-read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000122
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-14 18:29 修改: 2019-10-03 00:03
|
libcurl3 |
CVE-2018-1000301 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u11 |
curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000301
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-05-24 13:29 修改: 2019-10-03 00:03
|
libcurl3 |
CVE-2018-14618 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u12 |
curl: NTLM password overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14618
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-09-05 19:29 修改: 2019-04-22 17:48
|
libcurl3 |
CVE-2018-16839 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16839
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-10-31 18:29 修改: 2023-11-07 02:53
|
libcurl3 |
CVE-2018-16842 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Heap-based buffer over-read in the curl tool warning formatting
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16842
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-10-31 19:29 修改: 2019-08-06 17:15
|
libcurl3 |
CVE-2019-3822 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: NTLMv2 type-3 header stack buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3822
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
libcurl3 |
CVE-2019-5482 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u16 |
curl: heap buffer overflow in function tftp_receive_packet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5482
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-09-16 19:15 修改: 2023-11-07 03:11
|
libcurl3-gnutls |
CVE-2016-7167 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: escape and unescape integer overflows
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7167
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2016-10-07 14:59 修改: 2023-11-07 02:34
|
libcurl3-gnutls |
CVE-2017-1000257 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u7 |
curl: IMAP FETCH response out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000257
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-31 21:29 修改: 2018-11-13 11:29
|
libcurl3-gnutls |
CVE-2017-8816 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u8 |
curl: NTLM buffer overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8816
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-11-29 18:29 修改: 2018-11-13 11:29
|
libcurl3-gnutls |
CVE-2017-8817 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u8 |
curl: FTP wildcard out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8817
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-11-29 18:29 修改: 2018-11-13 11:29
|
libcurl3-gnutls |
CVE-2018-1000007 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u9 |
curl: HTTP authentication leak in redirects
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000007
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-01-24 22:29 修改: 2022-06-13 19:10
|
libcurl3-gnutls |
CVE-2018-1000120 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: FTP path trickery leads to NIL byte out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000120
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-03-14 18:29 修改: 2019-06-18 22:15
|
libcurl3-gnutls |
CVE-2018-1000122 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: RTSP RTP buffer over-read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000122
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-03-14 18:29 修改: 2019-10-03 00:03
|
libcurl3-gnutls |
CVE-2018-1000301 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u11 |
curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000301
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-05-24 13:29 修改: 2019-10-03 00:03
|
libcurl3-gnutls |
CVE-2018-14618 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u12 |
curl: NTLM password overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14618
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-09-05 19:29 修改: 2019-04-22 17:48
|
libcurl3-gnutls |
CVE-2018-16839 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16839
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-10-31 18:29 修改: 2023-11-07 02:53
|
libcurl3-gnutls |
CVE-2018-16842 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Heap-based buffer over-read in the curl tool warning formatting
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16842
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-10-31 19:29 修改: 2019-08-06 17:15
|
libcurl3-gnutls |
CVE-2019-3822 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: NTLMv2 type-3 header stack buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3822
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
libcurl3-gnutls |
CVE-2019-5482 |
严重 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u16 |
curl: heap buffer overflow in function tftp_receive_packet()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5482
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-16 19:15 修改: 2023-11-07 03:11
|
libexpat1 |
CVE-2016-9063 |
严重 |
2.1.0-6+deb8u3 |
2.1.0-6+deb8u4 |
firefox: Possible integer overflow to fix inside XML_Parse in Expat
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9063
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-06-11 21:29 修改: 2022-06-27 16:42
|
libfreetype6 |
CVE-2015-9290 |
严重 |
2.5.2-3+deb8u1 |
2.5.2-3+deb8u3 |
freetype: buffer over-read in function T1_Get_Private_Dict in type1/t1parse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-9290
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-07-30 13:15 修改: 2023-11-07 02:28
|
libfreetype6 |
CVE-2017-8105 |
严重 |
2.5.2-3+deb8u1 |
2.5.2-3+deb8u2 |
freetype: heap-based buffer overflow related to the t1_decoder_parse_charstrings
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8105
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-24 18:59 修改: 2021-01-26 12:33
|
libfreetype6 |
CVE-2017-8287 |
严重 |
2.5.2-3+deb8u1 |
2.5.2-3+deb8u2 |
freetype: heap-based buffer overflow related to the t1_builder_close_contour function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8287
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-27 00:59 修改: 2021-01-26 12:33
|
libglib2.0-0 |
CVE-2018-16428 |
严重 |
2.42.1-1+b1 |
2.42.1-1+deb8u2 |
glib2: NULL pointer dereference in g_markup_parse_context_end_parse() function in gmarkup.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16428
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-09-04 00:29 修改: 2019-07-31 21:15
|
libglib2.0-0 |
CVE-2019-12450 |
严重 |
2.42.1-1+b1 |
2.42.1-1+deb8u1 |
glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12450
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-05-29 17:29 修改: 2023-11-07 03:03
|
libglib2.0-data |
CVE-2018-16428 |
严重 |
2.42.1-1 |
2.42.1-1+deb8u2 |
glib2: NULL pointer dereference in g_markup_parse_context_end_parse() function in gmarkup.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16428
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-09-04 00:29 修改: 2019-07-31 21:15
|
libglib2.0-data |
CVE-2019-12450 |
严重 |
2.42.1-1 |
2.42.1-1+deb8u1 |
glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12450
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-05-29 17:29 修改: 2023-11-07 03:03
|
libgnutls-deb0-28 |
CVE-2017-5334 |
严重 |
3.3.8-6+deb8u4 |
3.3.8-6+deb8u5 |
gnutls: Double-free while decoding crafted X.509 certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5334
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-03-24 15:59 修改: 2018-10-30 16:27
|
libgnutls-deb0-28 |
CVE-2017-5336 |
严重 |
3.3.8-6+deb8u4 |
3.3.8-6+deb8u5 |
gnutls: Stack overflow in cdk_pk_get_keyid
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5336
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-03-24 15:59 修改: 2018-10-30 16:27
|
libgnutls-deb0-28 |
CVE-2017-5337 |
严重 |
3.3.8-6+deb8u4 |
3.3.8-6+deb8u5 |
gnutls: Heap read overflow in read-packet.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5337
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-03-24 15:59 修改: 2018-10-30 16:27
|
libgraphite2-3 |
CVE-2017-7774 |
严重 |
1.3.6-1~deb8u1 |
1.3.10-1~deb8u1 |
graphite2: out of bounds read "graphite2::Silf::readGraphite"
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7774
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-04-15 12:31 修改: 2019-04-15 17:49
|
libgraphite2-3 |
CVE-2017-7778 |
严重 |
1.3.6-1~deb8u1 |
1.3.10-1~deb8u1 |
Mozilla: Vulnerabilities in the Graphite 2 library (MFSA 2017-16)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7778
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-06-11 21:29 修改: 2018-08-13 17:14
|
libicu52 |
CVE-2017-14952 |
严重 |
52.1-8+deb8u4 |
52.1-8+deb8u6 |
icu: Double free in i18n/zonemeta.cpp
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14952
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-10-16 16:29 修改: 2019-04-23 19:29
|
libidn11 |
CVE-2017-14062 |
严重 |
1.29-1+deb8u2 |
1.29-1+deb8u3 |
libidn2: Integer overflow in puny_decode.c/decode_digit
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14062
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-08-31 16:29 修改: 2020-12-07 20:17
|
libncurses5 |
CVE-2017-10684 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10684
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-29 23:29 修改: 2023-11-07 02:38
|
libncurses5 |
CVE-2017-10685 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10685
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-29 23:29 修改: 2019-10-03 00:03
|
libncursesw5 |
CVE-2017-10684 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10684
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-29 23:29 修改: 2023-11-07 02:38
|
libncursesw5 |
CVE-2017-10685 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10685
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-29 23:29 修改: 2019-10-03 00:03
|
libnss3 |
CVE-2017-5461 |
严重 |
2:3.26-1+debu8u1 |
2:3.26-1+debu8u2 |
nss: Write beyond bounds caused by bugs in Base64 de/encoding in nssb64d.c and nssb64e.c (MFSA 2017-10)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5461
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-05-11 01:29 修改: 2021-07-20 23:15
|
libnss3 |
CVE-2019-17006 |
严重 |
2:3.26-1+debu8u1 |
2:3.26-1+debu8u10 |
nss: Check length of inputs for cryptographic primitives
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17006
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-10-22 21:15 修改: 2021-07-21 11:39
|
libpixman-1-0 |
CVE-2015-5297 |
严重 |
0.32.6-3 |
0.32.6-3+deb8u1 |
pixman: general_composite_rect() integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5297
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-07-31 23:15 修改: 2019-10-09 23:14
|
libprocps3 |
CVE-2018-1126 |
严重 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1126
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-05-23 13:29 修改: 2019-07-30 13:15
|
libpython2.7-minimal |
CVE-2017-1000158 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: Integer overflow in PyString_DecodeEscape results in heap-base buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000158
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-11-17 05:29 修改: 2023-02-16 14:15
|
libpython2.7-minimal |
CVE-2018-1000802 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: Command injection in the shutil module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000802
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-09-18 17:29 修改: 2023-11-07 02:51
|
libpython2.7-minimal |
CVE-2019-9636 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: Information Disclosure due to urlsplit improper NFKC normalization
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9636
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-08 21:29 修改: 2023-11-07 03:13
|
libpython2.7-minimal |
CVE-2019-9948 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9948
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-23 18:29 修改: 2023-11-07 03:13
|
libpython2.7-stdlib |
CVE-2017-1000158 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: Integer overflow in PyString_DecodeEscape results in heap-base buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000158
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-11-17 05:29 修改: 2023-02-16 14:15
|
libpython2.7-stdlib |
CVE-2018-1000802 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: Command injection in the shutil module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000802
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-09-18 17:29 修改: 2023-11-07 02:51
|
libpython2.7-stdlib |
CVE-2019-9636 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: Information Disclosure due to urlsplit improper NFKC normalization
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9636
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-08 21:29 修改: 2023-11-07 03:13
|
libpython2.7-stdlib |
CVE-2019-9948 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9948
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-23 18:29 修改: 2023-11-07 03:13
|
librtmp1 |
CVE-2015-8271 |
严重 |
2.4+20150115.gita107cef-1 |
2.4+20150115.gita107cef-1+deb8u1 |
The AMF3CD_AddProp function in amf.c in RTMPDump 2.4 allows remote RTM ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8271
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-04-13 14:59 修改: 2017-11-04 01:29
|
libsndfile1 |
CVE-2017-12562 |
严重 |
1.0.25-9.1+deb8u1 |
|
libsndfile: Heap-based Buffer Overflow in psf_binheader_writef function in common.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12562
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-08-05 17:29 修改: 2022-12-02 22:58
|
libsqlite3-0 |
CVE-2017-10989 |
严重 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u4 |
sqlite: Heap-buffer overflow in the getNodeSize function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10989
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-07-07 12:29 修改: 2019-10-03 00:03
|
libsqlite3-0 |
CVE-2017-2518 |
严重 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u4 |
An issue was discovered in certain Apple products. iOS before 10.3.2 i ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2518
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-05-22 05:29 修改: 2019-10-03 00:03
|
libsqlite3-0 |
CVE-2017-2519 |
严重 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u4 |
An issue was discovered in certain Apple products. iOS before 10.3.2 i ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2519
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-05-22 05:29 修改: 2019-10-03 00:03
|
libsqlite3-0 |
CVE-2017-2520 |
严重 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u4 |
An issue was discovered in certain Apple products. iOS before 10.3.2 i ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2520
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-05-22 05:29 修改: 2019-10-03 00:03
|
libsqlite3-0 |
CVE-2019-8457 |
严重 |
3.8.7.1-1+deb8u2 |
|
sqlite: heap out-of-bound read in function rtreenode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8457
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-05-30 16:29 修改: 2023-11-07 03:13
|
libssh2-1 |
CVE-2019-3858 |
严重 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u2 |
libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3858
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-03-21 21:29 修改: 2023-11-07 03:10
|
libssh2-1 |
CVE-2019-3859 |
严重 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u4 |
libssh2: Unchecked use of _libssh2_packet_require and _libssh2_packet_requirev resulting in out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3859
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:10
|
libssh2-1 |
CVE-2019-3860 |
严重 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u5 |
libssh2: Out-of-bounds reads with specially crafted SFTP packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3860
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-03-25 19:29 修改: 2023-11-07 03:10
|
libssh2-1 |
CVE-2019-3861 |
严重 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u2 |
libssh2: Out-of-bounds reads with specially crafted SSH packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3861
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-03-25 19:29 修改: 2023-11-07 03:10
|
libssh2-1 |
CVE-2019-3862 |
严重 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u2 |
libssh2: Out-of-bounds memory comparison with specially crafted message channel request
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3862
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:10
|
libsvn1 |
CVE-2017-9800 |
严重 |
1.8.10-6+deb8u4 |
1.8.10-6+deb8u5 |
subversion: Command injection through clients via malicious svn+ssh URLs
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9800
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-08-11 21:29 修改: 2023-11-07 02:50
|
libtiff5 |
CVE-2015-7554 |
严重 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u4 |
libtiff: Invalid-write in _TIFFVGetField() when parsing some extension tags
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7554
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-01-08 19:59 修改: 2018-10-30 16:27
|
libtiff5 |
CVE-2016-9535 |
严重 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Predictor heap-buffer-overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9535
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-11-22 19:59 修改: 2018-01-05 02:31
|
libtiff5 |
CVE-2017-5225 |
严重 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Heap-buffer overflow in tools/tiffcp via crafted BitsPerSample value
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5225
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-01-12 11:59 修改: 2017-11-04 01:29
|
libtinfo5 |
CVE-2017-10684 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10684
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-29 23:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-10685 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10685
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-29 23:29 修改: 2019-10-03 00:03
|
libx11-6 |
CVE-2018-14599 |
严重 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Off-by-one error in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14599
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-6 |
CVE-2018-14600 |
严重 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Out of Bounds write in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14600
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2019-08-06 17:15
|
libx11-data |
CVE-2018-14599 |
严重 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Off-by-one error in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14599
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-data |
CVE-2018-14600 |
严重 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Out of Bounds write in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14600
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2019-08-06 17:15
|
libx11-dev |
CVE-2018-14599 |
严重 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Off-by-one error in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14599
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-dev |
CVE-2018-14600 |
严重 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Out of Bounds write in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14600
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2019-08-06 17:15
|
libx11-doc |
CVE-2018-14599 |
严重 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Off-by-one error in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14599
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-doc |
CVE-2018-14600 |
严重 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Out of Bounds write in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14600
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2019-08-06 17:15
|
libx11-xcb1 |
CVE-2018-14599 |
严重 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Off-by-one error in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14599
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libx11-xcb1 |
CVE-2018-14600 |
严重 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Out of Bounds write in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14600
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2019-08-06 17:15
|
libxcursor1 |
CVE-2015-9262 |
严重 |
1:1.1.14-1+b1 |
1:1.1.14-1+deb8u2 |
libxcursor: 1-byte heap-based overflow in _XcursorThemeInherits function in library.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-9262
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-01 23:29 修改: 2019-04-16 19:08
|
libxml2 |
CVE-2016-4448 |
严重 |
2.9.1+dfsg1-5+deb8u4 |
|
libxml2: Format string vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-4448
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-06-09 16:59 修改: 2023-02-12 23:21
|
libxml2 |
CVE-2017-16931 |
严重 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Mishandling parameter-entity references
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16931
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-11-23 21:29 修改: 2021-07-20 23:15
|
libxml2 |
CVE-2017-7375 |
严重 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Missing validation for external entities in xmlParsePEReference
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7375
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-02-19 19:29 修改: 2018-03-18 14:17
|
libxml2 |
CVE-2017-7376 |
严重 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Incorrect limit used for port values
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7376
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-02-19 19:29 修改: 2019-05-17 15:15
|
libxml2 |
CVE-2017-8872 |
严重 |
2.9.1+dfsg1-5+deb8u4 |
|
libxml2: Out-of-bounds read in htmlParseTryOrFinish
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8872
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-05-10 05:29 修改: 2020-09-10 01:15
|
login |
CVE-2017-12424 |
严重 |
1:4.2-3+deb8u1 |
|
shadow-utils: Buffer overflow via newusers tool
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12424
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-04 09:29 修改: 2021-03-23 20:02
|
mercurial |
CVE-2017-1000116 |
严重 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u4 |
mercurial: command injection on clients through malicious ssh URLs
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000116
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-05 01:29 修改: 2019-10-03 00:03
|
mercurial |
CVE-2017-17458 |
严重 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u6 |
mercurial: arbitrary command execution in mercurial repo with a git submodule
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17458
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-12-07 18:29 修改: 2020-07-31 13:15
|
mercurial |
CVE-2018-1000132 |
严重 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u5 |
mercurial: HTTP server permissions bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000132
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-03-14 13:29 修改: 2020-07-31 13:15
|
mercurial |
CVE-2018-13347 |
严重 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u5 |
mercurial: Buffer underflow in mpatch.c:mpatch_apply()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13347
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-07-06 00:29 修改: 2020-07-31 13:15
|
mercurial-common |
CVE-2017-1000116 |
严重 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u4 |
mercurial: command injection on clients through malicious ssh URLs
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000116
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-05 01:29 修改: 2019-10-03 00:03
|
mercurial-common |
CVE-2017-17458 |
严重 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u6 |
mercurial: arbitrary command execution in mercurial repo with a git submodule
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17458
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-12-07 18:29 修改: 2020-07-31 13:15
|
mercurial-common |
CVE-2018-1000132 |
严重 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u5 |
mercurial: HTTP server permissions bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000132
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-03-14 13:29 修改: 2020-07-31 13:15
|
mercurial-common |
CVE-2018-13347 |
严重 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u5 |
mercurial: Buffer underflow in mpatch.c:mpatch_apply()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13347
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-07-06 00:29 修改: 2020-07-31 13:15
|
ncurses-base |
CVE-2017-10684 |
严重 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10684
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-29 23:29 修改: 2023-11-07 02:38
|
ncurses-base |
CVE-2017-10685 |
严重 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10685
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-29 23:29 修改: 2019-10-03 00:03
|
ncurses-bin |
CVE-2017-10684 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10684
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-29 23:29 修改: 2023-11-07 02:38
|
ncurses-bin |
CVE-2017-10685 |
严重 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Stack-based buffer overflow caused by format string vulnerability in fmt_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10685
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-29 23:29 修改: 2019-10-03 00:03
|
openssh-client |
CVE-2016-1908 |
严重 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u6 |
openssh: possible fallback from untrusted to trusted X11 forwarding
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1908
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-04-11 18:59 修改: 2022-12-13 12:15
|
passwd |
CVE-2017-12424 |
严重 |
1:4.2-3+deb8u1 |
|
shadow-utils: Buffer overflow via newusers tool
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12424
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-04 09:29 修改: 2021-03-23 20:02
|
perl |
CVE-2017-12883 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u9 |
perl: Buffer over-read in regular expression parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12883
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl |
CVE-2018-18311 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u12 |
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18311
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl |
CVE-2018-6797 |
严重 |
5.20.2-3+deb8u6 |
|
perl: heap write overflow in regcomp.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6797
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
perl |
CVE-2018-6913 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u10 |
perl: heap buffer overflow in pp_pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6913
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
perl-base |
CVE-2017-12883 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u9 |
perl: Buffer over-read in regular expression parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12883
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl-base |
CVE-2018-18311 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u12 |
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18311
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl-base |
CVE-2018-6797 |
严重 |
5.20.2-3+deb8u6 |
|
perl: heap write overflow in regcomp.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6797
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
perl-base |
CVE-2018-6913 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u10 |
perl: heap buffer overflow in pp_pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6913
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
perl-modules |
CVE-2017-12883 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u9 |
