| CVE-2023-23002 |
In the Linux kernel before 5.16.3, drivers/bluetooth/hci_qca.c misinterprets the devm_gpiod_get_index_optional return value (expects it to be NULL in the error case, whereas it is actually an error pointer). |
Moderate |
kernel |
否 |
完成修复 |
2023-03-02 |
2026-01-04 |
| CVE-2023-23000 |
|
Low |
kernel |
否 |
完成修复 |
2023-03-02 |
2026-01-22 |
| CVE-2023-22462 |
A flaw was found in the Grafana core plugin, "Text." The vulnerability was possible due to React's render cycle that will pass through unsanitized HTML code. However, the HTML is cleaned and saved in Grafana's database in the next cycle. An attacker needs the Editor role in changing a Text panel to include JavaScript. Later, another user needs to edit the same Text panel and click "Markdown" or "HTML" to execute the code. This issue allows possible vertical privilege escalation, where a user with an Editor role can change to a known password for a user having an Admin role if the user with an Admin role executes malicious JavaScript viewing a dashboard. |
Moderate |
grafana |
否 |
完成修复 |
2023-03-02 |
2026-01-25 |
| CVE-2023-1077 |
|
Moderate |
kernel |
否 |
完成修复 |
2023-03-02 |
2026-01-04 |
| CVE-2023-1076 |
|
Low |
kernel |
是 |
完成修复 |
2023-03-02 |
2026-01-22 |
| CVE-2023-23003 |
In the Linux kernel before 5.16, tools/perf/util/expr.c lacks a check for the hashmap__new return value. |
Moderate |
kernel |
否 |
完成修复 |
2023-03-01 |
2026-01-04 |
| CVE-2023-23001 |
In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer). |
Moderate |
kernel |
否 |
完成修复 |
2023-03-01 |
2026-01-04 |
| CVE-2023-22998 |
In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer). |
Moderate |
kernel:4.19, kernel:6.6, kernel, kernel:5.10 |
否 |
完成修复 |
2023-03-01 |
2026-01-04 |
| CVE-2023-1075 |
|
Low |
kernel |
是 |
完成修复 |
2023-03-01 |
2026-01-22 |
| CVE-2023-1074 |
|
Low |
kernel |
是 |
完成修复 |
2023-03-01 |
2026-01-22 |
| CVE-2023-0594 |
A flaw was found in the grafana package. This flaw allows a malicious user with the ability to introduce trace data to provide a JavaScript that changes the password for the user viewing the trace view (this could be an admin) to a known password, thus gaining access to the admin account. |
Important |
grafana |
否 |
完成修复 |
2023-03-01 |
2026-01-04 |
| CVE-2023-0507 |
A flaw was found in the GeoMap Grafana plugin, where a user can store unsanitized HTML in the GeoMap plugin under the Attribution text field, and the client will process it. The vulnerability makes it possible to use XHR to make arbitrary API calls on behalf of the attacked user. This means that a malicious user with editor permissions could alter a GeoMap panel to include JavaScript that changes the password for the user viewing the panel (this could be an admin) to a known password, thus gaining access to the admin account and resulting as the editor becoming an admin. |
Important |
grafana, grafana-pcp |
否 |
完成修复 |
2023-03-01 |
2026-01-04 |
| CVE-2022-41725 |
A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption flaw in the net/http and mime/multipart packages. By sending a specially-crafted request, a remote attacker can cause a denial of service. |
Moderate |
container-tools:4.0, grafana, weldr-client, container-tools:3.0, container-tools:an8, osbuild-composer, git-lfs, golang, grafana-pcp |
是 |
完成修复 |
2023-03-01 |
2025-12-10 |
| CVE-2022-41724 |
A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. |
Moderate |
container-tools:4.0, grafana, weldr-client, container-tools:3.0, container-tools:an8, osbuild-composer, git-lfs, golang, grafana-pcp |
是 |
完成修复 |
2023-03-01 |
2025-12-10 |
| CVE-2023-27371 |
An out-of-bounds flaw was found in GNU's libmicrohttpd due to improper parsing of a multipart/form-data boundary in the MHD_create_post_processor() method in postprocessor.c. This flaw allows an attacker to remotely send a malicious HTTP POST packet that includes one or more ?\\0? bytes in a multipart/form-data boundary field, which, assuming a specific heap layout, will result in an out-of-bounds read and a crash in the find_boundary() function, causing a denial of service. |
