| libc6 |
CVE-2026-0861 |
高危 |
2.36-9+deb12u13 |
|
glibc: Integer overflow in memalign leads to heap corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0861
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2026-01-14 21:15 修改: 2026-02-03 18:26
|
| libc6 |
CVE-2025-15281 |
中危 |
2.36-9+deb12u13 |
|
glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15281
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2026-01-20 14:16 修改: 2026-02-05 17:43
|
| libc6 |
CVE-2026-0915 |
中危 |
2.36-9+deb12u13 |
|
glibc: glibc: Information disclosure via zero-valued network query
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0915
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2026-01-15 22:16 修改: 2026-01-23 19:36
|
| libc6 |
CVE-2026-4046 |
中危 |
2.36-9+deb12u13 |
|
glibc: glibc: Denial of Service via iconv() function with specific character sets
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4046
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2026-03-30 18:16 修改: 2026-04-20 22:16
|
| libc6 |
CVE-2026-4437 |
中危 |
2.36-9+deb12u13 |
|
glibc: glibc: Incorrect DNS response parsing via crafted DNS server response
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4437
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:41
|
| libc6 |
CVE-2026-4438 |
中危 |
2.36-9+deb12u13 |
|
glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4438
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:40
|
| libc6 |
CVE-2026-5435 |
中危 |
2.36-9+deb12u13 |
|
glibc: glibc: Out-of-bounds write via TSIG record processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5435
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2026-04-28 13:19 修改: 2026-05-05 17:38
|
| libc6 |
CVE-2026-5450 |
中危 |
2.36-9+deb12u13 |
|
glibc: glibc: Heap Buffer Overflow in `scanf` with `%mc` format specifier and large width
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5450
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33
|
| libc6 |
CVE-2026-5928 |
中危 |
2.36-9+deb12u13 |
|
glibc: glibc: Information disclosure or denial of service via ungetwc function with specific wide character encodings
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5928
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33
|
| libc6 |
CVE-2026-6238 |
中危 |
2.36-9+deb12u13 |
|
glibc: glibc: Application crash or uninitialized memory read via crafted DNS response
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6238
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2026-04-28 19:37 修改: 2026-05-04 17:57
|
| coreutils |
CVE-2025-5278 |
低危 |
9.1-1 |
|
coreutils: Heap Buffer Under-Read in GNU Coreutils sort via Key Specification
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5278
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2025-05-27 21:15 修改: 2026-04-15 00:35
|
| iptables |
CVE-2012-2663 |
低危 |
1.8.9-2 |
|
iptables: --syn flag bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-2663
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2014-02-15 14:57 修改: 2026-04-29 01:13
|
| coreutils |
CVE-2016-2781 |
低危 |
9.1-1 |
|
coreutils: Non-privileged session can escape to the parent session in chroot
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2781
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2017-02-07 15:59 修改: 2026-05-13 00:24
|
| coreutils |
CVE-2017-18018 |
低危 |
9.1-1 |
|
coreutils: race condition vulnerability in chown and chgrp
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18018
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2018-01-04 04:29 修改: 2025-06-09 16:15
|
| libc6 |
CVE-2010-4756 |
低危 |
2.36-9+deb12u13 |
|
glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2011-03-02 20:00 修改: 2026-04-29 01:13
|
| libc6 |
CVE-2018-20796 |
低危 |
2.36-9+deb12u13 |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2019-02-26 02:29 修改: 2024-11-21 04:02
|
| libc6 |
CVE-2019-1010022 |
低危 |
2.36-9+deb12u13 |
|
glibc: stack guard protection bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17
|
| libc6 |
CVE-2019-1010023 |
低危 |
2.36-9+deb12u13 |
|
glibc: running ldd on malicious ELF leads to code execution because of wrong size computation
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17
|
| libc6 |
CVE-2019-1010024 |
低危 |
2.36-9+deb12u13 |
|
glibc: ASLR bypass using cache of thread stack and heap
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17
|
| libc6 |
CVE-2019-1010025 |
低危 |
2.36-9+deb12u13 |
|
glibc: information disclosure of heap addresses of pthread_created thread
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17
|
| libc6 |
CVE-2019-9192 |
低危 |
2.36-9+deb12u13 |
|
glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2019-02-26 18:29 修改: 2024-11-21 04:51
|
| libip4tc2 |
CVE-2012-2663 |
低危 |
1.8.9-2 |
|
iptables: --syn flag bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-2663
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2014-02-15 14:57 修改: 2026-04-29 01:13
|
| libip6tc2 |
CVE-2012-2663 |
低危 |
1.8.9-2 |
|
iptables: --syn flag bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-2663
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2014-02-15 14:57 修改: 2026-04-29 01:13
|
| libjansson4 |
CVE-2020-36325 |
低危 |
2.14-2 |
|
jansson: out-of-bounds read in json_loads() due to a parsing error
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36325
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2021-04-26 18:15 修改: 2024-11-21 05:29
|
| libssl3 |
CVE-2025-27587 |
低危 |
3.0.19-1~deb12u2 |
|
OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-27587
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2025-06-16 22:15 修改: 2026-04-15 00:35
|
| libxtables12 |
CVE-2012-2663 |
低危 |
1.8.9-2 |
|
iptables: --syn flag bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-2663
镜像层: sha256:08e136b77448cc51db423bebfe1dee6e81450dd9c21817aa955bc1e318f1905d
发布日期: 2014-02-15 14:57 修改: 2026-04-29 01:13
|