perl: Buffer over-read in regular expression parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12883
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl-modules |
CVE-2018-18311 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u12 |
perl: Integer overflow leading to buffer overflow in Perl_my_setenv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18311
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-12-07 21:29 修改: 2023-11-07 02:55
|
perl-modules |
CVE-2018-6797 |
严重 |
5.20.2-3+deb8u6 |
|
perl: heap write overflow in regcomp.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6797
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
perl-modules |
CVE-2018-6913 |
严重 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u10 |
perl: heap buffer overflow in pp_pack.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6913
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-04-17 20:29 修改: 2020-08-24 17:37
|
procps |
CVE-2018-1126 |
严重 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1126
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-05-23 13:29 修改: 2019-07-30 13:15
|
python2.7 |
CVE-2017-1000158 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: Integer overflow in PyString_DecodeEscape results in heap-base buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000158
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-11-17 05:29 修改: 2023-02-16 14:15
|
python2.7 |
CVE-2018-1000802 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: Command injection in the shutil module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000802
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-09-18 17:29 修改: 2023-11-07 02:51
|
python2.7 |
CVE-2019-9636 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: Information Disclosure due to urlsplit improper NFKC normalization
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9636
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-08 21:29 修改: 2023-11-07 03:13
|
python2.7 |
CVE-2019-9948 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9948
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-23 18:29 修改: 2023-11-07 03:13
|
python2.7-minimal |
CVE-2017-1000158 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: Integer overflow in PyString_DecodeEscape results in heap-base buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000158
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-11-17 05:29 修改: 2023-02-16 14:15
|
python2.7-minimal |
CVE-2018-1000802 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: Command injection in the shutil module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000802
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-09-18 17:29 修改: 2023-11-07 02:51
|
python2.7-minimal |
CVE-2019-9636 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: Information Disclosure due to urlsplit improper NFKC normalization
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9636
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-08 21:29 修改: 2023-11-07 03:13
|
python2.7-minimal |
CVE-2019-9948 |
严重 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9948
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-23 18:29 修改: 2023-11-07 03:13
|
subversion |
CVE-2017-9800 |
严重 |
1.8.10-6+deb8u4 |
1.8.10-6+deb8u5 |
subversion: Command injection through clients via malicious svn+ssh URLs
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9800
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-08-11 21:29 修改: 2023-11-07 02:50
|
wget |
CVE-2019-5953 |
严重 |
1.16-1+deb8u1 |
1.16-1+deb8u6 |
wget: do_conversion() heap-based buffer overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5953
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-05-17 16:29 修改: 2020-08-24 17:37
|
zlib1g |
CVE-2016-9841 |
严重 |
1:1.2.8.dfsg-2+b1 |
1:1.2.8.dfsg-2+deb8u1 |
zlib: Out-of-bounds pointer arithmetic in inffast.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9841
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-05-23 04:29 修改: 2023-11-07 02:37
|
zlib1g |
CVE-2016-9843 |
严重 |
1:1.2.8.dfsg-2+b1 |
1:1.2.8.dfsg-2+deb8u1 |
zlib: Big-endian out-of-bounds pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9843
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-05-23 04:29 修改: 2023-11-07 02:37
|
libgraphite2-3 |
CVE-2017-7777 |
高危 |
1.3.6-1~deb8u1 |
1.3.10-1~deb8u1 |
graphite2: use of uninitialized memory "graphite2::GlyphCache::Loader::read_glyph"
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7777
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-04-15 12:31 修改: 2019-04-15 17:45
|
libgraphite2-3 |
CVE-2018-7999 |
高危 |
1.3.6-1~deb8u1 |
|
graphite2: NULL pointer dereference in Segment.cpp in libgraphite2
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7999
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-03-09 19:29 修改: 2023-11-07 03:01
|
libharfbuzz0b |
CVE-2015-8947 |
高危 |
0.9.35-2 |
0.9.35-2+deb8u1 |
chromium-browser: Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8947
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-07-19 10:59 修改: 2018-01-05 02:30
|
libc6 |
CVE-2017-1000366 |
高危 |
2.19-18+deb8u7 |
2.19-18+deb8u10 |
glibc: heap/stack gap jumping via unbounded stack allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000366
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-19 16:29 修改: 2020-10-15 13:28
|
libicu52 |
CVE-2017-7867 |
高危 |
52.1-8+deb8u4 |
52.1-8+deb8u5 |
icu: Heap-buffer overflow in utext_setNativeIndex function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7867
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-04-14 04:59 修改: 2019-04-23 19:31
|
libicu52 |
CVE-2017-7868 |
高危 |
52.1-8+deb8u4 |
52.1-8+deb8u5 |
icu: Heap-buffer overflow in utext_moveIndex32 function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7868
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-04-14 04:59 修改: 2019-04-23 19:31
|
libicu52 |
CVE-2020-10531 |
高危 |
52.1-8+deb8u4 |
52.1-8+deb8u8 |
ICU: Integer overflow in UnicodeString::doAppend()
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10531
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2020-03-12 19:15 修改: 2023-11-07 03:14
|
libcups2 |
CVE-2017-18190 |
高危 |
1.7.5-11+deb8u1 |
1.7.5-11+deb8u3 |
cups: DNS rebinding attacks via incorrect whitelist
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18190
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-02-16 17:29 修改: 2019-10-03 00:03
|
libjasper1 |
CVE-2016-10249 |
高危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u3 |
jasper: integer overflow in jas_matrix_create()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10249
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-15 14:59 修改: 2018-01-05 02:30
|
libjasper1 |
CVE-2016-10251 |
高危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u3 |
jasper: integer overflow in jpc_pi_nextcprl(), leading to out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10251
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-15 14:59 修改: 2018-01-05 02:30
|
libjasper1 |
CVE-2016-8654 |
高危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u2 |
jasper: heap-based buffer overflow in QMFB code in JPC codec
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8654
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-01 16:29 修改: 2023-11-07 02:36
|
libjasper1 |
CVE-2016-8693 |
高危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u2 |
jasper: incorrect handling of bufsize 0 in mem_resize()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8693
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-02-15 19:59 修改: 2023-11-07 02:36
|
libjasper1 |
CVE-2016-9560 |
高危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u2 |
jasper: stack-based buffer overflow in jpc_dec_tileinit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9560
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-02-15 19:59 修改: 2021-03-15 22:08
|
libjasper1 |
CVE-2017-13748 |
高危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u4 |
jasper: tile memory not released on image parsing errors
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13748
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libjasper1 |
CVE-2017-14229 |
高危 |
1.900.1-debian1-2.4+deb8u1 |
|
jasper: excessive looping in jpc_dec_tileinit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14229
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-09 08:29 修改: 2019-10-03 00:03
|
libjasper1 |
CVE-2017-6852 |
高危 |
1.900.1-debian1-2.4+deb8u1 |
|
jasper: Out of bounds heap read in jpc_dec_decodepkt
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6852
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-15 14:59 修改: 2019-08-09 23:15
|
libjasper1 |
CVE-2018-19540 |
高危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u5 |
jasper: heap-based buffer overflow of size 1 in jas_icctxtdesc_input in libjasper/base/jas_icc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19540
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-11-26 03:29 修改: 2021-01-29 22:15
|
libjasper1 |
CVE-2018-19541 |
高危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u5 |
jasper: heap-based buffer over-read of size 8 in jas_image_depalettize in libjasper/base/jas_image.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19541
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-11-26 03:29 修改: 2021-01-29 21:15
|
libjasper1 |
CVE-2018-19543 |
高危 |
1.900.1-debian1-2.4+deb8u1 |
|
jasper: heap-based buffer over-read in jp2_decode() in jp2_dec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19543
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-11-26 03:29 修改: 2020-09-25 12:15
|
libjpeg62-turbo |
CVE-2016-3616 |
高危 |
1:1.3.1-12 |
1:1.3.1-12+deb8u1 |
libjpeg: null pointer dereference in cjpeg
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3616
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-02-13 18:59 修改: 2019-08-06 17:15
|
libjpeg62-turbo |
CVE-2020-13790 |
高危 |
1:1.3.1-12 |
|
libjpeg-turbo: heap-based buffer over-read in get_rgb_row() in rdppm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13790
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-06-03 19:15 修改: 2023-11-07 03:16
|
libjson-c2 |
CVE-2020-12762 |
高危 |
0.11-4 |
0.11-4+deb8u2 |
libfastjson: integer overflow and out-of-bounds write via a large JSON file
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12762
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-05-09 18:15 修改: 2023-11-07 03:15
|
liblcms2-2 |
CVE-2016-10165 |
高危 |
2.6-3+b3 |
2.6-3+deb8u1 |
lcms2: Out-of-bounds read in Type_MLU_Read()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10165
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-02-03 19:59 修改: 2024-01-10 18:26
|
libldap-2.4-2 |
CVE-2019-13565 |
高危 |
2.4.40+dfsg-1+deb8u2 |
2.4.40+dfsg-1+deb8u5 |
openldap: ACL restrictions bypass due to sasl_ssf value being set permanently
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13565
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-07-26 13:15 修改: 2023-11-07 03:03
|
libldap-2.4-2 |
CVE-2020-12243 |
高危 |
2.4.40+dfsg-1+deb8u2 |
2.4.40+dfsg-1+deb8u6 |
openldap: denial of service via nested boolean expressions in LDAP search filters
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12243
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2020-04-28 19:15 修改: 2022-04-29 13:24
|
libmount1 |
CVE-2016-2779 |
高危 |
2.25.2-6 |
|
util-linux: runuser tty hijack via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2779
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-02-07 15:59 修改: 2019-01-04 14:14
|
libcups2 |
CVE-2018-4180 |
高危 |
1.7.5-11+deb8u1 |
1.7.5-11+deb8u4 |
cups: Local privilege escalation to root due to insecure environment variable handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-4180
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-01-11 18:29 修改: 2019-10-03 00:03
|
libcups2 |
CVE-2018-6553 |
高危 |
1.7.5-11+deb8u1 |
1.7.5-11+deb8u4 |
cups: AppArmor cupsd Sandbox Bypass Due to Use of Hard Links
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6553
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-10 15:29 修改: 2019-10-03 00:03
|
libncurses5 |
CVE-2017-11112 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in append_acs function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11112
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-07-08 17:29 修改: 2018-10-21 10:29
|
libncurses5 |
CVE-2017-11113 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference vulnerability in _nc_parse_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11113
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-07-08 17:29 修改: 2019-05-06 15:00
|
libncurses5 |
CVE-2017-13728 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Infinite loop in the next_char function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13728
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncurses5 |
CVE-2017-16879 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u3 |
ncurses: Stack-based buffer overflow in the _nc_write_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16879
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-11-22 22:29 修改: 2023-11-07 02:40
|
libcups2 |
CVE-2019-8675 |
高危 |
1.7.5-11+deb8u1 |
1.7.5-11+deb8u5 |
cups: stack-buffer-overflow in libcups's asn1_get_type function
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8675
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-10-27 20:15 修改: 2020-10-29 16:02
|
libcups2 |
CVE-2019-8696 |
高危 |
1.7.5-11+deb8u1 |
1.7.5-11+deb8u5 |
cups: stack-buffer-overflow in libcups's asn1_get_packed function
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8696
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-10-27 20:15 修改: 2020-10-30 02:22
|
libncursesw5 |
CVE-2017-11112 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in append_acs function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11112
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-07-08 17:29 修改: 2018-10-21 10:29
|
libncursesw5 |
CVE-2017-11113 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference vulnerability in _nc_parse_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11113
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-07-08 17:29 修改: 2019-05-06 15:00
|
libncursesw5 |
CVE-2017-13728 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Infinite loop in the next_char function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13728
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncursesw5 |
CVE-2017-16879 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u3 |
ncurses: Stack-based buffer overflow in the _nc_write_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16879
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-11-22 22:29 修改: 2023-11-07 02:40
|
libcups2 |
CVE-2020-3898 |
高危 |
1.7.5-11+deb8u1 |
1.7.5-11+deb8u8 |
cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-3898
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-10-22 18:15 修改: 2021-07-21 11:39
|
curl |
CVE-2018-1000121 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: LDAP NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000121
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-14 18:29 修改: 2019-07-23 23:15
|
libnss3 |
CVE-2017-7502 |
高危 |
2:3.26-1+debu8u1 |
2:3.26-1+debu8u2 |
nss: Null pointer dereference when handling empty SSLv2 messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7502
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-05-30 18:29 修改: 2023-02-12 23:30
|
libnss3 |
CVE-2017-7805 |
高危 |
2:3.26-1+debu8u1 |
2:3.26-1+debu8u3 |
nss: Potential use-after-free in TLS 1.2 server when verifying client authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7805
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-06-11 21:29 修改: 2024-10-21 13:11
|
libnss3 |
CVE-2019-11719 |
高危 |
2:3.26-1+debu8u1 |
2:3.26-1+debu8u5 |
nss: Out-of-bounds read when importing curve25519 private key
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11719
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-07-23 14:15 修改: 2020-09-30 18:15
|
libnss3 |
CVE-2019-11729 |
高危 |
2:3.26-1+debu8u1 |
2:3.26-1+debu8u5 |
nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11729
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-07-23 14:15 修改: 2020-09-30 18:15
|
libnss3 |
CVE-2019-11745 |
高危 |
2:3.26-1+debu8u1 |
2:3.26-1+debu8u7 |
nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11745
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-01-08 20:15 修改: 2021-02-19 17:22
|
libnss3 |
CVE-2019-17007 |
高危 |
2:3.26-1+debu8u1 |
2:3.26-1+debu8u8 |
nss: Handling of Netscape Certificate Sequences in CERT_DecodeCertPackage() may crash with a NULL deref leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17007
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-10-22 21:15 修改: 2021-02-19 16:58
|
libpcre3 |
CVE-2015-3217 |
高危 |
2:8.35-3.3+deb8u4 |
|
pcre: stack overflow caused by mishandled group empty match (8.38/11)
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-3217
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2016-12-13 16:59 修改: 2018-05-18 01:29
|
libpcre3 |
CVE-2017-7186 |
高危 |
2:8.35-3.3+deb8u4 |
|
pcre: Invalid Unicode property lookup (8.41/7, 10.24/2)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7186
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-03-20 00:59 修改: 2018-08-17 10:29
|
curl |
CVE-2018-16890 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: NTLM type-2 heap out-of-bounds buffer read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16890
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-02-06 20:29 修改: 2023-11-07 02:53
|
curl |
CVE-2019-3823 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: SMTP end-of-response out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3823
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
libprocps3 |
CVE-2018-1122 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: Local privilege escalation in top
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1122
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-05-23 14:29 修改: 2019-10-03 00:03
|
libprocps3 |
CVE-2018-1123 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: denial of service in ps via mmap buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1123
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-05-23 14:29 修改: 2023-11-07 02:55
|
libprocps3 |
CVE-2018-1124 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: Integer overflows leading to heap overflow in file2strvec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1124
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-05-23 13:29 修改: 2020-09-09 14:58
|
libprocps3 |
CVE-2018-1125 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: stack buffer overflow in pgrep
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1125
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-05-23 14:29 修改: 2020-09-09 14:59
|
curl |
CVE-2019-5436 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u15 |
curl: TFTP receive heap buffer overflow in tftp_receive_packet() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5436
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-05-28 19:29 修改: 2023-11-07 03:11
|
dbus |
CVE-2019-12749 |
高危 |
1.8.22-0+deb8u1 |
1.8.22-0+deb8u2 |
dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12749
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-06-11 17:29 修改: 2023-11-07 03:03
|
dbus-x11 |
CVE-2019-12749 |
高危 |
1.8.22-0+deb8u1 |
1.8.22-0+deb8u2 |
dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12749
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-06-11 17:29 修改: 2023-11-07 03:03
|
gcc-4.8-base |
CVE-2018-12886 |
高危 |
4.8.4-1 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libpython2.7-minimal |
CVE-2018-1060 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1060
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-06-18 14:29 修改: 2023-11-07 02:55
|
libpython2.7-minimal |
CVE-2018-1061 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1061
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-06-19 12:29 修改: 2023-11-07 02:55
|
libpython2.7-minimal |
CVE-2018-14647 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: Missing salt initialization in _elementtree.c module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14647
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-09-25 00:29 修改: 2023-11-07 02:53
|
libpython2.7-minimal |
CVE-2019-16056 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u5 |
python: email.utils.parseaddr wrongly parses email addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16056
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-06 18:15 修改: 2023-11-07 03:05
|
libpython2.7-minimal |
CVE-2019-5010 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: NULL pointer dereference using a specially crafted X509 certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5010
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-10-31 21:15 修改: 2023-11-07 03:11
|
gcc-4.9-base |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
bsdutils |
CVE-2016-2779 |
高危 |
1:2.25.2-6 |
|
util-linux: runuser tty hijack via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2779
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-02-07 15:59 修改: 2019-01-04 14:14
|
apt |
CVE-2019-3462 |
高危 |
1.0.9.8.4 |
1.0.9.8.5 |
Incorrect sanitation of the 302 redirect field in HTTP transport metho ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3462
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-28 21:29 修改: 2023-11-07 03:09
|
git |
CVE-2017-1000117 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u4 |
git: Command injection via malicious ssh URLs
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000117
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-05 01:29 修改: 2023-11-07 02:37
|
libpython2.7-stdlib |
CVE-2018-1060 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1060
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-06-18 14:29 修改: 2023-11-07 02:55
|
libpython2.7-stdlib |
CVE-2018-1061 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1061
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-06-19 12:29 修改: 2023-11-07 02:55
|
libpython2.7-stdlib |
CVE-2018-14647 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: Missing salt initialization in _elementtree.c module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14647
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-09-25 00:29 修改: 2023-11-07 02:53
|
libpython2.7-stdlib |
CVE-2019-16056 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u5 |
python: email.utils.parseaddr wrongly parses email addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16056
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-06 18:15 修改: 2023-11-07 03:05
|
libpython2.7-stdlib |
CVE-2019-5010 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: NULL pointer dereference using a specially crafted X509 certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5010
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-10-31 21:15 修改: 2023-11-07 03:11
|
git |
CVE-2017-14867 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u5 |
git: cvsserver command injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14867
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-09-29 01:34 修改: 2023-11-07 02:39
|
librtmp1 |
CVE-2015-8270 |
高危 |
2.4+20150115.gita107cef-1 |
2.4+20150115.gita107cef-1+deb8u1 |
The AMF3ReadString function in amf.c in RTMPDump 2.4 allows remote RTM ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8270
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-04-13 14:59 修改: 2017-11-04 01:29
|
libsasl2-2 |
CVE-2019-19906 |
高危 |
2.1.26.dfsg1-13+deb8u1 |
2.1.26.dfsg1-13+deb8u2 |
cyrus-sasl: denial of service in _sasl_add_string function
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19906
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-12-19 18:15 修改: 2023-11-07 03:07
|
libsasl2-modules-db |
CVE-2019-19906 |
高危 |
2.1.26.dfsg1-13+deb8u1 |
2.1.26.dfsg1-13+deb8u2 |
cyrus-sasl: denial of service in _sasl_add_string function
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19906
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-12-19 18:15 修改: 2023-11-07 03:07
|
libsmartcols1 |
CVE-2016-2779 |
高危 |
2.25.2-6 |
|
util-linux: runuser tty hijack via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2779
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-02-07 15:59 修改: 2019-01-04 14:14
|
git |
CVE-2017-8386 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u3 |
git: Escape out of git-shell
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8386
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-06-01 16:29 修改: 2023-11-07 02:50
|
libsndfile1 |
CVE-2017-14245 |
高危 |
1.0.25-9.1+deb8u1 |
1.0.25-9.1+deb8u2 |
libsndfile: Out-of-bounds read in the function d2alaw_array()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14245
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-21 13:29 修改: 2020-10-29 19:15
|
libsndfile1 |
CVE-2017-14246 |
高危 |
1.0.25-9.1+deb8u1 |
1.0.25-9.1+deb8u2 |
libsndfile: Out-of-bounds read in the function d2ulaw_array()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14246
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-21 13:29 修改: 2020-10-29 19:15
|
libsndfile1 |
CVE-2017-6892 |
高危 |
1.0.25-9.1+deb8u1 |
|
libsndfile: Information disclosure via aiff_read_chanmap() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6892
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-06-12 16:29 修改: 2020-10-29 19:15
|
libsndfile1 |
CVE-2017-8361 |
高危 |
1.0.25-9.1+deb8u1 |
1.0.25-9.1+deb8u2 |
libsndfile: Buffer overflow in the flac_buffer_copy function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8361
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-30 19:59 修改: 2019-03-05 17:43
|
libsndfile1 |
CVE-2018-13139 |
高危 |
1.0.25-9.1+deb8u1 |
1.0.25-9.1+deb8u2 |
libsndfile: stack-based buffer overflow in sndfile-deinterleave utility
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13139
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-07-04 14:29 修改: 2020-08-24 17:37
|
libsndfile1 |
CVE-2018-19662 |
高危 |
1.0.25-9.1+deb8u1 |
1.0.25-9.1+deb8u2 |
libsndfile: buffer over-read in the function i2alaw_array in alaw.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19662
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-11-29 08:29 修改: 2020-10-29 19:15
|
libcurl3 |
CVE-2016-7141 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Incorrect reuse of client certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7141
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2016-10-03 21:59 修改: 2018-11-13 11:29
|
libcurl3 |
CVE-2016-8625 |
高危 |
7.38.0-4+deb8u5 |
|
curl: IDNA 2003 makes curl use wrong host
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8625
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-08-01 06:29 修改: 2023-11-07 02:36
|
libcurl3 |
CVE-2016-9586 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: printf floating point buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9586
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-04-23 18:29 修改: 2023-11-07 02:37
|
libcurl3 |
CVE-2017-1000254 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: FTP PWD response parser out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000254
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-10-06 13:29 修改: 2023-11-07 02:37
|
libcurl3 |
CVE-2018-1000121 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: LDAP NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000121
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-14 18:29 修改: 2019-07-23 23:15
|
libsqlite3-0 |
CVE-2018-20346 |
高危 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u3 |