Moderate |
libmicrohttpd |
否 |
完成修复 |
2023-02-28 |
2026-01-25 |
| CVE-2023-27320 |
A double-free vulnerability was found in Sudo in the per-command chroot feature. This flaw exists due to a boundary error when matching a sudoer rule that contains a per-command chroot directive (CHROOT=dir). By sending a specially-crafted request, a local privileged attacker can elevate privileges and execute arbitrary code on the system. |
Moderate |
sudo |
否 |
完成修复 |
2023-02-28 |
2026-01-25 |
| CVE-2023-23518 |
A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system. |
Important |
webkitgtk, webkit2gtk3 |
否 |
完成修复 |
2023-02-28 |
2026-01-04 |
| CVE-2023-23517 |
A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system. |
Important |
webkitgtk, webkit2gtk3 |
否 |
完成修复 |
2023-02-28 |
2026-01-04 |
| CVE-2023-22999 |
In the Linux kernel before 5.16.3, drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case, whereas it is actually an error pointer). |
Low |
kernel |
否 |
完成修复 |
2023-02-28 |
2026-01-22 |
| CVE-2023-22997 |
In the Linux kernel before 6.1.2, kernel/module/decompress.c misinterprets the module_get_next_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer). |
Low |
kernel |
否 |
完成修复 |
2023-02-28 |
2026-01-22 |
| CVE-2023-22996 |
In the Linux kernel before 5.17.2, drivers/soc/qcom/qcom_aoss.c does not release an of_find_device_by_node reference after use, e.g., with put_device. |
Low |
kernel |
否 |
完成修复 |
2023-02-28 |
2026-01-21 |
| CVE-2023-22995 |
|
Low |
kernel |
否 |
完成修复 |
2023-02-28 |
2026-01-21 |
| CVE-2023-20938 |
In binder_transaction_buffer_release of binder.c, there is a possible use after free due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-257685302References: Upstream kernel |
Important |
kernel |
是 |
完成修复 |
2023-02-28 |
2025-12-04 |
| CVE-2023-1095 |
In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference. |
Moderate |
kernel |
否 |
完成修复 |
2023-02-28 |
2026-01-04 |
| CVE-2023-0461 |
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c |
Moderate |
kernel |
否 |
完成修复 |
2023-02-28 |
2026-01-04 |
| CVE-2022-42826 |
A vulnerability was found in WebKitGTK. This issue exists due to a use-after-free error when processing maliciously crafted web content in WebKit. This may allow an attacker to trick the victim to visit a specially crafted website, causing an application to halt, crash, or perform arbitrary code execution. |
Important |
webkitgtk, webkit2gtk3 |
否 |
完成修复 |
2023-02-28 |
2026-01-04 |
| CVE-2022-41727 |
An attacker can craft a malformed TIFF image which will consume a significant amount of memory when passed to DecodeConfig. This could lead to a denial of service. |
Moderate |
golang-x-image |
是 |
完成修复 |
2023-02-28 |
2025-12-10 |
| CVE-2023-1544 |
A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU. |
Low |
qemu-kvm-ma, virt:an, qemu-kvm |
否 |
完成修复 |
2023-02-27 |
2025-12-18 |
| CVE-2023-26607 |
In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c. |
Moderate |
kernel |
否 |
完成修复 |
2023-02-26 |
2026-01-04 |
| CVE-2023-26606 |
In the Linux kernel 6.0.8, there is a use-after-free in ntfs_trim_fs in fs/ntfs3/bitmap.c. |
Moderate |
kernel |
否 |
完成修复 |
2023-02-26 |
2026-01-04 |
| CVE-2023-26605 |
In the Linux kernel 6.0.8, there is a use-after-free in inode_cgwb_move_to_attached in fs/fs-writeback.c, related to __list_del_entry_valid. |
Moderate |
kernel |
否 |
完成修复 |
2023-02-26 |
2026-01-04 |
| CVE-2023-26545 |
|
Moderate |
kernel |
否 |
完成修复 |
2023-02-25 |
2026-01-04 |
| CVE-2023-26544 |
In the Linux kernel 6.0.8, there is a use-after-free in run_unpack in fs/ntfs3/run.c, related to a difference between NTFS sector size and media sector size. |
Moderate |
kernel 4.19, kernel 5.10 |
否 |
完成修复 |
2023-02-25 |
2026-01-04 |
| CVE-2023-23529 |
A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may, in theory, allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger type confusion, and execute arbitrary code on the target system. |
Important |
webkit2gtk3 |
否 |
完成修复 |
2023-02-24 |
2026-01-04 |
| CVE-2022-4203 |
A flaw was found in Open SSL. A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification, and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. |
Moderate |
openssl |
否 |
完成修复 |
2023-02-24 |
2026-01-25 |
| CVE-2022-38023 |
Netlogon RPC Elevation of Privilege Vulnerability. |
Important |
samba |
否 |
完成修复 |
2023-02-24 |
2026-01-09 |
| CVE-2023-25746 |
Memory safety bugs present in Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 102.8 and Firefox ESR < 102.8. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-02-22 |
2025-12-30 |
| CVE-2023-25744 |
Mmemory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 110 and Firefox ESR < 102.8. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-02-22 |
2025-12-30 |
| CVE-2023-25743 |
A lack of in app notification for entering fullscreen mode could have lead to a malicious website spoofing browser chrome. *This bug only affects Firefox Focus. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 110 and Firefox ESR < 102.8. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-02-22 |
2025-12-30 |
| CVE-2023-25742 |
The Mozilla Foundation Security Advisory describes this flaw as: |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-02-22 |
2026-01-24 |
| CVE-2023-25739 |
Module load requests that failed were not being checked as to whether or not they were cancelled causing a use-after-free in ScriptLoadContext. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-02-22 |
2025-12-30 |
| CVE-2023-25737 |
An invalid downcast from nsTextNode to SVGElement could have lead to undefined behavior. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-02-22 |
2025-12-30 |
| CVE-2023-25735 |
Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-02-22 |
2025-12-30 |
| CVE-2023-25732 |
The Mozilla Foundation Security Advisory describes this flaw as: |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-02-22 |
2026-01-24 |
| CVE-2023-25730 |
A background script invoking requestFullscreen and then blocking the main thread could force the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-02-22 |
2025-12-30 |
| CVE-2023-25729 |
The Mozilla Foundation Security Advisory describes this flaw as: |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-02-22 |
2026-01-24 |
| CVE-2023-25728 |
The Content-Security-Policy-Report-Only header could allow an attacker to leak a child iframe's unredacted URI when interaction with that iframe triggers a redirect. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-02-22 |
2025-12-30 |
| CVE-2023-23039 |
A race condition leading to a use-after-free vulnerability was found in the Linux kernel's Sun Virtual Console Concentrator (VCC). This issue can result in a system crash or potential code execution if a physically proximate attacker removes a VCC device while calling open(). |
Moderate |
kernel |
否 |
完成修复 |
2023-02-22 |
2026-01-04 |
| CVE-2023-0767 |
The Mozilla Foundation Security Advisory describes this flaw as: |
Important |
firefox, nss, thunderbird |
否 |
完成修复 |
2023-02-22 |
2026-01-07 |
| CVE-2022-20369 |
In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel\n\nThe CONFIG_V4L2_MEM2MEM_DEV is not enabled, so it is not affected. |
Moderate |
kernel |
否 |
完成修复 |
2023-02-22 |
2026-01-04 |
| CVE-2022-48340 |
A flaw was found in Gluster, where GlusterFS is vulnerable to a denial of service caused by an xlators/cluster/dht/src/dht-common.c dht_setxattr_mds_cbk use-after-free. By sending a specially-crafted request, a remote attacker can cause a denial of service. |
Important |
glusterfs |
是 |
完成修复 |
2023-02-21 |
2025-12-29 |
| CVE-2022-48339 |
A flaw was found in the Emacs package. If a file name or directory name contains shell metacharacters, arbitrary code may be executed. |
Important |
emacs |
否 |
完成修复 |
2023-02-21 |
2026-01-07 |
| CVE-2023-26242 |