sqlite: Multiple flaws in sqlite which can be triggered via corrupted internal databases (Magellan)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20346
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-12-21 21:29 修改: 2023-11-07 02:56
|
libsqlite3-0 |
CVE-2018-20506 |
高危 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u3 |
sqlite: Multiple flaws in sqlite which can be triggered via corrupted internal databases (Magellan)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20506
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-04-03 18:29 修改: 2021-07-31 08:15
|
libsqlite3-0 |
CVE-2018-8740 |
高危 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u4 |
sqlite: NULL pointer dereference with databases with schema corrupted with CREATE TABLE AS allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8740
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-03-17 00:29 修改: 2023-11-07 03:01
|
libsqlite3-0 |
CVE-2019-20218 |
高危 |
3.8.7.1-1+deb8u2 |
|
sqlite: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20218
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-01-02 14:16 修改: 2022-10-07 17:56
|
libsqlite3-0 |
CVE-2019-5827 |
高危 |
3.8.7.1-1+deb8u2 |
|
sqlite: out-of-bounds access due to the use of 32-bit memory allocator interfaces
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5827
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-06-27 17:15 修改: 2023-11-07 03:12
|
libsqlite3-0 |
CVE-2020-11655 |
高危 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u5 |
sqlite: malformed window-function query leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11655
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-04-09 03:15 修改: 2022-04-08 10:34
|
libcurl3 |
CVE-2018-16890 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: NTLM type-2 heap out-of-bounds buffer read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16890
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-02-06 20:29 修改: 2023-11-07 02:53
|
libcurl3 |
CVE-2019-3823 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: SMTP end-of-response out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3823
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
libcurl3 |
CVE-2019-5436 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u15 |
curl: TFTP receive heap buffer overflow in tftp_receive_packet() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5436
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-05-28 19:29 修改: 2023-11-07 03:11
|
git |
CVE-2018-11235 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u6 |
git: arbitrary code execution when recursively cloning a malicious repository
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11235
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-05-30 04:29 修改: 2020-05-02 00:15
|
git |
CVE-2019-1349 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u8 |
git: Recursive submodule cloning allows using git directory twice with synonymous directory name written in .git/
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1349
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-01-24 21:15 修改: 2023-11-07 03:08
|
libssh2-1 |
CVE-2019-13115 |
高危 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u4 |
libssh2: integer overflow in kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c leads to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13115
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-07-16 18:15 修改: 2023-11-07 03:03
|
libssh2-1 |
CVE-2019-17498 |
高危 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u6 |
libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17498
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-10-21 22:15 修改: 2023-11-07 03:06
|
libssh2-1 |
CVE-2019-3855 |
高危 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u2 |
libssh2: Integer overflow in transport read resulting in out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3855
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-03-21 21:29 修改: 2023-11-07 03:10
|
libssh2-1 |
CVE-2019-3856 |
高危 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u2 |
libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3856
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-03-25 19:29 修改: 2023-11-07 03:10
|
libssh2-1 |
CVE-2019-3857 |
高危 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u2 |
libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3857
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-03-25 19:29 修改: 2023-11-07 03:10
|
libssh2-1 |
CVE-2019-3863 |
高危 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u2 |
libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3863
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-03-25 18:29 修改: 2023-11-07 03:10
|
libssl1.0.0 |
CVE-2016-8610 |
高危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u6 |
SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8610
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-11-13 22:29 修改: 2024-01-26 17:44
|
libssl1.0.0 |
CVE-2017-3731 |
高危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u6 |
openssl: Truncated packet could crash via OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3731
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-05-04 19:29 修改: 2022-08-16 13:16
|
libssl1.0.0 |
CVE-2018-0732 |
高危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u9 |
openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0732
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-06-12 13:29 修改: 2023-11-07 02:51
|
libstdc++6 |
CVE-2018-12886 |
高危 |
4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
git |
CVE-2019-1352 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u8 |
git: Files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1352
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-01-24 21:15 修改: 2023-11-07 03:08
|
libsvn1 |
CVE-2019-0203 |
高危 |
1.8.10-6+deb8u4 |
1.8.10-6+deb8u7 |
subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0203
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-26 16:15 修改: 2021-07-21 11:39
|
libsystemd0 |
CVE-2017-18078 |
高危 |
215-17+deb8u6 |
215-17+deb8u12 |
systemd: Unsafe handling of hard links allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18078
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-01-29 05:29 修改: 2023-11-07 02:41
|
libsystemd0 |
CVE-2018-15686 |
高危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: line splitting via fgets() allows for state injection during daemon-reexec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15686
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-10-26 14:29 修改: 2023-11-07 02:53
|
libsystemd0 |
CVE-2018-15688 |
高危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15688
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-10-26 14:29 修改: 2022-01-31 18:30
|
libsystemd0 |
CVE-2018-16864 |
高危 |
215-17+deb8u6 |
215-17+deb8u9 |
systemd: stack overflow when calling syslog from a command with long cmdline
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16864
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-11 20:29 修改: 2023-02-13 04:51
|
libsystemd0 |
CVE-2018-16865 |
高危 |
215-17+deb8u6 |
215-17+deb8u9 |
systemd: stack overflow when receiving many journald entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16865
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-11 21:29 修改: 2023-02-13 04:52
|
libsystemd0 |
CVE-2019-3842 |
高危 |
215-17+deb8u6 |
215-17+deb8u12 |
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3842
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-04-09 21:29 修改: 2023-11-07 03:10
|
libtasn1-6 |
CVE-2017-10790 |
高危 |
4.2-3+deb8u2 |
4.2-3+deb8u4 |
libtasn1: NULL pointer dereference in the _asn1_check_identifier function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10790
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-07-02 03:29 修改: 2023-11-07 02:38
|
libtasn1-6 |
CVE-2017-6891 |
高危 |
4.2-3+deb8u2 |
4.2-3+deb8u3 |
libtasn1: Stack-based buffer overflow in asn1_find_node()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6891
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-05-22 19:29 修改: 2023-11-07 02:49
|
git |
CVE-2019-1387 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u8 |
git: Remote code execution in recursive clones with nested submodules
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1387
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-12-18 21:15 修改: 2024-06-26 10:15
|
git |
CVE-2020-11008 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u10 |
git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11008
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-04-21 19:15 修改: 2023-11-07 03:14
|
git |
CVE-2020-5260 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u9 |
git: Crafted URL containing new lines can cause credential leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-5260
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-04-14 23:15 修改: 2023-11-07 03:23
|
libtiff5 |
CVE-2016-10269 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Heap-based buffer overflow in tiff_unix.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10269
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-24 19:59 修改: 2020-10-16 21:15
|
libtiff5 |
CVE-2016-10270 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Heap-based buffer overflow in tiff_read.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10270
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-24 19:59 修改: 2017-11-04 01:29
|
libtiff5 |
CVE-2016-3658 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: out-of-bounds read in the TIFFWriteDirectoryTagLongLong8Array function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3658
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-10-03 16:09 修改: 2018-10-30 16:27
|
libtiff5 |
CVE-2017-10688 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u4 |
libtiff: Assertion abort in the TIFFWriteDirectoryTagCheckedLong8Array function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10688
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-06-29 23:29 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-11335 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u5 |
libtiff: Heap-based buffer overflow in tiff2pdf
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11335
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-07-17 13:18 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-12944 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u5 |
libtiff: Mishandled memory allocation for short files in the TIFFReadDirEntryArray function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12944
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-08-18 15:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-17095 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u10 |
libtiff: Heap-based buffer overflow in tools/pal2rgb.c can lead to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17095
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-12-02 06:29 修改: 2018-12-01 11:29
|
libtiff5 |
CVE-2017-7592 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Left shift of unsigned char without a cast
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7592
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7596 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Float out of range issue in tif_dir.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7596
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7597 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Float out of range issue in tif_dirread.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7597
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7598 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Divide-by-zero in tif_dirread.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7598
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7599 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Unsigned short out of range in tif_dirwrite.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7599
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7600 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Unsigned char out of range in tif_dirwrite.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7600
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7601 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Signed integer overflow in tif_jpeg.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7601
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7602 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Signed integer overflow in tif_read.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7602
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-9935 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u5 |
libtiff: Heap-based buffer overflow in t2p_write_pdf function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9935
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-06-26 12:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2018-12900 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u10 |
libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12900
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-06-26 22:29 修改: 2021-03-05 19:15
|
libtiff5 |
CVE-2018-16335 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u6 |
libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16335
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-09-02 03:29 修改: 2020-08-24 17:37
|
libtiff5 |
CVE-2018-17100 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u7 |
libtiff: Integer overflow in multiply_ms in tools/ppm2tiff.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17100
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-09-16 21:29 修改: 2019-03-21 16:00
|
libtiff5 |
CVE-2018-17101 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u7 |
libtiff: Two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17101
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-09-16 21:29 修改: 2019-03-21 16:00
|
libtiff5 |
CVE-2018-17795 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u5 |
libtiff: Heap-based buffer overflow in tiff2pdf.c:t2p_write_pdf()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17795
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-09-30 20:29 修改: 2020-10-16 20:15
|
libtiff5 |
CVE-2018-18557 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u7 |
libtiff: Out-of-bounds write in tif_jbig.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18557
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-10-22 16:29 修改: 2021-03-05 18:15
|
libtiff5 |
CVE-2018-5360 |
高危 |
4.0.3-12.3+deb8u2 |
|
LibTIFF: heap-based buffer over-read in the ReadTIFFImage function in coders/tiff.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5360
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-01-14 02:29 修改: 2019-04-22 16:25
|
libtiff5 |
CVE-2018-8905 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u6 |
libtiff: heap-based buffer overflow in tif_lzw.c:LZWDecodeCompat() allows for denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8905
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-03-22 04:29 修改: 2023-03-01 17:13
|
libtiff5 |
CVE-2019-17546 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u10 |
libtiff: integer overflow leading to heap-based buffer overflow in tif_getimage.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17546
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-10-14 02:15 修改: 2023-11-07 03:06
|
libtiff5 |
CVE-2019-6128 |
高危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u10 |
libtiff: memory leak in TIFFFdOpen function in tif_unix.c when using pal2rgb
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6128
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-01-11 05:29 修改: 2023-03-01 18:41
|
bzr |
CVE-2017-14176 |
高危 |
2.6.0+bzr6595-6 |
2.6.0+bzr6595-6+deb8u1 |
bzr: does not strip bzr+ssh SSH options
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14176
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-11-27 10:29 修改: 2019-10-03 00:03
|
bash |
CVE-2019-9924 |
高危 |
4.3-11+deb8u1 |
4.3-11+deb8u2 |
bash: BASH_CMD is writable in restricted bash shells
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9924
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-03-22 08:29 修改: 2022-04-05 20:11
|
libtinfo5 |
CVE-2017-11112 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in append_acs function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11112
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-07-08 17:29 修改: 2018-10-21 10:29
|
libtinfo5 |
CVE-2017-11113 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference vulnerability in _nc_parse_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11113
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-07-08 17:29 修改: 2019-05-06 15:00
|
libtinfo5 |
CVE-2017-13728 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Infinite loop in the next_char function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13728
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-16879 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u3 |
ncurses: Stack-based buffer overflow in the _nc_write_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16879
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-11-22 22:29 修改: 2023-11-07 02:40
|
libudev1 |
CVE-2017-18078 |
高危 |
215-17+deb8u6 |
215-17+deb8u12 |
systemd: Unsafe handling of hard links allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18078
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-01-29 05:29 修改: 2023-11-07 02:41
|
libudev1 |
CVE-2018-15686 |
高危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: line splitting via fgets() allows for state injection during daemon-reexec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15686
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-10-26 14:29 修改: 2023-11-07 02:53
|
libudev1 |
CVE-2018-15688 |
高危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15688
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-10-26 14:29 修改: 2022-01-31 18:30
|
libudev1 |
CVE-2018-16864 |
高危 |
215-17+deb8u6 |
215-17+deb8u9 |
systemd: stack overflow when calling syslog from a command with long cmdline
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16864
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-11 20:29 修改: 2023-02-13 04:51
|
libudev1 |
CVE-2018-16865 |
高危 |
215-17+deb8u6 |
215-17+deb8u9 |
systemd: stack overflow when receiving many journald entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16865
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-11 21:29 修改: 2023-02-13 04:52
|
libudev1 |
CVE-2019-3842 |
高危 |
215-17+deb8u6 |
215-17+deb8u12 |
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3842
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-04-09 21:29 修改: 2023-11-07 03:10
|
libuuid1 |
CVE-2016-2779 |
高危 |
2.25.2-6 |
|
util-linux: runuser tty hijack via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2779
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-02-07 15:59 修改: 2019-01-04 14:14
|
libvorbis0a |
CVE-2017-14160 |
高危 |
1.3.4-2 |
1.3.4-2+deb8u2 |
libvorbis: Out-of-bounds read in the bark_noise_hybridmp function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14160
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-21 14:29 修改: 2021-11-30 22:13
|
libvorbis0a |
CVE-2018-10392 |
高危 |
1.3.4-2 |
1.3.4-2+deb8u2 |
libvorbis: heap buffer overflow in mapping0_forward function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10392
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-04-26 05:29 修改: 2021-11-30 22:13
|
libvorbis0a |
CVE-2018-10393 |
高危 |
1.3.4-2 |
1.3.4-2+deb8u2 |
libvorbis: stack buffer overflow in bark_noise_hybridmp function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10393
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-04-26 05:29 修改: 2021-11-30 21:59
|
libvorbis0a |
CVE-2018-5146 |
高危 |
1.3.4-2 |
1.3.4-2+deb8u1 |
Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5146
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-06-11 21:29 修改: 2019-03-11 19:33
|
libvorbisenc2 |
CVE-2017-14160 |
高危 |
1.3.4-2 |
1.3.4-2+deb8u2 |
libvorbis: Out-of-bounds read in the bark_noise_hybridmp function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14160
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-21 14:29 修改: 2021-11-30 22:13
|
libvorbisenc2 |
CVE-2018-10392 |
高危 |
1.3.4-2 |
1.3.4-2+deb8u2 |
libvorbis: heap buffer overflow in mapping0_forward function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10392
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-04-26 05:29 修改: 2021-11-30 22:13
|
libvorbisenc2 |
CVE-2018-10393 |
高危 |
1.3.4-2 |
1.3.4-2+deb8u2 |
libvorbis: stack buffer overflow in bark_noise_hybridmp function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10393
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-04-26 05:29 修改: 2021-11-30 21:59
|
libvorbisenc2 |
CVE-2018-5146 |
高危 |
1.3.4-2 |
1.3.4-2+deb8u1 |
Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5146
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-06-11 21:29 修改: 2019-03-11 19:33
|
libvorbisfile3 |
CVE-2017-14160 |
高危 |
1.3.4-2 |
1.3.4-2+deb8u2 |
libvorbis: Out-of-bounds read in the bark_noise_hybridmp function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14160
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-21 14:29 修改: 2021-11-30 22:13
|
libvorbisfile3 |
CVE-2018-10392 |
高危 |
1.3.4-2 |
1.3.4-2+deb8u2 |
libvorbis: heap buffer overflow in mapping0_forward function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10392
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-04-26 05:29 修改: 2021-11-30 22:13
|
libvorbisfile3 |
CVE-2018-10393 |
高危 |
1.3.4-2 |
1.3.4-2+deb8u2 |
libvorbis: stack buffer overflow in bark_noise_hybridmp function
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10393
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-04-26 05:29 修改: 2021-11-30 21:59
|
libvorbisfile3 |
CVE-2018-5146 |
高危 |
1.3.4-2 |
1.3.4-2+deb8u1 |
Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5146
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-06-11 21:29 修改: 2019-03-11 19:33
|
git-man |
CVE-2017-1000117 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u4 |
git: Command injection via malicious ssh URLs
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000117
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-05 01:29 修改: 2023-11-07 02:37
|
git-man |
CVE-2017-14867 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u5 |
git: cvsserver command injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14867
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-09-29 01:34 修改: 2023-11-07 02:39
|
libx11-6 |
CVE-2018-14598 |
高危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Crash on invalid reply in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14598
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
git-man |
CVE-2017-8386 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u3 |
git: Escape out of git-shell
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8386
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-06-01 16:29 修改: 2023-11-07 02:50
|
git-man |
CVE-2018-11235 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u6 |
git: arbitrary code execution when recursively cloning a malicious repository
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11235
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-05-30 04:29 修改: 2020-05-02 00:15
|
libx11-data |
CVE-2018-14598 |
高危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Crash on invalid reply in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14598
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
git-man |
CVE-2019-1349 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u8 |
git: Recursive submodule cloning allows using git directory twice with synonymous directory name written in .git/
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1349
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-01-24 21:15 修改: 2023-11-07 03:08
|
libcurl3-gnutls |
CVE-2016-7141 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Incorrect reuse of client certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7141
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2016-10-03 21:59 修改: 2018-11-13 11:29
|
libx11-dev |
CVE-2018-14598 |
高危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Crash on invalid reply in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14598
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libcurl3-gnutls |
CVE-2016-8625 |
高危 |
7.38.0-4+deb8u5 |
|
curl: IDNA 2003 makes curl use wrong host
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8625
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-08-01 06:29 修改: 2023-11-07 02:36
|
libcurl3-gnutls |
CVE-2016-9586 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: printf floating point buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9586
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-04-23 18:29 修改: 2023-11-07 02:37
|
libx11-doc |
CVE-2018-14598 |
高危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Crash on invalid reply in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14598
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libcurl3-gnutls |
CVE-2017-1000254 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: FTP PWD response parser out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000254
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-06 13:29 修改: 2023-11-07 02:37
|
libcurl3-gnutls |
CVE-2018-1000121 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u10 |
curl: LDAP NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000121
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-03-14 18:29 修改: 2019-07-23 23:15
|
libx11-xcb1 |
CVE-2018-14598 |
高危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u2 |
libX11: Crash on invalid reply in XListExtensions in ListExt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14598
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-24 19:29 修改: 2023-11-07 02:52
|
libcurl3-gnutls |
CVE-2018-16890 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: NTLM type-2 heap out-of-bounds buffer read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16890
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-02-06 20:29 修改: 2023-11-07 02:53
|
libxcursor1 |
CVE-2017-16612 |
高危 |
1:1.1.14-1+b1 |
1:1.1.14-1+deb8u1 |
libXcursor: file.c: heap-based buffer overflow when reading/creating images
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16612
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-12-01 17:29 修改: 2018-04-11 01:29
|
libcurl3-gnutls |
CVE-2019-3823 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u14 |
curl: SMTP end-of-response out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3823
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
libcurl3-gnutls |
CVE-2019-5436 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u15 |
curl: TFTP receive heap buffer overflow in tftp_receive_packet() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5436
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-05-28 19:29 修改: 2023-11-07 03:11
|
libdb5.3 |
CVE-2017-10140 |
高危 |
5.3.28-9 |
5.3.28-9+deb8u1 |
libdb: Reads DB_CONFIG from the current working directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-10140
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-04-16 17:29 修改: 2020-07-15 18:15
|
libdbus-1-3 |
CVE-2019-12749 |
高危 |
1.8.22-0+deb8u1 |
1.8.22-0+deb8u2 |
dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12749
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-06-11 17:29 修改: 2023-11-07 03:03
|
git-man |
CVE-2019-1352 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u8 |
git: Files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1352