afu_mmio_region_get_by_offset in drivers/fpga/dfl-afu-region.c in the Linux kernel through 6.1.12 has an integer overflow. |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2023-02-20 |
2026-01-17 |
| CVE-2023-0664 |
A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system. |
Moderate |
virtio-win, qemu |
否 |
完成修复 |
2023-02-20 |
2025-12-19 |
| CVE-2022-32231 |
A flaw was found in hw. Improper initialization in the BIOS firmware for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via local access. |
Important |
kernel |
否 |
完成修复 |
2023-02-20 |
2025-12-04 |
| CVE-2022-30704 |
A flaw was found in hw. Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via local access. |
Moderate |
kernel |
否 |
完成修复 |
2023-02-20 |
2026-01-04 |
| CVE-2022-30539 |
A flaw was found in how. Use-after-free in the BIOS firmware for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via local access. |
Important |
kernel |
否 |
完成修复 |
2023-02-20 |
2025-12-04 |
| CVE-2022-26837 |
A flaw was found in hw. Improper input validation in the BIOS firmware for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via local access. |
Important |
kernel |
否 |
完成修复 |
2023-02-20 |
2025-12-04 |
| CVE-2022-26343 |
A flaw was found in hw. Improper access control in the BIOS firmware for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via local access. |
Important |
kernel |
是 |
完成修复 |
2023-02-20 |
2025-12-04 |
| CVE-2021-0187 |
A flaw was found in hw. Improper access control in the BIOS firmware for some Intel(R) processors may allow a privileged user to potentially enable an escalation of privilege via local access. |
Low |
kernel |
是 |
完成修复 |
2023-02-20 |
2026-01-22 |
| CVE-2023-24329 |
A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity. |
Important |
python2, python3, python38:3.8, python39:3.9, python, python27:2.7 |
否 |
完成修复 |
2023-02-17 |
2026-01-09 |
| CVE-2023-23586 |
A use-after-free vulnerability was discovered in the Linux kernel's io_uring subsystem. It was found that it is possible to insert a time namespace's vvar page to process memory space via a page fault. When this time namespace is destroyed, the vvar page is also freed, but not removed from the process' memory, and a next page allocated by the kernel will be still available from the user-space process. This (read-only) use-after-free vulnerability can lead to kernel memory leak. |
Moderate |
kernel:4.19, kernel:6.6, kernel, kernel:5.10 |
否 |
完成修复 |
2023-02-17 |
2026-01-04 |
| CVE-2022-41723 |
A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. |
Moderate |
container-tools:4.0, grafana, golang-dbus, go-toolset:an8, rhc-worker-playbook, docker, container-tools:3.0, container-tools:an8, osbuild-composer, git-lfs, rhc, golang, grafana-pcp |
是 |
完成修复 |
2023-02-17 |
2025-12-10 |
| CVE-2022-36369 |
A potential flaw was found in QATzip. This vulnerability may allow escalation of privileges. |
Important |
qatzip |
否 |
完成修复 |
2023-02-17 |
2026-01-04 |
| CVE-2021-33391 |
An issue in HTACG HTML Tidy v5.7.28 allows attacker to execute arbitrary code via the -g option of the CleanNode() function in gdoc.c. |
Critical |
kernel |
否 |
完成修复 |
2023-02-17 |
2025-12-04 |
| CVE-2022-36397 |
Incorrect default permissions in the software installer for some Intel(R) QAT drivers for Linux before version 4.17 may allow an authenticated user to potentially enable escalation of privilege via local access. |
Important |
kernel |
是 |
完成修复 |
2023-02-16 |
2025-12-04 |
| CVE-2022-33196 |
A flaw was found in the Linux kernel. Some Intel(R) Xeon(R) processors with Intel? Software Guard Extensions (SGX) may allow privilege escalation. This issue may allow a privileged user to enable privilege escalation via local access. |
Important |
microcode_ctl |
否 |
完成修复 |
2023-02-16 |
2026-01-05 |
| CVE-2022-26841 |
Insufficient control flow management for the Intel(R) SGX SDK software for Linux before version 2.16.100.1 may allow an authenticated user to potentially enable information disclosure via local access. |
Moderate |
kernel |
否 |
完成修复 |
2023-02-16 |
2026-01-04 |
| CVE-2021-43529 |
Thunderbird versions prior to 91.3.0 are vulnerable to the heap overflow described in CVE-2021-43527 when processing S/MIME messages. Thunderbird versions 91.3.0 and later will not call the vulnerable code when processing S/MIME messages that contain certificates with DER-encoded DSA or RSA-PSS signatures. |
Critical |
thunderbird |
否 |
完成修复 |
2023-02-16 |
2026-01-07 |
| CVE-2023-25745 |
The Mozilla Foundation Security Advisory: Mozilla developers Timothy Nikkel, Gabriele Svelto, Jeff Muizelaar, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 109. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort some of these could have been exploited to run arbitrary code. |
Important |
firefox |
否 |
完成修复 |
2023-02-14 |
2026-01-04 |
| CVE-2023-25741 |
The Mozilla Foundation Security Advisory: When dragging and dropping an image cross-origin, the image size could potentially be leaked. This behavior was shipped in 109 and caused web compatibility problems as well as this security concern, so the behavior was disabled until further review. |
Low |
firefox |
否 |
完成修复 |
2023-02-14 |
2026-01-24 |
| CVE-2023-25740 |
The Mozilla Foundation Security Advisory: After downloading a Windows `.scf` script from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource. This bug only affects Firefox for Windows. Other operating systems are unaffected. |
Moderate |
firefox |
否 |
完成修复 |
2023-02-14 |
2026-01-24 |
| CVE-2023-25738 |
The Mozilla Foundation Security Advisory describes this flaw as:\n\nMembers of the `DEVMODEW` struct set by the printer device driver weren't being validated and could have resulted in invalid values which in turn would cause the browser to attempt out of bounds access to related variables.\n\n*This bug only affects Firefox on Windows. Other operating systems are unaffected.* |
Important |
firefox, thunderbird |
否 |
完成修复 |
2023-02-14 |
2025-12-30 |
| CVE-2023-25736 |
The Mozilla Foundation Security Advisory: An invalid downcast from `nsHTMLDocument` to `nsIContent` could lead to undefined behavior. |
Low |
firefox |
否 |
完成修复 |
2023-02-14 |
2026-01-24 |
| CVE-2023-25734 |
The Mozilla Foundation Security Advisory describes this flaw as:\n\nAfter downloading a Windows `.url` shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource.\n\n*This bug only affects Firefox on Windows. Other operating systems are unaffected.* |
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2023-02-14 |
2026-01-24 |
| CVE-2023-25733 |
The Mozilla Foundation Security Advisory: The return value from `gfx::SourceSurfaceSkia::Map()` wasn't being verified, which could potentially lead to a null pointer dereference. |
Low |
firefox |
否 |
完成修复 |
2023-02-14 |
2026-01-24 |
| CVE-2023-25731 |
The Mozilla Foundation Security Advisory: Due to URL previews in the network panel of developer tools improperly storing URLs, query parameters could potentially be used to overwrite global objects in privileged code. |
Low |
firefox |
否 |
完成修复 |
2023-02-14 |
2026-01-24 |
| CVE-2023-25725 |
A flaw was found in HAProxy's headers processing that causes HAProxy to drop important headers fields such as Connection, Content-length, Transfer-Encoding, and Host after having partially processed them. A maliciously crafted HTTP request could be used in an HTTP request smuggling attack to bypass filtering and detection by HAProxy. |
Moderate |
haproxy |
否 |
完成修复 |
2023-02-14 |
2026-01-25 |
| CVE-2023-25577 |
A flaw was found in python-werkzeug. Werkzeug is multipart form data parser, that will parse an unlimited number of parts, including file parts. These parts can be a small amount of bytes, but each requires CPU time to parse, and may use more memory as Python data. If a request can be made to an endpoint that accesses request.data, request.form, request.files, or request.get_data(parse_form_data=False), it can cause unexpectedly high resource usage, allowing an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests, and if many concurrent requests are sent continuously, this can exhaust or kill all available workers. |