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-01-24 21:15 修改: 2023-11-07 03:08
|
libxml2 |
CVE-2017-0663 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Heap buffer overflow in xmlAddID
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-0663
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-06-14 13:29 修改: 2023-11-07 02:37
|
libxml2 |
CVE-2017-15412 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u6 |
libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15412
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-28 19:29 修改: 2023-11-07 02:39
|
libxml2 |
CVE-2017-16932 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
|
libxml2: Infinite recursion in parameter entities
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16932
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-11-23 21:29 修改: 2023-11-07 02:40
|
libxml2 |
CVE-2017-5130 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
|
chromium-browser: heap overflow in libxml2
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5130
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-02-07 23:29 修改: 2022-04-08 23:15
|
libxml2 |
CVE-2017-9047 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Buffer overflow in function xmlSnprintfElementContent
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9047
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-05-18 06:29 修改: 2023-11-07 02:50
|
libxml2 |
CVE-2017-9048 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Stack-based buffer overflow in function xmlSnprintfElementContent
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9048
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-05-18 06:29 修改: 2023-11-07 02:50
|
libxml2 |
CVE-2017-9049 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Heap-based buffer over-read in function xmlDictComputeFastKey
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9049
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-05-18 06:29 修改: 2023-11-07 02:50
|
libxml2 |
CVE-2017-9050 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u5 |
libxml2: Heap-based buffer over-read in function xmlDictAddString
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9050
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-05-18 06:29 修改: 2023-11-07 02:50
|
libxml2 |
CVE-2018-14404 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u7 |
libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14404
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-07-19 13:29 修改: 2020-09-10 01:15
|
libxml2 |
CVE-2019-19956 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u8 |
libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19956
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-12-24 16:15 修改: 2023-11-07 03:07
|
libxml2 |
CVE-2019-20388 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
|
libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20388
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-01-21 23:15 修改: 2023-11-09 14:44
|
libxml2 |
CVE-2020-7595 |
高危 |
2.9.1+dfsg1-5+deb8u4 |
|
libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-7595
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-01-21 23:15 修改: 2023-11-07 03:26
|
libexpat1 |
CVE-2017-9233 |
高危 |
2.1.0-6+deb8u3 |
2.1.0-6+deb8u4 |
expat: Inifinite loop due to invalid XML in external entity
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9233
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-07-25 20:29 修改: 2023-11-07 02:50
|
login |
CVE-2016-6252 |
高危 |
1:4.2-3+deb8u1 |
1:4.2-3+deb8u3 |
shadow-utils: Incorrect integer handling results in LPE
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6252
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-02-17 17:59 修改: 2017-11-04 01:29
|
libexpat1 |
CVE-2018-20843 |
高危 |
2.1.0-6+deb8u3 |
2.1.0-6+deb8u5 |
expat: large number of colons in input makes parser consume high amount of resources, leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20843
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-06-24 17:15 修改: 2023-11-07 02:56
|
libexpat1 |
CVE-2019-15903 |
高危 |
2.1.0-6+deb8u3 |
2.1.0-6+deb8u6 |
expat: heap-based buffer over-read via crafted XML input
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15903
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-04 06:15 修改: 2023-11-07 03:05
|
libffi6 |
CVE-2017-1000376 |
高危 |
3.1-2+b2 |
3.1-2+deb8u1 |
libffi requests an executable stack allowing attackers to more easily ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000376
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-06-19 16:29 修改: 2023-09-22 18:25
|
git-man |
CVE-2019-1387 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u8 |
git: Remote code execution in recursive clones with nested submodules
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1387
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-12-18 21:15 修改: 2024-06-26 10:15
|
mercurial |
CVE-2017-1000115 |
高危 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u4 |
Mercurial: pathaudit: path traversal via symlink
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000115
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-05 01:29 修改: 2019-05-10 14:58
|
mercurial |
CVE-2017-9462 |
高危 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u5 |
mercurial: Python debugger accessible to authorized users
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9462
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-06-06 21:29 修改: 2020-02-05 18:32
|
mercurial |
CVE-2018-13346 |
高危 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u5 |
mercurial: Missing check for fragment start position in mpatch.c:mpatch_apply()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13346
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-07-06 00:29 修改: 2020-07-31 13:15
|
mercurial |
CVE-2018-13348 |
高危 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u5 |
mercurial: Improper length check in mpatch.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13348
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-07-06 00:29 修改: 2020-07-31 13:15
|
git-man |
CVE-2020-11008 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u10 |
git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11008
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-04-21 19:15 修改: 2023-11-07 03:14
|
git-man |
CVE-2020-5260 |
高危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u9 |
git: Crafted URL containing new lines can cause credential leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-5260
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-04-14 23:15 修改: 2023-11-07 03:23
|
libfreetype6 |
CVE-2015-9381 |
高危 |
2.5.2-3+deb8u1 |
2.5.2-3+deb8u4 |
freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-9381
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-09-03 05:15 修改: 2019-09-10 03:15
|
libfreetype6 |
CVE-2016-10244 |
高危 |
2.5.2-3+deb8u1 |
2.5.2-3+deb8u2 |
freetype: parse_charstrings function in type1/t1load.c does not ensure that a font contains a glyph name
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10244
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-06 06:59 修改: 2021-01-26 12:33
|
mercurial-common |
CVE-2017-1000115 |
高危 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u4 |
Mercurial: pathaudit: path traversal via symlink
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000115
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-05 01:29 修改: 2019-05-10 14:58
|
mercurial-common |
CVE-2017-9462 |
高危 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u5 |
mercurial: Python debugger accessible to authorized users
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9462
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-06-06 21:29 修改: 2020-02-05 18:32
|
mercurial-common |
CVE-2018-13346 |
高危 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u5 |
mercurial: Missing check for fragment start position in mpatch.c:mpatch_apply()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13346
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-07-06 00:29 修改: 2020-07-31 13:15
|
mercurial-common |
CVE-2018-13348 |
高危 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u5 |
mercurial: Improper length check in mpatch.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-13348
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-07-06 00:29 修改: 2020-07-31 13:15
|
mount |
CVE-2016-2779 |
高危 |
2.25.2-6 |
|
util-linux: runuser tty hijack via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2779
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-02-07 15:59 修改: 2019-01-04 14:14
|
multiarch-support |
CVE-2017-1000366 |
高危 |
2.19-18+deb8u7 |
2.19-18+deb8u10 |
glibc: heap/stack gap jumping via unbounded stack allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000366
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-19 16:29 修改: 2020-10-15 13:28
|
libgcc1 |
CVE-2018-12886 |
高危 |
1:4.9.2-10 |
|
gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12886
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-05-22 19:29 修改: 2020-08-24 17:37
|
libgdk-pixbuf2.0-0 |
CVE-2016-6352 |
高危 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u8 |
gdk-pixbuf: Out-of-bounds write in OneLine32() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6352
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-10-03 18:59 修改: 2019-12-19 21:15
|
ncurses-base |
CVE-2017-11112 |
高危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in append_acs function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11112
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-07-08 17:29 修改: 2018-10-21 10:29
|
ncurses-base |
CVE-2017-11113 |
高危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference vulnerability in _nc_parse_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11113
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-07-08 17:29 修改: 2019-05-06 15:00
|
ncurses-base |
CVE-2017-13728 |
高危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Infinite loop in the next_char function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13728
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-base |
CVE-2017-16879 |
高危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u3 |
ncurses: Stack-based buffer overflow in the _nc_write_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16879
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-11-22 22:29 修改: 2023-11-07 02:40
|
libgdk-pixbuf2.0-0 |
CVE-2017-1000422 |
高危 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u7 |
gdk-pixbuf: Integer overflow in io-gif.c:gif_get_lzw() can lead to memory corruption and potential code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000422
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-01-02 20:29 修改: 2019-05-02 16:35
|
libgdk-pixbuf2.0-0 |
CVE-2017-2862 |
高危 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u6 |
gdk-pixbuf2: Heap overflow in the gdk_pixbuf__jpeg_image_load_increment function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2862
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-05 18:29 修改: 2022-06-07 17:39
|
ncurses-bin |
CVE-2017-11112 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in append_acs function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11112
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-07-08 17:29 修改: 2018-10-21 10:29
|
ncurses-bin |
CVE-2017-11113 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference vulnerability in _nc_parse_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11113
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-07-08 17:29 修改: 2019-05-06 15:00
|
ncurses-bin |
CVE-2017-13728 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Infinite loop in the next_char function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13728
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-bin |
CVE-2017-16879 |
高危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u3 |
ncurses: Stack-based buffer overflow in the _nc_write_entry function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16879
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-11-22 22:29 修改: 2023-11-07 02:40
|
libgdk-pixbuf2.0-0 |
CVE-2017-2870 |
高危 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u8 |
gdk-pixbuf2: Integer overflow in tiff_image_parse function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2870
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-05 18:29 修改: 2022-06-07 17:39
|
openssh-client |
CVE-2015-5600 |
高危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u6 |
openssh: MaxAuthTries limit bypass via duplicates in KbdInteractiveDevices
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5600
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2015-08-03 01:59 修改: 2022-12-13 12:15
|
openssh-client |
CVE-2016-10009 |
高危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u6 |
openssh: loading of untrusted PKCS#11 modules in ssh-agent
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10009
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-01-05 02:59 修改: 2023-07-20 18:15
|
openssh-client |
CVE-2016-10012 |
高危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u6 |
openssh: Bounds check can be evaded in the shared memory manager used by pre-authentication compression support
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10012
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-01-05 02:59 修改: 2023-11-07 02:29
|
openssh-client |
CVE-2016-10708 |
高危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u6 |
openssh: Out of sequence NEWKEYS message can allow remote attacker to cause denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10708
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-01-21 22:29 修改: 2023-11-07 02:29
|
openssh-client |
CVE-2016-6515 |
高危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u6 |
openssh: Denial of service via very long passwords
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6515
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2016-08-07 21:59 修改: 2023-11-07 02:34
|
openssh-client |
CVE-2016-8858 |
高危 |
1:6.7p1-5+deb8u3 |
|
openssh: Memory exhaustion due to unregistered KEXINIT handler after receiving message
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8858
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2016-12-09 11:59 修改: 2024-08-06 03:15
|
openssl |
CVE-2016-8610 |
高危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u6 |
SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8610
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-11-13 22:29 修改: 2024-01-26 17:44
|
openssl |
CVE-2017-3731 |
高危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u6 |
openssl: Truncated packet could crash via OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3731
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-05-04 19:29 修改: 2022-08-16 13:16
|
openssl |
CVE-2018-0732 |
高危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u9 |
openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0732
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-06-12 13:29 修改: 2023-11-07 02:51
|
libgdk-pixbuf2.0-0 |
CVE-2017-6313 |
高危 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u8 |
gdk-pixbuf: Integer underflow in io-icns.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6313
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-10 02:59 修改: 2023-11-07 02:49
|
passwd |
CVE-2016-6252 |
高危 |
1:4.2-3+deb8u1 |
1:4.2-3+deb8u3 |
shadow-utils: Incorrect integer handling results in LPE
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6252
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-02-17 17:59 修改: 2017-11-04 01:29
|
libgdk-pixbuf2.0-common |
CVE-2016-6352 |
高危 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u8 |
gdk-pixbuf: Out-of-bounds write in OneLine32() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6352
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-10-03 18:59 修改: 2019-12-19 21:15
|
libgdk-pixbuf2.0-common |
CVE-2017-1000422 |
高危 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u7 |
gdk-pixbuf: Integer overflow in io-gif.c:gif_get_lzw() can lead to memory corruption and potential code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000422
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-01-02 20:29 修改: 2019-05-02 16:35
|
libgdk-pixbuf2.0-common |
CVE-2017-2862 |
高危 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u6 |
gdk-pixbuf2: Heap overflow in the gdk_pixbuf__jpeg_image_load_increment function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2862
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-05 18:29 修改: 2022-06-07 17:39
|
libgdk-pixbuf2.0-common |
CVE-2017-2870 |
高危 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u8 |
gdk-pixbuf2: Integer overflow in tiff_image_parse function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2870
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-05 18:29 修改: 2022-06-07 17:39
|
perl |
CVE-2017-12837 |
高危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u9 |
perl: Heap buffer overflow in regular expression compiler
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12837
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl |
CVE-2018-12015 |
高危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u11 |
perl: Directory traversal in Archive::Tar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12015
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-06-07 13:29 修改: 2020-08-24 17:37
|
libgdk-pixbuf2.0-common |
CVE-2017-6313 |
高危 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u8 |
gdk-pixbuf: Integer underflow in io-icns.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6313
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-10 02:59 修改: 2023-11-07 02:49
|
gnupg |
CVE-2018-12020 |
高危 |
1.4.18-7+deb8u3 |
1.4.18-7+deb8u5 |
gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12020
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-06-08 21:29 修改: 2022-04-18 17:30
|
gpgv |
CVE-2018-12020 |
高危 |
1.4.18-7+deb8u3 |
1.4.18-7+deb8u5 |
gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12020
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-06-08 21:29 修改: 2022-04-18 17:30
|
libglib2.0-0 |
CVE-2018-16429 |
高危 |
2.42.1-1+b1 |
2.42.1-1+deb8u2 |
glib2: Out-of-bounds read in g_markup_parse_context_parse() in gmarkup.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16429
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-09-04 00:29 修改: 2023-11-07 02:53
|
perl-base |
CVE-2017-12837 |
高危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u9 |
perl: Heap buffer overflow in regular expression compiler
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12837
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl-base |
CVE-2018-12015 |
高危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u11 |
perl: Directory traversal in Archive::Tar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12015
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-06-07 13:29 修改: 2020-08-24 17:37
|
libglib2.0-0 |
CVE-2019-13012 |
高危 |
2.42.1-1+b1 |
2.42.1-1+deb8u3 |
glib2: insecure permissions for files and directories
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13012
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-06-28 15:15 修改: 2023-11-07 03:03
|
curl |
CVE-2016-7141 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: Incorrect reuse of client certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7141
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2016-10-03 21:59 修改: 2018-11-13 11:29
|
libapt-pkg4.12 |
CVE-2019-3462 |
高危 |
1.0.9.8.4 |
1.0.9.8.5 |
Incorrect sanitation of the 302 redirect field in HTTP transport metho ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3462
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-28 21:29 修改: 2023-11-07 03:09
|
libglib2.0-data |
CVE-2018-16429 |
高危 |
2.42.1-1 |
2.42.1-1+deb8u2 |
glib2: Out-of-bounds read in g_markup_parse_context_parse() in gmarkup.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16429
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-09-04 00:29 修改: 2023-11-07 02:53
|
perl-modules |
CVE-2017-12837 |
高危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u9 |
perl: Heap buffer overflow in regular expression compiler
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12837
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-09-19 18:29 修改: 2020-07-15 03:15
|
perl-modules |
CVE-2018-12015 |
高危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u11 |
perl: Directory traversal in Archive::Tar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12015
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-06-07 13:29 修改: 2020-08-24 17:37
|
libglib2.0-data |
CVE-2019-13012 |
高危 |
2.42.1-1 |
2.42.1-1+deb8u3 |
glib2: insecure permissions for files and directories
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13012
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-06-28 15:15 修改: 2023-11-07 03:03
|
procps |
CVE-2018-1122 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: Local privilege escalation in top
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1122
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-05-23 14:29 修改: 2019-10-03 00:03
|
procps |
CVE-2018-1123 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: denial of service in ps via mmap buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1123
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-05-23 14:29 修改: 2023-11-07 02:55
|
procps |
CVE-2018-1124 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: Integer overflows leading to heap overflow in file2strvec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1124
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-05-23 13:29 修改: 2020-09-09 14:58
|
procps |
CVE-2018-1125 |
高危 |
2:3.3.9-9 |
2:3.3.9-9+deb8u1 |
procps: stack buffer overflow in pgrep
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1125
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-05-23 14:29 修改: 2020-09-09 14:59
|
python-bzrlib |
CVE-2017-14176 |
高危 |
2.6.0+bzr6595-6 |
2.6.0+bzr6595-6+deb8u1 |
bzr: does not strip bzr+ssh SSH options
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14176
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-11-27 10:29 修改: 2019-10-03 00:03
|
libblkid1 |
CVE-2016-2779 |
高危 |
2.25.2-6 |
|
util-linux: runuser tty hijack via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2779
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-02-07 15:59 修改: 2019-01-04 14:14
|
curl |
CVE-2016-8625 |
高危 |
7.38.0-4+deb8u5 |
|
curl: IDNA 2003 makes curl use wrong host
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8625
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-08-01 06:29 修改: 2023-11-07 02:36
|
curl |
CVE-2016-9586 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u13 |
curl: printf floating point buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9586
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-04-23 18:29 修改: 2023-11-07 02:37
|
libgnutls-deb0-28 |
CVE-2017-5335 |
高危 |
3.3.8-6+deb8u4 |
3.3.8-6+deb8u5 |
gnutls: Out of memory while parsing crafted OpenPGP certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5335
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-03-24 15:59 修改: 2018-10-30 16:27
|
python2.7 |
CVE-2018-1060 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1060
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-06-18 14:29 修改: 2023-11-07 02:55
|
python2.7 |
CVE-2018-1061 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1061
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-06-19 12:29 修改: 2023-11-07 02:55
|
python2.7 |
CVE-2018-14647 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: Missing salt initialization in _elementtree.c module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14647
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-09-25 00:29 修改: 2023-11-07 02:53
|
python2.7 |
CVE-2019-16056 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u5 |
python: email.utils.parseaddr wrongly parses email addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16056
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-06 18:15 修改: 2023-11-07 03:05
|
python2.7 |
CVE-2019-5010 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: NULL pointer dereference using a specially crafted X509 certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5010
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-10-31 21:15 修改: 2023-11-07 03:11
|
libgnutls-deb0-28 |
CVE-2017-7507 |
高危 |
3.3.8-6+deb8u4 |
3.3.8-6+deb8u6 |
gnutls: Crash upon receiving well-formed status_request extension
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7507
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-06-16 19:29 修改: 2018-01-05 02:31
|
libgnutls-deb0-28 |
CVE-2017-7869 |
高危 |
3.3.8-6+deb8u4 |
3.3.8-6+deb8u5 |
gnutls: Out-of-bounds write related to the cdk_pkt_read function (GNUTLS-SA-2017-3)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7869
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-04-14 04:59 修改: 2018-01-05 02:31
|
curl |
CVE-2017-1000254 |
高危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: FTP PWD response parser out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000254
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-10-06 13:29 修改: 2023-11-07 02:37
|
libc-bin |
CVE-2017-1000366 |
高危 |
2.19-18+deb8u7 |
2.19-18+deb8u10 |
glibc: heap/stack gap jumping via unbounded stack allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000366
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-19 16:29 修改: 2020-10-15 13:28
|
python2.7-minimal |
CVE-2018-1060 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1060
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-06-18 14:29 修改: 2023-11-07 02:55
|
python2.7-minimal |
CVE-2018-1061 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u2 |
python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1061
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-06-19 12:29 修改: 2023-11-07 02:55
|
python2.7-minimal |
CVE-2018-14647 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: Missing salt initialization in _elementtree.c module
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14647
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-09-25 00:29 修改: 2023-11-07 02:53
|
python2.7-minimal |
CVE-2019-16056 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u5 |
python: email.utils.parseaddr wrongly parses email addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16056
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-06 18:15 修改: 2023-11-07 03:05
|
python2.7-minimal |
CVE-2019-5010 |
高危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: NULL pointer dereference using a specially crafted X509 certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5010
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-10-31 21:15 修改: 2023-11-07 03:11
|
sensible-utils |
CVE-2017-17512 |
高危 |
0.0.9 |
0.0.9+deb8u1 |
sensible-browser in sensible-utils before 0.0.11 does not validate str ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17512
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-12-11 06:29 修改: 2018-03-16 01:29
|
libgraphite2-3 |
CVE-2017-7771 |
高危 |
1.3.6-1~deb8u1 |
1.3.10-1~deb8u1 |
graphite2: out of bounds read in "graphite2::Pass::readPass"
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7771
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-04-15 12:31 修改: 2019-04-15 19:58
|
subversion |
CVE-2019-0203 |
高危 |
1.8.10-6+deb8u4 |
1.8.10-6+deb8u7 |
subversion: NULL pointer dereference in svnserve leading to an unauthenticated remote DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0203
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-26 16:15 修改: 2021-07-21 11:39
|
systemd |
CVE-2017-18078 |
高危 |
215-17+deb8u6 |