Important |
python-werkzeug |
否 |
完成修复 |
2023-02-14 |
2026-01-04 |
| CVE-2023-21808 |
A vulnerability exists in how dotnet reads debugging symbols. Reading a malicious symbols file may result in remote code execution. |
Important |
dotnet6.0, dotnet3.1, dotnet7.0 |
否 |
完成修复 |
2023-02-14 |
2025-12-05 |
| CVE-2022-27672 |
A flaw was found in HW. When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch, potentially resulting in information disclosure. |
Moderate |
kernel |
否 |
完成修复 |
2023-02-14 |
2026-01-04 |
| CVE-2012-6088 |
A flaw was found in rpm. The rpmpkgRead function in lib/package.c in the RPM package does not return an error code in certain situations involving an "unparseable signature." This flaw allows remote attackers to bypass RPM signature checks via a crafted package. |
Moderate |
rpm |
否 |
完成修复 |
2023-02-13 |
2026-01-25 |
| CVE-2023-0401 |
A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initialization will fail. There is a missing check for the return value from the initialization function which later leads to invalid usage of the digest API most likely leading to a crash. The unavailability of an algorithm can be caused by using FIPS enabled configuration of providers or more commonly by not loading the legacy provider. PKCS7 data is processed by the SMIME library calls and also by the time stamp (TS) library calls. The TLS implementation in OpenSSL does not call these functions however third party applications would be affected if they call these functions to verify signatures on untrusted data. |
Important |
openssl-pkcs11, openssl |
否 |
完成修复 |
2023-02-09 |
2026-01-09 |
| CVE-2023-0286 |
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network. |
Important |
compat-openssl10, ovmf, openssl, edk2 |
否 |
完成修复 |
2023-02-09 |
2026-01-07 |
| CVE-2023-0217 |
An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the EVP_PKEY_public_check() function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted sources which could allow an attacker to cause a denial of service attack. The TLS implementation in OpenSSL does not call this function but applications might call the function if there are additional security requirements imposed by standards such as FIPS 140-3. |
Important |
openssl-pkcs11, openssl, nodejs:20, OVMF, nodejs |
否 |
完成修复 |
2023-02-09 |
2026-01-09 |
| CVE-2023-0216 |
A flaw was found in OpenSSL. An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. This may result in an application crash which could lead to a denial of service. The TLS implementation in OpenSSL does not call this function, however, third party applications might call these functions on untrusted data. |
Important |
openssl-pkcs11, nodejs:10, edk2, openssl, nodejs:16, nodejs:12, nodejs:18, nodejs:20, nodejs:14, OVMF, nodejs |
否 |
完成修复 |
2023-02-09 |
2026-01-09 |
| CVE-2023-0215 |
The public API function BIO_new_NDEF is a helper function used for streaming\nASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the\nSMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by\nend user applications.\nThe function receives a BIO from the caller, prepends a new BIO_f_asn1 filter\nBIO onto the front of it to form a BIO chain, and then returns the new head of\nthe BIO chain to the caller. Under certain conditions, for example if a CMS\nrecipient public key is invalid, the new filter BIO is freed and the function\nreturns a NULL result indicating a failure. However, in this case, the BIO chain\nis not properly cleaned up and the BIO passed by the caller still retains\ninternal pointers to the previously freed filter BIO. If the caller then goes on\nto call BIO_pop() on the BIO then a use-after-free will occur. This will most\nlikely result in a crash.\nThis scenario occurs directly in the internal function B64_write_ASN1() which\nmay cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on\nthe BIO. This internal function is in turn called by the public API functions\nPEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream,\nSMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7.\nOther public API functions that may be impacted by this include\ni2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and\ni2d_PKCS7_bio_stream.\nThe OpenSSL cms and smime command line applications are similarly affected. |