215-17+deb8u12 |
systemd: Unsafe handling of hard links allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18078
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-01-29 05:29 修改: 2023-11-07 02:41
|
systemd |
CVE-2018-15686 |
高危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: line splitting via fgets() allows for state injection during daemon-reexec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15686
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-10-26 14:29 修改: 2023-11-07 02:53
|
systemd |
CVE-2018-15688 |
高危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15688
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-10-26 14:29 修改: 2022-01-31 18:30
|
systemd |
CVE-2018-16864 |
高危 |
215-17+deb8u6 |
215-17+deb8u9 |
systemd: stack overflow when calling syslog from a command with long cmdline
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16864
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-11 20:29 修改: 2023-02-13 04:51
|
systemd |
CVE-2018-16865 |
高危 |
215-17+deb8u6 |
215-17+deb8u9 |
systemd: stack overflow when receiving many journald entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16865
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-11 21:29 修改: 2023-02-13 04:52
|
systemd |
CVE-2019-3842 |
高危 |
215-17+deb8u6 |
215-17+deb8u12 |
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3842
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-04-09 21:29 修改: 2023-11-07 03:10
|
systemd-sysv |
CVE-2017-18078 |
高危 |
215-17+deb8u6 |
215-17+deb8u12 |
systemd: Unsafe handling of hard links allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18078
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-01-29 05:29 修改: 2023-11-07 02:41
|
systemd-sysv |
CVE-2018-15686 |
高危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: line splitting via fgets() allows for state injection during daemon-reexec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15686
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-10-26 14:29 修改: 2023-11-07 02:53
|
systemd-sysv |
CVE-2018-15688 |
高危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15688
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-10-26 14:29 修改: 2022-01-31 18:30
|
systemd-sysv |
CVE-2018-16864 |
高危 |
215-17+deb8u6 |
215-17+deb8u9 |
systemd: stack overflow when calling syslog from a command with long cmdline
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16864
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-11 20:29 修改: 2023-02-13 04:51
|
systemd-sysv |
CVE-2018-16865 |
高危 |
215-17+deb8u6 |
215-17+deb8u9 |
systemd: stack overflow when receiving many journald entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16865
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-11 21:29 修改: 2023-02-13 04:52
|
systemd-sysv |
CVE-2019-3842 |
高危 |
215-17+deb8u6 |
215-17+deb8u12 |
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3842
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-04-09 21:29 修改: 2023-11-07 03:10
|
udev |
CVE-2017-18078 |
高危 |
215-17+deb8u6 |
215-17+deb8u12 |
systemd: Unsafe handling of hard links allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18078
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-01-29 05:29 修改: 2023-11-07 02:41
|
udev |
CVE-2018-15686 |
高危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: line splitting via fgets() allows for state injection during daemon-reexec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15686
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-10-26 14:29 修改: 2023-11-07 02:53
|
udev |
CVE-2018-15688 |
高危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15688
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-10-26 14:29 修改: 2022-01-31 18:30
|
udev |
CVE-2018-16864 |
高危 |
215-17+deb8u6 |
215-17+deb8u9 |
systemd: stack overflow when calling syslog from a command with long cmdline
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16864
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-11 20:29 修改: 2023-02-13 04:51
|
udev |
CVE-2018-16865 |
高危 |
215-17+deb8u6 |
215-17+deb8u9 |
systemd: stack overflow when receiving many journald entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16865
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-11 21:29 修改: 2023-02-13 04:52
|
udev |
CVE-2019-3842 |
高危 |
215-17+deb8u6 |
215-17+deb8u12 |
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any"
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3842
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-04-09 21:29 修改: 2023-11-07 03:10
|
unzip |
CVE-2018-1000035 |
高危 |
6.0-16+deb8u2 |
6.0-16+deb8u6 |
unzip: Heap-based buffer overflow in fileio.c:UzpPassword function allows code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000035
镜像层: sha256:ce6c8756685b2bff514e0b28f78eedb671380084555af2b3833e54bb191b262a
发布日期: 2018-02-09 23:29 修改: 2020-08-24 17:37
|
util-linux |
CVE-2016-2779 |
高危 |
2.25.2-6 |
|
util-linux: runuser tty hijack via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2779
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-02-07 15:59 修改: 2019-01-04 14:14
|
libgraphite2-3 |
CVE-2017-7772 |
高危 |
1.3.6-1~deb8u1 |
1.3.10-1~deb8u1 |
graphite2: heap-buffer-overflow write "lz4::decompress" (CVE-2017-7772)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7772
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-04-12 18:29 修改: 2019-04-15 19:57
|
wget |
CVE-2016-7098 |
高危 |
1.16-1+deb8u1 |
1.16-1+deb8u7 |
wget: files rejected by access list are kept on the disk for the duration of HTTP connection
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7098
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2016-09-26 14:59 修改: 2017-09-03 01:29
|
wget |
CVE-2017-13089 |
高危 |
1.16-1+deb8u1 |
1.16-1+deb8u4 |
wget: Stack-based buffer overflow in HTTP protocol handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13089
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-10-27 19:29 修改: 2017-12-30 02:29
|
wget |
CVE-2017-13090 |
高危 |
1.16-1+deb8u1 |
1.16-1+deb8u4 |
wget: Heap-based buffer overflow in HTTP protocol handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13090
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-10-27 19:29 修改: 2017-12-30 02:29
|
libgraphite2-3 |
CVE-2017-7773 |
高危 |
1.3.6-1~deb8u1 |
1.3.10-1~deb8u1 |
graphite2: heap-buffer-overflow write "lz4::decompress" (src/Decompressor)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7773
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-04-15 12:31 修改: 2019-04-15 17:23
|
libgraphite2-3 |
CVE-2017-7776 |
高危 |
1.3.6-1~deb8u1 |
1.3.10-1~deb8u1 |
graphite2: heap-buffer-overflow read "graphite2::Silf::getClassGlyph"
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7776
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-04-15 12:31 修改: 2019-04-15 18:10
|
zlib1g |
CVE-2016-9840 |
高危 |
1:1.2.8.dfsg-2+b1 |
1:1.2.8.dfsg-2+deb8u1 |
zlib: Out-of-bounds pointer arithmetic in inftrees.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9840
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-05-23 04:29 修改: 2023-11-07 02:37
|
zlib1g |
CVE-2016-9842 |
高危 |
1:1.2.8.dfsg-2+b1 |
1:1.2.8.dfsg-2+deb8u1 |
zlib: Undefined left shift of negative number
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9842
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-05-23 04:29 修改: 2024-08-28 16:07
|
libkrb5support0 |
CVE-2018-5710 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null pointer deference in strlen function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5710
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58
|
libkrb5support0 |
CVE-2018-5729 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libcups2 |
CVE-2019-2228 |
中危 |
1.7.5-11+deb8u1 |
1.7.5-11+deb8u7 |
In array_find of array.c, there is a possible out-of-bounds read due t ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-2228
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-12-06 23:15 修改: 2019-12-23 01:15
|
liblcms2-2 |
CVE-2018-16435 |
中危 |
2.6-3+b3 |
2.6-3+deb8u2 |
lcms2: Integer overflow in AllocateDataSet() in cmscgats.c leading to heap-based buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16435
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-09-04 00:29 修改: 2021-05-26 11:15
|
gnupg |
CVE-2017-7526 |
中危 |
1.4.18-7+deb8u3 |
1.4.18-7+deb8u4 |
libgcrypt: Use of left-to-right sliding window method allows full RSA key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7526
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-07-26 13:29 修改: 2023-11-07 02:50
|
e2fsprogs |
CVE-2019-5094 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u1 |
e2fsprogs: Crafted ext4 partition leads to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5094
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-09-24 22:15 修改: 2023-11-07 03:11
|
libldap-2.4-2 |
CVE-2017-9287 |
中危 |
2.4.40+dfsg-1+deb8u2 |
2.4.40+dfsg-1+deb8u3 |
openldap: Double free vulnerability in servers/slapd/back-mdb/search.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9287
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-05-29 16:29 修改: 2022-06-13 19:18
|
libldap-2.4-2 |
CVE-2019-13057 |
中危 |
2.4.40+dfsg-1+deb8u2 |
2.4.40+dfsg-1+deb8u5 |
openldap: Information disclosure issue in slapd component
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13057
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-07-26 13:15 修改: 2022-06-13 18:38
|
gpgv |
CVE-2017-7526 |
中危 |
1.4.18-7+deb8u3 |
1.4.18-7+deb8u4 |
libgcrypt: Use of left-to-right sliding window method allows full RSA key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7526
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-07-26 13:29 修改: 2023-11-07 02:50
|
libmount1 |
CVE-2016-5011 |
中危 |
2.25.2-6 |
|
util-linux: Extended partition loop in MBR partition table leads to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5011
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-04-11 15:59 修改: 2020-09-11 15:22
|
e2fsprogs |
CVE-2019-5188 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u2 |
e2fsprogs: Out-of-bounds write in e2fsck/rehash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5188
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2020-01-08 16:15 修改: 2023-11-07 03:11
|
libgdk-pixbuf2.0-0 |
CVE-2017-6312 |
中危 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u8 |
gdk-pixbuf: Out-of-bounds read in io-ico.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6312
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-10 02:59 修改: 2023-11-07 02:49
|
libtiff5 |
CVE-2015-7313 |
中危 |
4.0.3-12.3+deb8u2 |
|
libtiff: OOM when parsing crafted tiff files
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7313
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-17 14:59 修改: 2017-03-20 17:02
|
libtiff5 |
CVE-2016-10095 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u4 |
libtiff: Stack-based buffer overflow in _TIFFVGetField
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10095
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-01 15:59 修改: 2021-01-29 20:15
|
libtiff5 |
CVE-2016-10266 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Divide-by-zero in tif_read.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10266
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-24 19:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2016-10267 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Divide-by-zero in tif_ojpeg.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10267
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-24 19:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-11613 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u6 |
libtiff: Memory leak via corrupt td_imagelength in TIFFOpen function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11613
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-07-26 08:29 修改: 2018-12-01 11:29
|
libtiff5 |
CVE-2017-13726 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u5 |
libtiff: Reachable assertion abort in the function TIFFWriteDirectorySec()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13726
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-08-29 06:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-13727 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u5 |
libtiff: Reachable assertion abort in the function TIFFWriteDirectoryTagSubifd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13727
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-08-29 06:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-18013 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u5 |
libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18013
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-01-01 08:29 修改: 2018-03-28 01:29
|
libtiff5 |
CVE-2017-7593 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: tif_rawdata not properly initialized in tif_read.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7593
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-7594 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Memory leak in OJPEGReadHeaderInfoSecTablesDcTable function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7594
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-7595 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u3 |
libtiff: Divide-by-zero in JPEGSetupEncode (tiff_jpeg.c)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7595
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2018-03-22 01:29
|
libtiff5 |
CVE-2017-9147 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u4 |
libtiff: Out of bounds read in _TIFFVGetField
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9147
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-05-22 18:29 修改: 2018-03-28 01:29
|
libtiff5 |
CVE-2017-9403 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u4 |
libtiff: Memory leak in TIFFReadDirEntryLong8Array
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9403
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-06-02 19:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-9404 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u4 |
libtiff: Memory leak in OJPEGReadHeaderInfoSecTablesQTable
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9404
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-06-02 19:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-9815 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u4 |
libtiff: Memory leak in the TIFFReadDirEntryLong8Array function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9815
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-06-22 15:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2017-9936 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u4 |
libtiff: memory leak in tif_jbig.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9936
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-06-26 12:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2018-10963 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u6 |
libtiff: reachable assertion in TIFFWriteDirectorySec function in tif_dirwrite.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10963
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-05-10 02:29 修改: 2019-10-03 00:03
|
libtiff5 |
CVE-2018-17000 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u8 |
libtiff: NULL pointer dereference in function _TIFFmemcmp at tif_unix.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17000
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-09-13 16:29 修改: 2019-04-05 21:29
|
libtiff5 |
CVE-2018-18661 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u10 |
libtiff: tiff2bw tool failed memory allocation leads to crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18661
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-10-26 14:29 修改: 2019-08-06 17:15
|
libtiff5 |
CVE-2018-19210 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u8 |
libtiff: NULL pointer dereference in TIFFWriteDirectorySec function in tif_dirwrite.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19210
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-11-12 19:29 修改: 2023-11-07 02:55
|
libtiff5 |
CVE-2018-5784 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u6 |
libtiff: uncontrolled resource consumption in TIFFSetDirectory function in tif_dir.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5784
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-01-19 08:29 修改: 2019-04-22 16:19
|
libtiff5 |
CVE-2018-7456 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u6 |
libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7456
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-02-24 06:29 修改: 2021-01-29 20:15
|
libtiff5 |
CVE-2019-14973 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u9 |
libtiff: integer overflow in _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14973
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-08-14 06:15 修改: 2023-11-07 03:05
|
libtiff5 |
CVE-2019-7663 |
中危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u8 |
libtiff: integer overflow in libtiff/tif_dirwrite.c resulting in an invalid pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7663
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-02-09 16:29 修改: 2020-08-24 17:37
|
libgdk-pixbuf2.0-0 |
CVE-2017-6314 |
中危 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u8 |
gdk-pixbuf: Infinite loop in io-tiff.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6314
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-10 02:59 修改: 2023-11-07 02:49
|
apt |
CVE-2020-3810 |
中危 |
1.0.9.8.4 |
1.0.9.8.6 |
Missing input validation in the ar/tar implementations of APT before v ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-3810
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2020-05-15 14:15 修改: 2023-11-07 03:23
|
libapt-pkg4.12 |
CVE-2020-3810 |
中危 |
1.0.9.8.4 |
1.0.9.8.6 |
Missing input validation in the ar/tar implementations of APT before v ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-3810
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2020-05-15 14:15 修改: 2023-11-07 03:23
|
gcc-4.8-base |
CVE-2017-11671 |
中危 |
4.8.4-1 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
libncurses5 |
CVE-2017-13729 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the _nc_save_str function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13729
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncurses5 |
CVE-2017-13730 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_read_entry_source()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13730
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-13729 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the _nc_save_str function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13729
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-13730 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_read_entry_source()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13730
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-13731 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function postprocess_termcap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13731
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-13732 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function dump_uses()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13732
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-13733 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function fmt_entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13733
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libtinfo5 |
CVE-2017-13734 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_safe_strcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13734
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2018-10-21 10:29
|
libtinfo5 |
CVE-2018-19217 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference at function _nc_name_match
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19217
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-11-12 19:29 修改: 2024-08-05 12:15
|
libncurses5 |
CVE-2017-13731 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function postprocess_termcap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13731
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncurses5 |
CVE-2017-13732 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function dump_uses()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13732
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncurses5 |
CVE-2017-13733 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function fmt_entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13733
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncurses5 |
CVE-2017-13734 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_safe_strcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13734
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2018-10-21 10:29
|
libncurses5 |
CVE-2018-19217 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference at function _nc_name_match
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19217
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-11-12 19:29 修改: 2024-08-05 12:15
|
libblkid1 |
CVE-2016-5011 |
中危 |
2.25.2-6 |
|
util-linux: Extended partition loop in MBR partition table leads to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5011
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-04-11 15:59 修改: 2020-09-11 15:22
|
libudev1 |
CVE-2018-1049 |
中危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: automount: access to automounted volumes can lock up
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1049
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-02-16 21:29 修改: 2022-01-31 18:26
|
libudev1 |
CVE-2019-6454 |
中危 |
215-17+deb8u6 |
215-17+deb8u10 |
systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6454
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:13
|
bsdutils |
CVE-2016-5011 |
中危 |
1:2.25.2-6 |
|
util-linux: Extended partition loop in MBR partition table leads to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5011
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-04-11 15:59 修改: 2020-09-11 15:22
|
libuuid1 |
CVE-2016-5011 |
中危 |
2.25.2-6 |
|
util-linux: Extended partition loop in MBR partition table leads to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5011
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-04-11 15:59 修改: 2020-09-11 15:22
|
libgdk-pixbuf2.0-common |
CVE-2017-6312 |
中危 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u8 |
gdk-pixbuf: Out-of-bounds read in io-ico.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6312
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-10 02:59 修改: 2023-11-07 02:49
|
libgdk-pixbuf2.0-common |
CVE-2017-6314 |
中危 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u8 |
gdk-pixbuf: Infinite loop in io-tiff.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6314
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-10 02:59 修改: 2023-11-07 02:49
|
libgl1-mesa-dri |
CVE-2019-5068 |
中危 |
10.3.2-1+deb8u1 |
10.3.2-1+deb8u2 |
mesa: security bypass in 3D library graphics
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5068
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-11-05 22:15 修改: 2022-06-21 19:23
|
libgl1-mesa-glx |
CVE-2019-5068 |
中危 |
10.3.2-1+deb8u1 |
10.3.2-1+deb8u2 |
mesa: security bypass in 3D library graphics
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5068
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-11-05 22:15 修改: 2022-06-21 19:23
|
libvorbis0a |
CVE-2017-11333 |
中危 |
1.3.4-2 |
1.3.4-2+deb8u3 |
libvorbis: Memory exhaustion in vorbis_analysis_wrote function in lib/block.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11333
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-07-31 13:29 修改: 2019-10-03 00:03
|
libvorbis0a |
CVE-2017-14633 |
中危 |
1.3.4-2 |
1.3.4-2+deb8u3 |
libvorbis: Out-of-bounds array read in the function mapping0_forward()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14633
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-21 07:29 修改: 2020-12-07 20:31
|
libncursesw5 |
CVE-2017-13729 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the _nc_save_str function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13729
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncursesw5 |
CVE-2017-13730 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_read_entry_source()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13730
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncursesw5 |
CVE-2017-13731 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function postprocess_termcap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13731
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncursesw5 |
CVE-2017-13732 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function dump_uses()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13732
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libvorbisenc2 |
CVE-2017-11333 |
中危 |
1.3.4-2 |
1.3.4-2+deb8u3 |
libvorbis: Memory exhaustion in vorbis_analysis_wrote function in lib/block.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11333
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-07-31 13:29 修改: 2019-10-03 00:03
|
libvorbisenc2 |
CVE-2017-14633 |
中危 |
1.3.4-2 |
1.3.4-2+deb8u3 |
libvorbis: Out-of-bounds array read in the function mapping0_forward()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14633
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-21 07:29 修改: 2020-12-07 20:31
|
libncursesw5 |
CVE-2017-13733 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function fmt_entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13733
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
libncursesw5 |
CVE-2017-13734 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_safe_strcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13734
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2018-10-21 10:29
|
libncursesw5 |
CVE-2018-19217 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference at function _nc_name_match
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19217
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-11-12 19:29 修改: 2024-08-05 12:15
|
libnettle4 |
CVE-2018-16869 |
中危 |
2.7.1-5+deb8u2 |
|
nettle: Leaky data conversion exposing a manager oracle
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16869
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-12-03 14:29 修改: 2023-02-03 14:25
|
libvorbisfile3 |
CVE-2017-11333 |
中危 |
1.3.4-2 |
1.3.4-2+deb8u3 |
libvorbis: Memory exhaustion in vorbis_analysis_wrote function in lib/block.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11333
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-07-31 13:29 修改: 2019-10-03 00:03
|
libvorbisfile3 |
CVE-2017-14633 |
中危 |
1.3.4-2 |
1.3.4-2+deb8u3 |
libvorbis: Out-of-bounds array read in the function mapping0_forward()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14633
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-21 07:29 修改: 2020-12-07 20:31
|
libglapi-mesa |
CVE-2019-5068 |
中危 |
10.3.2-1+deb8u1 |
10.3.2-1+deb8u2 |
mesa: security bypass in 3D library graphics
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5068
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-11-05 22:15 修改: 2022-06-21 19:23
|
gcc-4.9-base |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
gcc-4.9-base |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
libbz2-1.0 |
CVE-2016-3189 |
中危 |
1.0.6-7+b3 |
1.0.6-7+deb8u1 |
bzip2: heap use after free in bzip2recover
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3189
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2016-06-30 17:59 修改: 2023-11-07 02:32
|
curl |
CVE-2017-1000100 |
中危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: TFTP sends more than buffer size
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000100
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-10-05 01:29 修改: 2018-11-13 11:29
|
curl |
CVE-2017-1000101 |
中危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: URL globbing out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000101
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-10-05 01:29 修改: 2018-11-13 11:29
|
libcomerr2 |
CVE-2019-5094 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u1 |
e2fsprogs: Crafted ext4 partition leads to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5094
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-09-24 22:15 修改: 2023-11-07 03:11
|
libcurl3-gnutls |
CVE-2017-1000100 |
中危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: TFTP sends more than buffer size
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000100
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-05 01:29 修改: 2018-11-13 11:29
|
libnss3 |
CVE-2016-9074 |
中危 |
2:3.26-1+debu8u1 |
2:3.26-1+debu8u5 |
nss: Insufficient timing side-channel resistance in divSpoiler
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9074
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-06-11 21:29 修改: 2018-08-09 15:12
|
libnss3 |
CVE-2017-5462 |
中危 |
2:3.26-1+debu8u1 |
2:3.26-1+debu8u2 |
nss: DRBG flaw in NSS
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5462
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-06-11 21:29 修改: 2024-10-21 13:55
|
libnss3 |
CVE-2018-12404 |
中危 |
2:3.26-1+debu8u1 |
2:3.26-1+debu8u4 |
nss: Cache side-channel variant of the Bleichenbacher attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12404
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-05-02 17:29 修改: 2021-02-12 07:15
|
libnss3 |
CVE-2018-18508 |
中危 |
2:3.26-1+debu8u1 |
2:3.26-1+debu8u4 |
nss: NULL pointer dereference in several CMS functions resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18508
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-10-22 21:15 修改: 2021-02-18 15:20
|
libnss3 |
CVE-2019-11727 |
中危 |
2:3.26-1+debu8u1 |
|
nss: PKCS#1 v1.5 signatures can be used for TLS 1.3
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11727
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-07-23 14:15 修改: 2019-07-30 23:15
|
libnss3 |
CVE-2020-12399 |
中危 |
2:3.26-1+debu8u1 |
2:3.26-1+debu8u11 |
nss: Timing attack on DSA signature generation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12399
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-07-09 15:15 修改: 2022-01-04 16:38
|
libnss3 |
CVE-2020-12402 |
中危 |
2:3.26-1+debu8u1 |
2:3.26-1+debu8u11 |
nss: Side channel vulnerabilities during RSA key generation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12402
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-07-09 15:15 修改: 2023-11-07 03:15
|
libcurl3-gnutls |
CVE-2017-1000101 |
中危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: URL globbing out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000101
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-05 01:29 修改: 2018-11-13 11:29
|
libcomerr2 |
CVE-2019-5188 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u2 |
e2fsprogs: Out-of-bounds write in e2fsck/rehash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5188
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2020-01-08 16:15 修改: 2023-11-07 03:11
|
libpcre3 |
CVE-2017-7244 |
中危 |
2:8.35-3.3+deb8u4 |
|
pcre: invalid memory read in _pcre32_xclass (pcre_xclass.c)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7244
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
libpcre3 |
CVE-2020-14155 |
中危 |
2:8.35-3.3+deb8u4 |
|
pcre: Integer overflow when parsing callout numeric arguments
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14155
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:04
|
bash |
CVE-2016-9401 |
中危 |
4.3-11+deb8u1 |
4.3-11+deb8u2 |
bash: popd controlled free
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9401
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-01-23 21:59 修改: 2020-09-14 18:32
|
libdbus-1-3 |
CVE-2020-12049 |
中危 |
1.8.22-0+deb8u1 |
1.8.22-0+deb8u3 |
dbus: denial of service via file descriptor leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12049
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-06-08 17:15 修改: 2023-06-12 07:15
|
libelf1 |
CVE-2017-7608 |
中危 |
0.159-4.2 |
0.159-4.2+deb8u1 |
elfutils: Heap-buffer overflow in the ebl_object_note_type_name function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7608
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2019-10-03 00:03
|
libelf1 |
CVE-2017-7610 |
中危 |
0.159-4.2 |
0.159-4.2+deb8u1 |
elfutils: Heap-buffer overflow in the check_group function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7610
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2019-10-03 00:03
|
libelf1 |
CVE-2017-7611 |
中危 |
0.159-4.2 |
0.159-4.2+deb8u1 |
elfutils: Heap-buffer overflow in the check_symtab_shndx function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7611
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2019-10-03 00:03
|
libgnutls-deb0-28 |
CVE-2018-10844 |
中危 |
3.3.8-6+deb8u4 |
3.3.30-0+deb8u1 |
gnutls: HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10844
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-08-22 13:29 修改: 2023-02-13 04:50
|
libgnutls-deb0-28 |
CVE-2018-10845 |
中危 |
3.3.8-6+deb8u4 |
3.3.30-0+deb8u1 |
gnutls: HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10845
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-08-22 13:29 修改: 2023-02-13 04:50
|
libgnutls-deb0-28 |
CVE-2018-10846 |
中危 |
3.3.8-6+deb8u4 |
3.3.30-0+deb8u1 |
gnutls: "Just in Time" PRIME + PROBE cache-based side channel attack can lead to plaintext recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10846
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-08-22 13:29 修改: 2023-02-13 04:50
|
libgnutls-deb0-28 |
CVE-2018-16868 |
中危 |
3.3.8-6+deb8u4 |
|
gnutls: Bleichenbacher-like side channel leakage in PKCS#1 v1.5 verification and padding oracle verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16868
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-12-03 14:29 修改: 2022-11-30 21:20
|
libelf1 |
CVE-2017-7612 |
中危 |
0.159-4.2 |
0.159-4.2+deb8u1 |
elfutils: Heap-buffer overflow in the check_sysv_hash function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7612
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2019-10-03 00:03
|
libelf1 |
CVE-2017-7613 |
中危 |
0.159-4.2 |
0.159-4.2+deb8u1 |
elfutils: elflint.c does not validate the number of sections and segments
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7613
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-09 14:59 修改: 2019-06-20 03:15
|
libelf1 |
CVE-2018-16062 |
中危 |
0.159-4.2 |
0.159-4.2+deb8u1 |
elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16062
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-29 03:29 修改: 2023-11-07 02:53
|
libelf1 |
CVE-2018-18310 |
中危 |
0.159-4.2 |
0.159-4.2+deb8u1 |
elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18310
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-10-15 02:29 修改: 2021-11-30 21:59
|
libelf1 |
CVE-2018-18520 |
中危 |
0.159-4.2 |
0.159-4.2+deb8u1 |
elfutils: eu-size cannot handle recursive ar files
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18520
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-10-19 17:29 修改: 2021-11-30 21:59
|
libelf1 |
CVE-2018-18521 |
中危 |
0.159-4.2 |
0.159-4.2+deb8u1 |
elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18521
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-10-19 17:29 修改: 2021-11-30 21:59
|
libxml2 |
CVE-2016-9318 |
中危 |
2.9.1+dfsg1-5+deb8u4 |
|
libxml2: XML External Entity vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9318
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-11-16 00:59 修改: 2022-04-08 23:15
|
libxml2 |
CVE-2017-18258 |
中危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u7 |
libxml2: Unrestricted memory usage in xz_head() function in xzlib.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18258
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-04-08 17:29 修改: 2020-09-10 01:15
|
libxml2 |
CVE-2017-5969 |
中危 |
2.9.1+dfsg1-5+deb8u4 |
|
libxml2: Null pointer dereference in xmlSaveDoc implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-5969
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-11 16:59 修改: 2024-08-05 16:15
|
libxml2 |
CVE-2018-14567 |
中危 |
2.9.1+dfsg1-5+deb8u4 |
2.9.1+dfsg1-5+deb8u7 |
libxml2: Infinite loop caused by incorrect error detection during LZMA decompression
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14567
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-08-16 20:29 修改: 2020-09-10 01:15
|
libpython2.7-minimal |
CVE-2018-20852 |
中危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u4 |
python: Cookie domain check returns incorrect results
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20852
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-07-13 21:15 修改: 2023-11-07 02:56
|
libpython2.7-minimal |
CVE-2019-16935 |
中危 |
2.7.9-2+deb8u1 |
|
python: XSS vulnerability in the documentation XML-RPC server in server_title field
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16935
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-28 02:15 修改: 2023-11-07 03:06
|
login |
CVE-2017-2616 |
中危 |
1:4.2-3+deb8u1 |
1:4.2-3+deb8u3 |
util-linux: Sending SIGKILL to other processes with root privileges via su
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2616
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-07-27 19:29 修改: 2019-10-09 23:26
|
libpython2.7-minimal |
CVE-2019-9740 |
中危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: CRLF injection via the query part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9740
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-13 03:29 修改: 2023-11-07 03:13
|
libpython2.7-minimal |
CVE-2019-9947 |
中危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: CRLF injection via the path part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9947
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-23 18:29 修改: 2023-11-07 03:13
|
libelf1 |
CVE-2019-7149 |
中危 |
0.159-4.2 |
0.159-4.2+deb8u1 |
elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7149
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-01-29 00:29 修改: 2019-06-10 17:29
|
libelf1 |
CVE-2019-7150 |
中危 |
0.159-4.2 |
0.159-4.2+deb8u1 |
elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7150
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-01-29 00:29 修改: 2021-11-30 19:52
|
libgssapi-krb5-2 |
CVE-2015-2694 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: issues in OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2694
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2015-05-25 19:59 修改: 2020-01-21 15:46
|
libgssapi-krb5-2 |
CVE-2016-3119 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libgssapi-krb5-2 |
CVE-2016-3120 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
libgssapi-krb5-2 |
CVE-2017-11368 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
mercurial |
CVE-2019-3902 |
中危 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u7 |
mercurial: Path-checking logic bypass via symlinks and subrepositories
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3902
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-04-22 16:29 修改: 2020-07-31 13:15
|
libgssapi-krb5-2 |
CVE-2018-20217 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: Reachable assertion in the KDC using S4U2Self requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20217
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-12-26 21:29 修改: 2023-11-07 02:56
|
libgssapi-krb5-2 |
CVE-2018-5710 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null pointer deference in strlen function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5710
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58
|
libgssapi-krb5-2 |
CVE-2018-5729 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libpython2.7-stdlib |
CVE-2018-20852 |
中危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u4 |
python: Cookie domain check returns incorrect results
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20852
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-07-13 21:15 修改: 2023-11-07 02:56
|
libpython2.7-stdlib |
CVE-2019-16935 |
中危 |
2.7.9-2+deb8u1 |
|
python: XSS vulnerability in the documentation XML-RPC server in server_title field
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16935
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-28 02:15 修改: 2023-11-07 03:06
|
libpython2.7-stdlib |
CVE-2019-9740 |
中危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: CRLF injection via the query part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9740
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-13 03:29 修改: 2023-11-07 03:13
|
libpython2.7-stdlib |
CVE-2019-9947 |
中危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: CRLF injection via the path part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9947
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-23 18:29 修改: 2023-11-07 03:13
|
libelf1 |
CVE-2019-7665 |
中危 |
0.159-4.2 |
0.159-4.2+deb8u1 |
elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-7665
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-02-09 16:29 修改: 2021-11-30 19:53
|
mercurial-common |
CVE-2019-3902 |
中危 |
3.1.2-2+deb8u3 |
3.1.2-2+deb8u7 |
mercurial: Path-checking logic bypass via symlinks and subrepositories
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3902
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-04-22 16:29 修改: 2020-07-31 13:15
|
libhogweed2 |
CVE-2018-16869 |
中危 |
2.7.1-5+deb8u2 |
|
nettle: Leaky data conversion exposing a manager oracle
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16869
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-12-03 14:29 修改: 2023-02-03 14:25
|
mount |
CVE-2016-5011 |
中危 |
2.25.2-6 |
|
util-linux: Extended partition loop in MBR partition table leads to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5011
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-04-11 15:59 修改: 2020-09-11 15:22
|
librtmp1 |
CVE-2015-8272 |
中危 |
2.4+20150115.gita107cef-1 |
2.4+20150115.gita107cef-1+deb8u1 |
RTMPDump 2.4 allows remote attackers to trigger a denial of service (N ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8272
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-04-13 14:59 修改: 2017-11-04 01:29
|
libice-dev |
CVE-2017-2626 |
中危 |
2:1.0.9-1+b1 |
2:1.0.9-1+deb8u1 |
libICE: weak entropy usage in session keys
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2626
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-07-27 19:29 修改: 2023-02-12 23:29
|
libice6 |
CVE-2017-2626 |
中危 |
2:1.0.9-1+b1 |
2:1.0.9-1+deb8u1 |
libICE: weak entropy usage in session keys
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2626
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-07-27 19:29 修改: 2023-02-12 23:29
|
dbus |
CVE-2020-12049 |
中危 |
1.8.22-0+deb8u1 |
1.8.22-0+deb8u3 |
dbus: denial of service via file descriptor leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12049
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-06-08 17:15 修改: 2023-06-12 07:15
|
libsmartcols1 |
CVE-2016-5011 |
中危 |
2.25.2-6 |
|
util-linux: Extended partition loop in MBR partition table leads to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5011
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-04-11 15:59 修改: 2020-09-11 15:22
|
bzip2 |
CVE-2016-3189 |
中危 |
1.0.6-7+b3 |
1.0.6-7+deb8u1 |
bzip2: heap use after free in bzip2recover
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3189
镜像层: sha256:ce6c8756685b2bff514e0b28f78eedb671380084555af2b3833e54bb191b262a
发布日期: 2016-06-30 17:59 修改: 2023-11-07 02:32
|
dbus-x11 |
CVE-2020-12049 |
中危 |
1.8.22-0+deb8u1 |
1.8.22-0+deb8u3 |
dbus: denial of service via file descriptor leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12049
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-06-08 17:15 修改: 2023-06-12 07:15
|
ncurses-base |
CVE-2017-13729 |
中危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the _nc_save_str function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13729
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-base |
CVE-2017-13730 |
中危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_read_entry_source()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13730
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-base |
CVE-2017-13731 |
中危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function postprocess_termcap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13731
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-base |
CVE-2017-13732 |
中危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function dump_uses()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13732
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-base |
CVE-2017-13733 |
中危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function fmt_entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13733
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-base |
CVE-2017-13734 |
中危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_safe_strcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13734
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2018-10-21 10:29
|
ncurses-base |
CVE-2018-19217 |
中危 |
5.9+20140913-1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference at function _nc_name_match
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19217
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-11-12 19:29 修改: 2024-08-05 12:15
|
e2fslibs |
CVE-2019-5094 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u1 |
e2fsprogs: Crafted ext4 partition leads to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5094
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-09-24 22:15 修改: 2023-11-07 03:11
|
libicu52 |
CVE-2017-15422 |
中危 |
52.1-8+deb8u4 |
52.1-8+deb8u7 |
chromium-browser: integer overflow in icu
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15422
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-08-28 19:29 修改: 2023-11-07 02:39
|
libcurl3 |
CVE-2017-1000100 |
中危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: TFTP sends more than buffer size
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000100
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-10-05 01:29 修改: 2018-11-13 11:29
|
libcurl3 |
CVE-2017-1000101 |
中危 |
7.38.0-4+deb8u5 |
7.38.0-4+deb8u6 |
curl: URL globbing out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000101
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-10-05 01:29 修改: 2018-11-13 11:29
|
e2fslibs |
CVE-2019-5188 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u2 |
e2fsprogs: Out-of-bounds write in e2fsck/rehash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5188
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2020-01-08 16:15 修改: 2023-11-07 03:11
|
libsndfile1 |
CVE-2017-14634 |
中危 |
1.0.25-9.1+deb8u1 |
1.0.25-9.1+deb8u2 |
libsndfile: Divide-by-zero in the double64_init() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14634
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-21 07:29 修改: 2020-10-29 19:15
|
ncurses-bin |
CVE-2017-13729 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the _nc_save_str function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13729
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-bin |
CVE-2017-13730 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_read_entry_source()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13730
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-bin |
CVE-2017-13731 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function postprocess_termcap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13731
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-bin |
CVE-2017-13732 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function dump_uses()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13732
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-bin |
CVE-2017-13733 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function fmt_entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13733
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38
|
ncurses-bin |
CVE-2017-13734 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Illegal address access in the function _nc_safe_strcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13734
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-08-29 06:29 修改: 2018-10-21 10:29
|
ncurses-bin |
CVE-2018-19217 |
中危 |
5.9+20140913-1+b1 |
5.9+20140913-1+deb8u1 |
ncurses: Null pointer dereference at function _nc_name_match
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19217
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-11-12 19:29 修改: 2024-08-05 12:15
|
libsndfile1 |
CVE-2017-16942 |
中危 |
1.0.25-9.1+deb8u1 |
|
libsndfile: divide-by-zero error in wav_w64_read_fmt_chunk()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16942
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-11-25 17:29 修改: 2019-06-10 17:29
|
libsndfile1 |
CVE-2017-7585 |
中危 |
1.0.25-9.1+deb8u1 |
|
libsndfile: Stack-based buffer overflow in flac_buffer_copy()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7585
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-07 20:59 修改: 2017-07-11 01:33
|
libsndfile1 |
CVE-2017-7586 |
中危 |
1.0.25-9.1+deb8u1 |
|
libsndfile: Error in header_read() causing stack-based buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7586
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-07 20:59 修改: 2017-07-11 01:33
|
libsndfile1 |
CVE-2017-7741 |
中危 |
1.0.25-9.1+deb8u1 |
|
libsndfile: Invalid memory write in flac_buffer_copy function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7741
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-12 18:59 修改: 2017-07-11 01:33
|
libsndfile1 |
CVE-2017-7742 |
中危 |
1.0.25-9.1+deb8u1 |
|
libsndfile: Invalid memory read in flac_buffer_copy function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7742
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-12 18:59 修改: 2017-07-11 01:33
|
libsndfile1 |
CVE-2017-8362 |
中危 |
1.0.25-9.1+deb8u1 |
1.0.25-9.1+deb8u2 |
libsndfile: Out-of-bounds read in the flac_buffer_copy function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8362
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-30 19:59 修改: 2019-03-04 13:09
|
libsndfile1 |
CVE-2017-8363 |
中危 |
1.0.25-9.1+deb8u1 |
1.0.25-9.1+deb8u2 |
libsndfile: Heap buffer over-read in the flac_buffer_copy function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8363
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-30 19:59 修改: 2019-10-03 00:03
|
openssh-client |
CVE-2015-5352 |
中危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u6 |
openssh: XSECURITY restrictions bypass under certain conditions in ssh(1)
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5352
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2015-08-03 01:59 修改: 2022-12-13 12:15
|
openssh-client |
CVE-2015-6564 |
中危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u6 |
openssh: Use-after-free bug related to PAM support
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-6564
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2015-08-24 01:59 修改: 2022-12-13 12:15
|
openssh-client |
CVE-2016-10011 |
中危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u6 |
openssh: Leak of host private key material to privilege-separated child process via realloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10011
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-01-05 02:59 修改: 2022-12-13 12:15
|
openssh-client |
CVE-2016-3115 |
中危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u6 |
openssh: missing sanitisation of input for X11 forwarding
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3115
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2016-03-22 10:59 修改: 2018-09-11 10:29
|
openssh-client |
CVE-2017-15906 |
中危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u6 |
openssh: Improper write operations in readonly mode allow for zero-length file creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15906
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-26 03:29 修改: 2022-12-13 12:15
|
openssh-client |
CVE-2018-15473 |
中危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u5 |
openssh: User enumeration via malformed packets in authentication requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15473
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-08-17 19:29 修改: 2023-02-23 23:13
|
openssh-client |
CVE-2018-20685 |
中危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u8 |
openssh: scp client improper directory name validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20685
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-01-10 21:29 修改: 2023-02-23 23:15
|
openssh-client |
CVE-2019-6109 |
中危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u8 |
openssh: Missing character encoding in progress display allows for spoofing of scp client output
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6109
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-01-31 18:29 修改: 2023-11-07 03:13
|
openssh-client |
CVE-2019-6111 |
中危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u8 |
openssh: Improper validation of object names allows malicious server to overwrite files via scp client
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6111
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-01-31 18:29 修改: 2023-11-07 03:13
|
libsndfile1 |
CVE-2017-8365 |
中危 |
1.0.25-9.1+deb8u1 |
1.0.25-9.1+deb8u2 |
libsndfile: Buffer over-read in the l2les_array function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8365
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-04-30 19:59 修改: 2019-10-03 00:03
|
libsndfile1 |
CVE-2018-19432 |
中危 |
1.0.25-9.1+deb8u1 |
1.0.25-9.1+deb8u2 |
libsndfile: OOB read in sf_write_int in sndfile.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19432
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-11-22 05:29 修改: 2019-06-10 17:29
|
libsndfile1 |
CVE-2018-19661 |
中危 |
1.0.25-9.1+deb8u1 |
1.0.25-9.1+deb8u2 |
libsndfile: buffer over-read in the function i2ulaw_array in ulaw.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19661
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-11-29 08:29 修改: 2020-10-29 19:15
|
openssl |
CVE-2016-7056 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u6 |
openssl: ECDSA P-256 timing attack key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7056
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-09-10 16:29 修改: 2023-02-12 23:25
|
openssl |
CVE-2017-3735 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u7 |
openssl: Malformed X.509 IPAdressFamily could cause OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3735
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-08-28 19:29 修改: 2022-12-13 12:15
|
openssl |
CVE-2018-0734 |
中危 |
1.0.1t-1+deb8u5 |
|
openssl: timing side channel attack in the DSA signature algorithm
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0734
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-10-30 12:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-0735 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u10 |
openssl: timing side channel attack in the ECDSA signature generation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0735
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-10-29 13:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-0737 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u9 |
openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0737
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-04-16 18:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-0739 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u8 |
openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0739
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-27 21:29 修改: 2023-11-07 02:51
|
openssl |
CVE-2018-5407 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u10 |
openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5407
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-11-15 21:29 修改: 2023-11-07 02:58
|
openssl |
CVE-2019-1547 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u12 |
openssl: side-channel weak encryption vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1547
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-09-10 17:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2019-1559 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u11 |
openssl: 0-byte record padding oracle
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1559
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-02-27 23:29 修改: 2023-11-07 03:08
|
libsndfile1 |
CVE-2018-19758 |
中危 |
1.0.25-9.1+deb8u1 |
1.0.25-9.1+deb8u3 |
libsndfile: heap-based buffer over-read at wav.c in wav_write_header
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19758
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-11-30 03:29 修改: 2020-10-29 19:15
|
libsndfile1 |
CVE-2019-3832 |
中危 |
1.0.25-9.1+deb8u1 |
1.0.25-9.1+deb8u4 |
libsndfile: incomplete fix for CVE-2018-19758 still allow to read beyond buffer limits
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3832
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-03-21 16:01 修改: 2023-03-01 18:02
|
passwd |
CVE-2017-2616 |
中危 |
1:4.2-3+deb8u1 |
1:4.2-3+deb8u3 |
util-linux: Sending SIGKILL to other processes with root privileges via su
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-2616
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-07-27 19:29 修改: 2019-10-09 23:26
|
libcups2 |
CVE-2017-18248 |
中危 |
1.7.5-11+deb8u1 |
1.7.5-11+deb8u3 |
cups: Invalid usernames handled in scheduler/ipp.c:add_job() allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18248
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-03-26 17:29 修改: 2018-07-13 01:29
|
libcups2 |
CVE-2018-4181 |
中危 |
1.7.5-11+deb8u1 |
1.7.5-11+deb8u4 |
cups: Manipulation of cupsd.conf by a local attacker resulting in limited reads of arbitrary files as root
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-4181
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-01-11 18:29 修改: 2019-10-03 00:03
|
libcups2 |
CVE-2018-4300 |
中危 |
1.7.5-11+deb8u1 |
1.7.5-11+deb8u6 |
cups: Session cookie generated by the CUPS web interface is easy to guess
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-4300
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-04-03 18:29 修改: 2019-09-28 12:15
|
libfreetype6 |
CVE-2015-9382 |
中危 |
2.5.2-3+deb8u1 |
2.5.2-3+deb8u4 |
freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-9382
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-09-03 05:15 修改: 2019-09-10 03:15
|
libfreetype6 |
CVE-2015-9383 |
中危 |
2.5.2-3+deb8u1 |
2.5.2-3+deb8u4 |
freetype: a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c may lead to a DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-9383
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-09-03 05:15 修改: 2023-02-23 23:04
|
libcups2 |
CVE-2019-2180 |
中危 |
1.7.5-11+deb8u1 |
1.7.5-11+deb8u5 |
In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possi ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-2180
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-09-05 22:15 修改: 2020-08-24 17:37
|
perl |
CVE-2017-6512 |
中危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u7 |
perl-File-Path: rmtree/remove_tree race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6512
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-06-01 16:29 修改: 2020-04-29 20:24
|
libgcc1 |
CVE-2015-5276 |
中危 |
1:4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
libgcc1 |
CVE-2017-11671 |
中危 |
1:4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
libgcrypt20 |
CVE-2017-7526 |
中危 |
1.6.3-2+deb8u2 |
1.6.3-2+deb8u4 |
libgcrypt: Use of left-to-right sliding window method allows full RSA key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7526
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-07-26 13:29 修改: 2023-11-07 02:50
|
libjasper1 |
CVE-2015-5203 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u4 |
jasper: integer overflow in jas_image_cmpt_create()
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5203
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-08-02 19:29 修改: 2023-11-07 02:26
|
libjasper1 |
CVE-2015-5221 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u4 |
jasper: use-after-free and double-free flaws in mif_process_cmpt()
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5221
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-07-25 18:29 修改: 2023-11-07 02:26
|
libsqlite3-0 |
CVE-2019-16168 |
中危 |
3.8.7.1-1+deb8u2 |
|
sqlite: Division by zero in whereLoopAddBtreeIndex in sqlite3.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16168
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-09 17:15 修改: 2023-11-07 03:05
|
perl-base |
CVE-2017-6512 |
中危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u7 |
perl-File-Path: rmtree/remove_tree race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6512
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-01 16:29 修改: 2020-04-29 20:24
|
libsqlite3-0 |
CVE-2019-19645 |
中危 |
3.8.7.1-1+deb8u2 |
|
sqlite: infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19645
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-12-09 16:15 修改: 2022-04-15 16:14
|
libsqlite3-0 |
CVE-2020-13434 |
中危 |
3.8.7.1-1+deb8u2 |
3.8.7.1-1+deb8u6 |
sqlite: integer overflow in sqlite3_str_vappendf function in printf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13434
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-05-24 22:15 修改: 2023-11-07 03:16
|
libsqlite3-0 |
CVE-2020-13631 |
中危 |
3.8.7.1-1+deb8u2 |
|
sqlite: Virtual table can be renamed into the name of one of its shadow tables
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13631
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-05-27 15:15 修改: 2023-11-07 03:16
|
libss2 |
CVE-2019-5094 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u1 |
e2fsprogs: Crafted ext4 partition leads to out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5094
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-09-24 22:15 修改: 2023-11-07 03:11
|
libss2 |
CVE-2019-5188 |
中危 |
1.42.12-2+b1 |
1.42.12-2+deb8u2 |
e2fsprogs: Out-of-bounds write in e2fsck/rehash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5188
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2020-01-08 16:15 修改: 2023-11-07 03:11
|
libjasper1 |
CVE-2016-1867 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u2 |
jasper: out-of-bounds read in jpc_pi_nextcprl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1867
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-01-20 16:59 修改: 2018-01-05 02:30
|
perl-modules |
CVE-2017-6512 |
中危 |
5.20.2-3+deb8u6 |
5.20.2-3+deb8u7 |
perl-File-Path: rmtree/remove_tree race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6512
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-06-01 16:29 修改: 2020-04-29 20:24
|
libjasper1 |
CVE-2016-8690 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u4 |
jasper: missing jas_matrix_create() parameter checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8690
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-02-15 19:59 修改: 2023-11-07 02:36
|
libjasper1 |
CVE-2016-8691 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u2 |
jasper: missing SIZ marker segment XRsiz and YRsiz fields range check
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8691
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-02-15 19:59 修改: 2023-11-07 02:36
|
libjasper1 |
CVE-2016-8692 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u2 |
jasper: missing SIZ marker segment XRsiz and YRsiz fields range check
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8692
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-02-15 19:59 修改: 2023-11-07 02:36
|
libjasper1 |
CVE-2016-8882 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u2 |
jasper: uninitialized tile->pi pointer use in JPC decoder
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8882
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-01-13 16:59 修改: 2017-11-04 01:29
|
libjasper1 |
CVE-2016-9557 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
|
jasper: signed integer overflow in jas_image_create()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9557
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-23 18:59 修改: 2017-03-27 17:30
|
libjasper1 |
CVE-2016-9591 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u3 |
jasper: use-after-free / double-free in JPC encoder
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9591
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-03-09 20:29 修改: 2019-10-09 23:20
|
libjasper1 |
CVE-2017-14132 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u4 |
jasper: heap-based buffer over-read in jas_image_ishomosamp()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14132
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-09-04 20:29 修改: 2023-11-07 02:38
|
libjasper1 |
CVE-2017-9782 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
|
jasper: cdef.ents[] heap-based buffer over-read in jp2_decode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9782
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-06-21 20:29 修改: 2020-09-25 12:15
|
libjasper1 |
CVE-2018-18873 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u5 |
jasper: NULL pointer dereference in ras_putdatastd() in ras_enc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18873
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-10-31 16:29 修改: 2020-09-25 12:15
|
libjasper1 |
CVE-2018-19539 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u5 |
jasper: access violation in jas_image_readcmpt() in jas_image.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19539
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-11-26 03:29 修改: 2020-08-24 17:37
|
libjasper1 |
CVE-2018-19542 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u5 |
jasper: invalid access in jp2_decode in libjasper/jp2/jp2_dec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19542
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-11-26 03:29 修改: 2020-04-15 21:15
|
libjasper1 |
CVE-2018-20570 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u5 |
jasper: heap-based buffer over-read in jp2_encode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20570
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-12-28 16:29 修改: 2020-09-25 12:15
|
libjasper1 |
CVE-2018-20584 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u5 |
jasper: DoS / hang when converting to jp2 format
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20584
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-12-30 05:29 修改: 2023-02-28 20:44
|
libssl1.0.0 |
CVE-2016-7056 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u6 |
openssl: ECDSA P-256 timing attack key recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7056
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-09-10 16:29 修改: 2023-02-12 23:25
|
libssl1.0.0 |
CVE-2017-3735 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u7 |
openssl: Malformed X.509 IPAdressFamily could cause OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-3735
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-08-28 19:29 修改: 2022-12-13 12:15
|
python2.7 |
CVE-2018-20852 |
中危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u4 |
python: Cookie domain check returns incorrect results
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20852
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-07-13 21:15 修改: 2023-11-07 02:56
|
python2.7 |
CVE-2019-16935 |
中危 |
2.7.9-2+deb8u1 |
|
python: XSS vulnerability in the documentation XML-RPC server in server_title field
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16935
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-28 02:15 修改: 2023-11-07 03:06
|
python2.7 |
CVE-2019-9740 |
中危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: CRLF injection via the query part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9740
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-13 03:29 修改: 2023-11-07 03:13
|
python2.7 |
CVE-2019-9947 |
中危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: CRLF injection via the path part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9947
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-23 18:29 修改: 2023-11-07 03:13
|
libssl1.0.0 |
CVE-2018-0734 |
中危 |
1.0.1t-1+deb8u5 |
|
openssl: timing side channel attack in the DSA signature algorithm
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0734
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-10-30 12:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-0735 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u10 |
openssl: timing side channel attack in the ECDSA signature generation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0735
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-10-29 13:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-0737 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u9 |
openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0737
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-04-16 18:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-0739 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u8 |
openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0739
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-27 21:29 修改: 2023-11-07 02:51
|
libssl1.0.0 |
CVE-2018-5407 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u10 |
openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5407
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-11-15 21:29 修改: 2023-11-07 02:58
|
libssl1.0.0 |
CVE-2019-1547 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u12 |
openssl: side-channel weak encryption vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1547
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-09-10 17:15 修改: 2024-06-21 19:15
|
libssl1.0.0 |
CVE-2019-1559 |
中危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u11 |
openssl: 0-byte record padding oracle
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1559
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-02-27 23:29 修改: 2023-11-07 03:08
|
libjasper1 |
CVE-2018-20622 |
中危 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u5 |
jasper: memory leak in jpc_dec_decodepkt()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20622
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-12-31 19:29 修改: 2020-09-25 12:15
|
libstdc++6 |
CVE-2015-5276 |
中危 |
4.9.2-10 |
|
gcc: Predictable randomness from std::random_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5276
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2015-11-17 15:59 修改: 2019-02-12 19:05
|
python2.7-minimal |
CVE-2018-20852 |
中危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u4 |
python: Cookie domain check returns incorrect results
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20852
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-07-13 21:15 修改: 2023-11-07 02:56
|
python2.7-minimal |
CVE-2019-16935 |
中危 |
2.7.9-2+deb8u1 |
|
python: XSS vulnerability in the documentation XML-RPC server in server_title field
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16935
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-28 02:15 修改: 2023-11-07 03:06
|
python2.7-minimal |
CVE-2019-9740 |
中危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: CRLF injection via the query part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9740
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-13 03:29 修改: 2023-11-07 03:13
|
python2.7-minimal |
CVE-2019-9947 |
中危 |
2.7.9-2+deb8u1 |
2.7.9-2+deb8u3 |
python: CRLF injection via the path part of the url passed to urlopen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9947
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-03-23 18:29 修改: 2023-11-07 03:13
|
libstdc++6 |
CVE-2017-11671 |
中危 |
4.9.2-10 |
|
gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11671
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-07-26 21:29 修改: 2018-04-12 01:29
|
libgcrypt20 |
CVE-2017-9526 |
中危 |
1.6.3-2+deb8u2 |
1.6.3-2+deb8u3 |
libgcrypt: Possible timing attack on EdDSA session key
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9526
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-06-11 02:29 修改: 2023-11-07 02:50
|
libgcrypt20 |
CVE-2018-0495 |
中危 |
1.6.3-2+deb8u2 |
1.6.3-2+deb8u5 |
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0495
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-06-13 23:29 修改: 2023-11-07 02:51
|
subversion |
CVE-2018-11782 |
中危 |
1.8.10-6+deb8u4 |
1.8.10-6+deb8u7 |
subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev'
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11782
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-26 16:15 修改: 2019-09-27 15:33
|
libsvn1 |
CVE-2018-11782 |
中危 |
1.8.10-6+deb8u4 |
1.8.10-6+deb8u7 |
subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev'
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11782
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2019-09-26 16:15 修改: 2019-09-27 15:33
|
libjpeg62-turbo |
CVE-2018-11212 |
中危 |
1:1.3.1-12 |
1:1.3.1-12+deb8u1 |
libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11212
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-05-16 17:29 修改: 2022-04-20 00:15
|
libjpeg62-turbo |
CVE-2018-11213 |
中危 |
1:1.3.1-12 |
1:1.3.1-12+deb8u1 |
libjpeg: Segmentation fault in get_text_gray_row function in rdppm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11213
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-05-16 17:29 修改: 2019-10-03 00:03
|
libjpeg62-turbo |
CVE-2018-11214 |
中危 |
1:1.3.1-12 |
1:1.3.1-12+deb8u1 |
libjpeg: Segmentation fault in get_text_rgb_row function in rdppm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11214
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-05-16 17:29 修改: 2019-10-03 00:03
|
libjpeg62-turbo |
CVE-2018-1152 |
中危 |
1:1.3.1-12 |
1:1.3.1-12+deb8u1 |
libjpeg-turbo: Divide by zero allows for denial of service via crafted BMP image
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1152
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-06-18 14:29 修改: 2020-07-31 21:15
|
libjpeg62-turbo |
CVE-2018-14498 |
中危 |
1:1.3.1-12 |
1:1.3.1-12+deb8u2 |
libjpeg-turbo: heap-based buffer over-read via crafted 8-bit BMP in get_8bit_row in rdbmp.c leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14498
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-03-07 23:29 修改: 2023-11-07 02:52
|
systemd |
CVE-2018-1049 |
中危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: automount: access to automounted volumes can lock up
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1049
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-02-16 21:29 修改: 2022-01-31 18:26
|
systemd |
CVE-2019-6454 |
中危 |
215-17+deb8u6 |
215-17+deb8u10 |
systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6454
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:13
|
libgcrypt20 |
CVE-2019-13627 |
中危 |
1.6.3-2+deb8u2 |
1.6.3-2+deb8u8 |
libgcrypt: ECDSA timing attack allowing private key leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13627
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-09-25 15:15 修改: 2021-07-21 11:39
|
libsystemd0 |
CVE-2018-1049 |
中危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: automount: access to automounted volumes can lock up
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1049
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-02-16 21:29 修改: 2022-01-31 18:26
|
libsystemd0 |
CVE-2019-6454 |
中危 |
215-17+deb8u6 |
215-17+deb8u10 |
systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6454
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:13
|
libk5crypto3 |
CVE-2015-2694 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: issues in OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2694
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2015-05-25 19:59 修改: 2020-01-21 15:46
|
libk5crypto3 |
CVE-2016-3119 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libk5crypto3 |
CVE-2016-3120 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
systemd-sysv |
CVE-2018-1049 |
中危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: automount: access to automounted volumes can lock up
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1049
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-02-16 21:29 修改: 2022-01-31 18:26
|
systemd-sysv |
CVE-2019-6454 |
中危 |
215-17+deb8u6 |
215-17+deb8u10 |
systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6454
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:13
|
tar |
CVE-2018-20482 |
中危 |
1.27.1-2+deb8u1 |
1.27.1-2+deb8u2 |
tar: Infinite read loop in sparse_dump_region function in sparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20482
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-12-26 18:29 修改: 2021-11-30 19:52
|
libk5crypto3 |
CVE-2017-11368 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
libk5crypto3 |
CVE-2018-20217 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: Reachable assertion in the KDC using S4U2Self requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20217
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-12-26 21:29 修改: 2023-11-07 02:56
|
libk5crypto3 |
CVE-2018-5710 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null pointer deference in strlen function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5710
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58
|
libk5crypto3 |
CVE-2018-5729 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libkrb5-3 |
CVE-2015-2694 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: issues in OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2694
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2015-05-25 19:59 修改: 2020-01-21 15:46
|
libkrb5-3 |
CVE-2016-3119 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
udev |
CVE-2018-1049 |
中危 |
215-17+deb8u6 |
215-17+deb8u8 |
systemd: automount: access to automounted volumes can lock up
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1049
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-02-16 21:29 修改: 2022-01-31 18:26
|
udev |
CVE-2019-6454 |
中危 |
215-17+deb8u6 |
215-17+deb8u10 |
systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6454
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-03-21 16:01 修改: 2023-11-07 03:13
|
libkrb5-3 |
CVE-2016-3120 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
unzip |
CVE-2014-9913 |
中危 |
6.0-16+deb8u2 |
6.0-16+deb8u3 |
unzip: methbuf[] buffer overflow in unzip's list_files()
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-9913
镜像层: sha256:ce6c8756685b2bff514e0b28f78eedb671380084555af2b3833e54bb191b262a
发布日期: 2017-01-18 17:59 修改: 2019-12-16 20:24
|
unzip |
CVE-2016-9844 |
中危 |
6.0-16+deb8u2 |
6.0-16+deb8u3 |
unzip: methbuf[] buffer overflow in zipinfo's zi_short()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-9844
镜像层: sha256:ce6c8756685b2bff514e0b28f78eedb671380084555af2b3833e54bb191b262a
发布日期: 2017-01-18 17:59 修改: 2019-12-16 20:24
|
libkrb5-3 |
CVE-2017-11368 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
util-linux |
CVE-2016-5011 |
中危 |
2.25.2-6 |
|
util-linux: Extended partition loop in MBR partition table leads to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-5011
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-04-11 15:59 修改: 2020-09-11 15:22
|
libkrb5-3 |
CVE-2018-20217 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: Reachable assertion in the KDC using S4U2Self requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20217
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-12-26 21:29 修改: 2023-11-07 02:56
|
libkrb5-3 |
CVE-2018-5710 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null pointer deference in strlen function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5710
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58
|
libkrb5-3 |
CVE-2018-5729 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5729
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:52
|
libkrb5support0 |
CVE-2015-2694 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: issues in OTP and PKINIT kdcpreauth modules leading to requires_preauth bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2694
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2015-05-25 19:59 修改: 2020-01-21 15:46
|
wget |
CVE-2017-6508 |
中危 |
1.16-1+deb8u1 |
1.16-1+deb8u2 |
wget: CRLF injection in the url_parse function in url.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6508
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-03-07 08:59 修改: 2017-07-01 01:30
|
wget |
CVE-2018-0494 |
中危 |
1.16-1+deb8u1 |
1.16-1+deb8u5 |
wget: Cookie injection allows malicious website to write arbitrary cookie entries into cookie jar
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0494
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-05-06 22:29 修改: 2019-03-15 01:22
|
libkrb5support0 |
CVE-2016-3119 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: null pointer dereference in kadmin
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3119
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2016-03-26 01:59 修改: 2020-01-21 15:47
|
libkrb5support0 |
CVE-2016-3120 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: S4U2Self KDC crash when anon is restricted
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3120
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2016-08-01 02:59 修改: 2023-11-07 02:32
|
libkrb5support0 |
CVE-2017-11368 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u3 |
krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11368
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-08-09 18:29 修改: 2023-11-07 02:38
|
libkrb5support0 |
CVE-2018-20217 |
中危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: Reachable assertion in the KDC using S4U2Self requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20217
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-12-26 21:29 修改: 2023-11-07 02:56
|
libelf1 |
CVE-2016-10254 |
低危 |
0.159-4.2 |
|
elfutils: Memory allocation failure in allocate_elf
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10254
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-23 16:59 修改: 2023-11-07 02:29
|
libsvn1 |
CVE-2016-8734 |
低危 |
1.8.10-6+deb8u4 |
1.8.10-6+deb8u5 |
subversion: unrestricted XML entity expansion in mod_dontdothat and Subversion clients using http(s)://
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8734
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-16 13:29 修改: 2023-11-07 02:36
|
libelf1 |
CVE-2016-10255 |
低危 |
0.159-4.2 |
|
elfutils: Memory allocation failure in __libelf_set_rawdata_wrlock (elf_getdata.c)
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10255
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-23 16:59 修改: 2023-11-07 02:29
|
libkrb5support0 |
CVE-2017-11462 |
低危 |
1.12.1+dfsg-19+deb8u2 |
|
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
libkrb5support0 |
CVE-2018-5730 |
低危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
libncursesw5 |
CVE-2018-19211 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: Null pointer dereference at function _nc_parse_entry in parse_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19211
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-11-12 19:29 修改: 2019-04-23 13:15
|
libpython2.7-minimal |
CVE-2020-8492 |
低危 |
2.7.9-2+deb8u1 |
|
python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8492
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-01-30 19:15 修改: 2023-11-07 03:26
|
libncursesw5 |
CVE-2019-17594 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
libncursesw5 |
CVE-2019-17595 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
libelf1 |
CVE-2018-16403 |
低危 |
0.159-4.2 |
|
elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16403
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-09-03 19:29 修改: 2023-11-07 02:53
|
libx11-6 |
CVE-2016-7942 |
低危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u1 |
libX11: Insufficient validation of server responses in XGetImage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7942
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libx11-6 |
CVE-2016-7943 |
低危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u1 |
libX11: Insufficient validation of server responses in FontNames
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7943
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libsystemd0 |
CVE-2018-16888 |
低危 |
215-17+deb8u6 |
|
systemd: kills privileged process if unprivileged PIDFile was tampered
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16888
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-14 22:29 修改: 2023-11-07 02:53
|
libsystemd0 |
CVE-2018-6954 |
低危 |
215-17+deb8u6 |
|
systemd: Mishandled symlinks in systemd-tmpfiles allows local users to obtain ownership of arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6954
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-02-13 20:29 修改: 2023-11-07 03:00
|
libsystemd0 |
CVE-2019-3815 |
低危 |
215-17+deb8u6 |
215-17+deb8u11 |
systemd: memory leak in journald-server.c introduced by fix for CVE-2018-16864
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3815
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-28 15:29 修改: 2023-02-12 23:38
|
libx11-data |
CVE-2016-7942 |
低危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u1 |
libX11: Insufficient validation of server responses in XGetImage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7942
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libx11-data |
CVE-2016-7943 |
低危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u1 |
libX11: Insufficient validation of server responses in FontNames
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7943
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
gpgv |
CVE-2019-14855 |
低危 |
1.4.18-7+deb8u3 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
git-man |
CVE-2018-11233 |
低危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u6 |
git: path sanity check in is_ntfs_dotgit() can read arbitrary memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11233
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-05-30 04:29 修改: 2020-05-02 00:15
|
inetutils-ping |
CVE-2019-0053 |
低危 |
2:1.9.2.39.3a460-3 |
|
Insufficient validation of environment variables in the telnet client ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0053
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-07-11 20:15 修改: 2023-10-08 14:15
|
libx11-dev |
CVE-2016-7942 |
低危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u1 |
libX11: Insufficient validation of server responses in XGetImage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7942
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libx11-dev |
CVE-2016-7943 |
低危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u1 |
libX11: Insufficient validation of server responses in FontNames
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7943
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libjpeg62-turbo |
CVE-2019-2201 |
低危 |
1:1.3.1-12 |
|
libjpeg-turbo: several integer overflows and subsequent segfaults when attempting to compress/decompress gigapixel images
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-2201
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-11-13 18:15 修改: 2023-11-07 03:09
|
libtiff5 |
CVE-2016-10371 |
低危 |
4.0.3-12.3+deb8u2 |
4.0.3-12.3+deb8u5 |
libtiff: Assertion failure in TIFFWriteDirectoryTagCheckedRational
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10371
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-05-10 05:29 修改: 2018-03-22 01:29
|
ncurses-base |
CVE-2018-19211 |
低危 |
5.9+20140913-1 |
|
ncurses: Null pointer dereference at function _nc_parse_entry in parse_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19211
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-11-12 19:29 修改: 2019-04-23 13:15
|
ncurses-base |
CVE-2019-17594 |
低危 |
5.9+20140913-1 |
|
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
ncurses-base |
CVE-2019-17595 |
低危 |
5.9+20140913-1 |
|
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
libjpeg62-turbo |
CVE-2020-14152 |
低危 |
1:1.3.1-12 |
|
libjpeg: improper handling of max_memory_to_use setting can lead to excessive memory consumption
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14152
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-06-15 17:15 修改: 2023-02-27 18:17
|
libx11-doc |
CVE-2016-7942 |
低危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u1 |
libX11: Insufficient validation of server responses in XGetImage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7942
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libx11-doc |
CVE-2016-7943 |
低危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u1 |
libX11: Insufficient validation of server responses in FontNames
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7943
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
python2.7 |
CVE-2020-8492 |
低危 |
2.7.9-2+deb8u1 |
|
python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8492
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-01-30 19:15 修改: 2023-11-07 03:26
|
libllvm3.5 |
CVE-2015-2305 |
低危 |
1:3.5-10 |
|
regex: heap overflow in regcomp() on 32-bit architectures
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2305
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2015-03-30 10:59 修改: 2022-08-16 13:29
|
libapr1 |
CVE-2017-12613 |
低危 |
1.5.1-3 |
|
apr: Out-of-bounds array deref in apr_time_exp*() functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12613
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-24 01:29 修改: 2023-11-07 02:38
|
libgssapi-krb5-2 |
CVE-2017-11462 |
低危 |
1.12.1+dfsg-19+deb8u2 |
|
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
libx11-xcb1 |
CVE-2016-7942 |
低危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u1 |
libX11: Insufficient validation of server responses in XGetImage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7942
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libx11-xcb1 |
CVE-2016-7943 |
低危 |
2:1.6.2-3 |
2:1.6.2-3+deb8u1 |
libX11: Insufficient validation of server responses in FontNames
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7943
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libgssapi-krb5-2 |
CVE-2018-5730 |
低危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
libcairo2 |
CVE-2017-7475 |
低危 |
1.14.0-2.1+deb8u2 |
|
cairo: NULL pointer dereference with a crafted font file
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7475
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-05-19 20:29 修改: 2023-02-12 23:30
|
libxfixes3 |
CVE-2016-7944 |
低危 |
1:5.0.1-2+b2 |
1:5.0.1-2+deb8u1 |
libXfixes: Insufficient validation of server responses results in Integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7944
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libxi6 |
CVE-2016-7945 |
低危 |
2:1.7.4-1+b2 |
2:1.7.4-1+deb8u1 |
libXi: Insufficient validation of server responses result in Integer overflows
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7945
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libxi6 |
CVE-2016-7946 |
低危 |
2:1.7.4-1+b2 |
2:1.7.4-1+deb8u1 |
libXi: Insufficient validation of server responses result in various data mishandlings
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7946
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
ncurses-bin |
CVE-2018-19211 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: Null pointer dereference at function _nc_parse_entry in parse_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19211
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-11-12 19:29 修改: 2019-04-23 13:15
|
ncurses-bin |
CVE-2019-17594 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
ncurses-bin |
CVE-2019-17595 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
python2.7-minimal |
CVE-2020-8492 |
低危 |
2.7.9-2+deb8u1 |
|
python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8492
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-01-30 19:15 修改: 2023-11-07 03:26
|
libpython2.7-stdlib |
CVE-2020-8492 |
低危 |
2.7.9-2+deb8u1 |
|
python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8492
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-01-30 19:15 修改: 2023-11-07 03:26
|
libflac8 |
CVE-2017-6888 |
低危 |
1.3.0-3 |
|
flac: Memory leak in src/libFLAC/stream_decoder.c:read_metadata_vorbiscomment_()
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6888
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-04-25 21:29 修改: 2023-11-07 02:49
|
libdevmapper1.02.1 |
CVE-2020-8991 |
低危 |
2:1.02.90-2.2+deb8u1 |
|
lvm2: memory leak in vg_lookup in daemons/lvmetad/lvmetad-core.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8991
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2020-02-14 05:15 修改: 2024-08-04 11:15
|
libcairo2 |
CVE-2017-9814 |
低危 |
1.14.0-2.1+deb8u2 |
|
cairo: Out-of-bounds read due to mishandling of unexpected malloc(0) call
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9814
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-07-17 13:18 修改: 2023-11-07 02:50
|
subversion |
CVE-2016-8734 |
低危 |
1.8.10-6+deb8u4 |
1.8.10-6+deb8u5 |
subversion: unrestricted XML entity expansion in mod_dontdothat and Subversion clients using http(s)://
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8734
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-16 13:29 修改: 2023-11-07 02:36
|
libcups2 |
CVE-2019-8842 |
低危 |
1.7.5-11+deb8u1 |
1.7.5-11+deb8u8 |
A buffer overflow was addressed with improved bounds checking. This is ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8842
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2020-10-27 20:15 修改: 2023-11-07 03:13
|
libk5crypto3 |
CVE-2017-11462 |
低危 |
1.12.1+dfsg-19+deb8u2 |
|
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
libnss3 |
CVE-2018-12384 |
低危 |
2:3.26-1+debu8u1 |
|
nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12384
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-04-29 15:29 修改: 2020-08-24 17:37
|
libtinfo5 |
CVE-2018-19211 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: Null pointer dereference at function _nc_parse_entry in parse_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19211
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-11-12 19:29 修改: 2019-04-23 13:15
|
libtinfo5 |
CVE-2019-17594 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
libtinfo5 |
CVE-2019-17595 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
libk5crypto3 |
CVE-2018-5730 |
低危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
libcairo2 |
CVE-2018-18064 |
低危 |
1.14.0-2.1+deb8u2 |
|
cairo: Stack-based buffer overflow via parsing of crafted WebKitGTK+ document
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-18064
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-10-08 18:29 修改: 2023-11-07 02:54
|
systemd |
CVE-2018-16888 |
低危 |
215-17+deb8u6 |
|
systemd: kills privileged process if unprivileged PIDFile was tampered
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16888
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-14 22:29 修改: 2023-11-07 02:53
|
systemd |
CVE-2018-6954 |
低危 |
215-17+deb8u6 |
|
systemd: Mishandled symlinks in systemd-tmpfiles allows local users to obtain ownership of arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6954
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-02-13 20:29 修改: 2023-11-07 03:00
|
systemd |
CVE-2019-3815 |
低危 |
215-17+deb8u6 |
215-17+deb8u11 |
systemd: memory leak in journald-server.c introduced by fix for CVE-2018-16864
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3815
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-28 15:29 修改: 2023-02-12 23:38
|
libcairo2 |
CVE-2019-6461 |
低危 |
1.14.0-2.1+deb8u2 |
|
cairo: assertion problem in _cairo_arc_in_direction in cairo-arc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6461
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13
|
libcairo2 |
CVE-2019-6462 |
低危 |
1.14.0-2.1+deb8u2 |
|
cairo: infinite loop in the function _arc_error_normalized in the file cairo-arc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-6462
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2019-01-16 18:29 修改: 2023-11-07 03:13
|
libpcre3 |
CVE-2017-7245 |
低危 |
2:8.35-3.3+deb8u4 |
|
pcre: stack-based buffer overflow write in pcre32_copy_substring
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7245
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
libpcre3 |
CVE-2017-7246 |
低危 |
2:8.35-3.3+deb8u4 |
|
pcre: stack-based buffer overflow write in pcre32_copy_substring
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7246
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29
|
openssh-client |
CVE-2015-6563 |
低危 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u6 |
openssh: Privilege separation weakness related to PAM support
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-6563
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2015-08-24 01:59 修改: 2022-12-13 12:15
|
libaprutil1 |
CVE-2017-12618 |
低危 |
1.5.4-1 |
|
apr-util: Out-of-bounds access in corrupted SDBM database
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12618
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2017-10-24 01:29 修改: 2018-10-31 10:29
|
git-man |
CVE-2019-1348 |
低危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u8 |
git: Arbitrary path overwriting via export-marks in-stream command feature
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1348
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-01-24 22:15 修改: 2023-11-07 03:08
|
libudev1 |
CVE-2018-16888 |
低危 |
215-17+deb8u6 |
|
systemd: kills privileged process if unprivileged PIDFile was tampered
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16888
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-14 22:29 修改: 2023-11-07 02:53
|
systemd-sysv |
CVE-2018-16888 |
低危 |
215-17+deb8u6 |
|
systemd: kills privileged process if unprivileged PIDFile was tampered
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16888
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-14 22:29 修改: 2023-11-07 02:53
|
systemd-sysv |
CVE-2018-6954 |
低危 |
215-17+deb8u6 |
|
systemd: Mishandled symlinks in systemd-tmpfiles allows local users to obtain ownership of arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6954
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-02-13 20:29 修改: 2023-11-07 03:00
|
systemd-sysv |
CVE-2019-3815 |
低危 |
215-17+deb8u6 |
215-17+deb8u11 |
systemd: memory leak in journald-server.c introduced by fix for CVE-2018-16864
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3815
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-28 15:29 修改: 2023-02-12 23:38
|
libudev1 |
CVE-2018-6954 |
低危 |
215-17+deb8u6 |
|
systemd: Mishandled symlinks in systemd-tmpfiles allows local users to obtain ownership of arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6954
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-02-13 20:29 修改: 2023-11-07 03:00
|
libudev1 |
CVE-2019-3815 |
低危 |
215-17+deb8u6 |
215-17+deb8u11 |
systemd: memory leak in journald-server.c introduced by fix for CVE-2018-16864
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3815
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-28 15:29 修改: 2023-02-12 23:38
|
libxrandr2 |
CVE-2016-7947 |
低危 |
2:1.4.2-1+b1 |
2:1.4.2-1+deb8u1 |
libXrandr: Insufficient validation of server responses result in Integer overflows
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7947
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libxrandr2 |
CVE-2016-7948 |
低危 |
2:1.4.2-1+b1 |
2:1.4.2-1+deb8u1 |
libXrandr: Insufficient validation of server responses result in various data mishandlings
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7948
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libxrender1 |
CVE-2016-7949 |
低危 |
1:0.9.8-1+b1 |
|
libXrender: Insufficient validation of server responses results in overflow of previously reserved memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7949
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libxrender1 |
CVE-2016-7950 |
低危 |
1:0.9.8-1+b1 |
|
libXrender: Insufficient validation of server responses results out-of-bounds write in XRenderQueryFilters
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7950
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libxtst6 |
CVE-2016-7951 |
低危 |
2:1.2.2-1+b1 |
2:1.2.2-1+deb8u1 |
libXtst: Insufficient validation of server responses result in Integer overflows
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7951
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libxtst6 |
CVE-2016-7952 |
低危 |
2:1.2.2-1+b1 |
2:1.2.2-1+deb8u1 |
libXtst: Insufficient validation of server responses result in various data mishandlings
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-7952
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2016-12-13 20:59 修改: 2023-11-07 02:35
|
libncurses5 |
CVE-2018-19211 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: Null pointer dereference at function _nc_parse_entry in parse_entry.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19211
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-11-12 19:29 修改: 2019-04-23 13:15
|
udev |
CVE-2018-16888 |
低危 |
215-17+deb8u6 |
|
systemd: kills privileged process if unprivileged PIDFile was tampered
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16888
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-14 22:29 修改: 2023-11-07 02:53
|
udev |
CVE-2018-6954 |
低危 |
215-17+deb8u6 |
|
systemd: Mishandled symlinks in systemd-tmpfiles allows local users to obtain ownership of arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6954
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-02-13 20:29 修改: 2023-11-07 03:00
|
udev |
CVE-2019-3815 |
低危 |
215-17+deb8u6 |
215-17+deb8u11 |
systemd: memory leak in journald-server.c introduced by fix for CVE-2018-16864
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3815
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-01-28 15:29 修改: 2023-02-12 23:38
|
openssl |
CVE-2019-1563 |
低危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u12 |
openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1563
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-09-10 17:15 修改: 2023-11-07 03:08
|
libncurses5 |
CVE-2019-17594 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17594
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-10-14 21:15 修改: 2021-02-10 15:13
|
libncurses5 |
CVE-2019-17595 |
低危 |
5.9+20140913-1+b1 |
|
ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17595
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2019-10-14 21:15 修改: 2021-02-08 20:52
|
unzip |
CVE-2019-13232 |
低危 |
6.0-16+deb8u2 |
6.0-16+deb8u4 |
unzip: overlapping of files in ZIP container leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13232
镜像层: sha256:ce6c8756685b2bff514e0b28f78eedb671380084555af2b3833e54bb191b262a
发布日期: 2019-07-04 13:15 修改: 2023-11-07 03:03
|
login |
CVE-2018-7169 |
低危 |
1:4.2-3+deb8u1 |
|
shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7169
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-02-15 20:29 修改: 2019-10-03 00:03
|
passwd |
CVE-2018-7169 |
低危 |
1:4.2-3+deb8u1 |
|
shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7169
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2018-02-15 20:29 修改: 2019-10-03 00:03
|
git |
CVE-2019-1348 |
低危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u8 |
git: Arbitrary path overwriting via export-marks in-stream command feature
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1348
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2020-01-24 22:15 修改: 2023-11-07 03:08
|
coreutils |
CVE-2016-2781 |
低危 |
8.23-4 |
|
coreutils: Non-privileged session can escape to the parent session in chroot
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2781
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2017-02-07 15:59 修改: 2023-11-07 02:32
|
libkrb5-3 |
CVE-2017-11462 |
低危 |
1.12.1+dfsg-19+deb8u2 |
|
krb5: Automatic sec context deletion could lead to double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11462
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2017-09-13 16:29 修改: 2023-11-07 02:38
|
libkrb5-3 |
CVE-2018-5730 |
低危 |
1.12.1+dfsg-19+deb8u2 |
1.12.1+dfsg-19+deb8u5 |
krb5: DN container check bypass by supplying special crafted data
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5730
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2018-03-06 20:29 修改: 2024-05-23 17:53
|
libssl1.0.0 |
CVE-2019-1563 |
低危 |
1.0.1t-1+deb8u5 |
1.0.1t-1+deb8u12 |
openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1563
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 2019-09-10 17:15 修改: 2023-11-07 03:08
|
gnupg |
CVE-2019-14855 |
低危 |
1.4.18-7+deb8u3 |
|
gnupg2: OpenPGP Key Certification Forgeries with SHA-1
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14855
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2020-03-20 16:15 修改: 2022-11-08 02:28
|
dmsetup |
CVE-2020-8991 |
低危 |
2:1.02.90-2.2+deb8u1 |
|
lvm2: memory leak in vg_lookup in daemons/lvmetad/lvmetad-core.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8991
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 2020-02-14 05:15 修改: 2024-08-04 11:15
|
libjasper1 |
CVE-2016-8886 |
低危 |
1.900.1-debian1-2.4+deb8u1 |
|
jasper: no upper limit on memory allocations in jas_malloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8886
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2017-03-23 18:59 修改: 2023-11-07 02:36
|
libjasper1 |
CVE-2018-19139 |
低危 |
1.900.1-debian1-2.4+deb8u1 |
|
jasper: memory leak of data allocated in jpc_unk_getparms() after abort in jpc_dec_process_sot()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19139
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 2018-11-09 21:29 修改: 2020-09-25 12:15
|
git |
CVE-2018-11233 |
低危 |
1:2.1.4-2.1+deb8u2 |
1:2.1.4-2.1+deb8u6 |
git: path sanity check in is_ntfs_dotgit() can read arbitrary memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11233
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 2018-05-30 04:29 修改: 2020-05-02 00:15
|
tzdata |
DLA-1957-1 |
未知 |
2016j-0+deb8u1 |
2019c-0+deb8u1 |
tzdata - new upstream version
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libxdmcp6 |
DLA-2006-1 |
未知 |
1:1.1.1-1+b1 |
1:1.1.1-1+deb8u1 |
libxdmcp - security update
漏洞详情:
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libjasper1 |
DLA-1628-2 |
未知 |
1.900.1-debian1-2.4+deb8u1 |
1.900.1-debian1-2.4+deb8u6 |
jasper - regression update
漏洞详情:
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libbz2-1.0 |
DLA-1833-2 |
未知 |
1.0.6-7+b3 |
1.0.6-7+deb8u2 |
bzip2 - regression update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libgdk-pixbuf2.0-common |
DLA-2043-2 |
未知 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u9 |
gdk-pixbuf - regression update
漏洞详情:
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
passwd |
DSA-3793-2 |
未知 |
1:4.2-3+deb8u1 |
1:4.2-3+deb8u4 |
shadow - regression update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libudev1 |
DLA-1762-2 |
未知 |
215-17+deb8u6 |
215-17+deb8u13 |
systemd - regression update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libpcre3 |
TEMP-0827564-93E4E3 |
未知 |
2:8.35-3.3+deb8u4 |
|
[Stack corruption from crafted pattern]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0827564-93E4E3
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
bzip2 |
DLA-1833-2 |
未知 |
1.0.6-7+b3 |
1.0.6-7+deb8u2 |
bzip2 - regression update
漏洞详情:
镜像层: sha256:ce6c8756685b2bff514e0b28f78eedb671380084555af2b3833e54bb191b262a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
openssh-client |
DLA-1500-2 |
未知 |
1:6.7p1-5+deb8u3 |
1:6.7p1-5+deb8u7 |
openssh - regression update
漏洞详情:
镜像层: sha256:30339f20ced009fc394410ac3360f387351641ed40d6b2a44b0d39098e2e2c40
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libgdk-pixbuf2.0-0 |
DLA-2043-2 |
未知 |
2.31.1-2+deb8u5 |
2.31.1-2+deb8u9 |
gdk-pixbuf - regression update
漏洞详情:
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
systemd |
DLA-1762-2 |
未知 |
215-17+deb8u6 |
215-17+deb8u13 |
systemd - regression update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
udev |
DLA-1762-2 |
未知 |
215-17+deb8u6 |
215-17+deb8u13 |
systemd - regression update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libgcrypt20 |
TEMP-0000000-96B2E9 |
未知 |
1.6.3-2+deb8u2 |
|
[hardening for RSA-CRT leak]
漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0000000-96B2E9
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
ca-certificates |
DLA-1417-1 |
未知 |
20141019+deb8u2 |
20141019+deb8u4 |
ca-certificates - security update
漏洞详情:
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libgcc1 |
DLA-1606-1 |
未知 |
1:4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libssh2-1 |
DLA-1730-2 |
未知 |
1.4.3-4.1+deb8u1 |
1.4.3-4.1+deb8u3 |
libssh2 - regression update
漏洞详情:
镜像层: sha256:0eb22bfb707db44a8e5ba46a21b2ac59c83dfa946228f04be511aba313bdc090
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
unzip |
DLA-1846-2 |
未知 |
6.0-16+deb8u2 |
6.0-16+deb8u5 |
unzip - regression update
漏洞详情:
镜像层: sha256:ce6c8756685b2bff514e0b28f78eedb671380084555af2b3833e54bb191b262a
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libgcc1 |
DSA-4117-1 |
未知 |
1:4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
gcc-4.9-base |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
gcc-4.9-base |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libstdc++6 |
DLA-1606-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u2 |
gcc-4.9 - bugfix update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
login |
DSA-3793-2 |
未知 |
1:4.2-3+deb8u1 |
1:4.2-3+deb8u4 |
shadow - regression update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libstdc++6 |
DSA-4117-1 |
未知 |
4.9.2-10 |
4.9.2-10+deb8u1 |
gcc-4.9 - update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libsystemd0 |
DLA-1762-2 |
未知 |
215-17+deb8u6 |
215-17+deb8u13 |
systemd - regression update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
systemd-sysv |
DLA-1762-2 |
未知 |
215-17+deb8u6 |
215-17+deb8u13 |
systemd - regression update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
libxdmcp-dev |
DLA-2006-1 |
未知 |
1:1.1.1-1+b1 |
1:1.1.1-1+deb8u1 |
libxdmcp - security update
漏洞详情:
镜像层: sha256:c3fe59dd955634c3fa1808b8053353f03f4399d9d071be015fdfb98b3e105709
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
tzdata |
DLA-1563-1 |
未知 |
2016j-0+deb8u1 |
2018g-0+deb8u1 |
tzdata - update
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
tzdata |
DLA-1625-1 |
未知 |
2016j-0+deb8u1 |
2018i-0+deb8u1 |
tzdata - new upstream version
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
tzdata |
DLA-1744-1 |
未知 |
2016j-0+deb8u1 |
2019a-0+deb8u1 |
tzdata - new upstream version
漏洞详情:
镜像层: sha256:a2ae92ffcd29f7ededa0320f4a4fd709a723beae9a4e681696874932db7aee2c
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|