Important |
nodejs:10, edk2, openssl, nodejs:16, nodejs:12, nodejs:18, openssl1.1, nodejs:14, nodejs:20, OVMF, nodejs |
否 |
完成修复 |
2023-02-09 |
2025-12-29 |
| CVE-2022-4450 |
The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and\ndecodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data.\nIf the function succeeds then the "name_out", "header" and "data" arguments are\npopulated with pointers to buffers containing the relevant decoded data. The\ncaller is responsible for freeing those buffers. It is possible to construct a\nPEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex()\nwill return a failure code but will populate the header argument with a pointer\nto a buffer that has already been freed. If the caller also frees this buffer\nthen a double free will occur. This will most likely lead to a crash. This\ncould be exploited by an attacker who has the ability to supply malicious PEM\nfiles for parsing to achieve a denial of service attack.\nThe functions PEM_read_bio() and PEM_read() are simple wrappers around\nPEM_read_bio_ex() and therefore these functions are also directly affected.\nThese functions are also called indirectly by a number of other OpenSSL\nfunctions including PEM_X509_INFO_read_bio_ex() and\nSSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal\nuses of these functions are not vulnerable because the caller does not free the\nheader argument if PEM_read_bio_ex() returns a failure code. These locations\ninclude the PEM_read_bio_TYPE() functions as well as the decoders introduced in\nOpenSSL 3.0.\nThe OpenSSL asn1parse command line application is also impacted by this issue. |
Important |
openssl, edk2, OVMF, openssl1.1 |
否 |
完成修复 |
2023-02-09 |
2026-01-09 |
| CVE-2022-46663 |
A vulnerability was found in less. This flaw allows crafted data to result in "less -R" not filtering ANSI escape sequences sent to the terminal. |
Important |
less |
否 |
完成修复 |
2023-02-08 |
2026-01-09 |
| CVE-2022-45142 |
The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding "!= 0" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted. |
Important |
samba |
否 |
完成修复 |
2023-02-08 |
2026-01-09 |
| CVE-2023-0687 |
A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. |
Low |
glibc, glibc32 |
否 |
完成修复 |
2023-02-07 |
2025-12-11 |
| CVE-2023-0494 |
A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. |
Important |
xorg-x11-server-Xwayland, xorg-x11-server, tigervnc |
否 |
完成修复 |
2023-02-07 |
2026-01-04 |
| CVE-2023-0430 |
The Mozilla Foundation Security Advisory describes this flaw as: |
Important |
thunderbird |
否 |
完成修复 |
2023-02-07 |
2026-01-04 |
| CVE-2023-25193 |
A vulnerability was found HarfBuzz. This flaw allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks. |
Moderate |
java-17-openjdk, harfbuzz, thunderbird, java-11-openjdk, firefox |
否 |
完成修复 |
2023-02-04 |
2025-12-05 |
| CVE-2023-25139 |
sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes. |
Moderate |
glibc |
否 |
完成修复 |
2023-02-03 |
2025-12-11 |
| CVE-2023-21843 |
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Sound). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf, 11.0.17, 17.0.5, 19.0.1; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). |
Low |
java-11-openjdk, java-1.8.0-openjdk |
否 |
完成修复 |
2023-02-03 |
2025-12-05 |
| CVE-2023-21835 |
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 11.0.17, 17.0.5, 19.0.1; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via DTLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). |
Moderate |
java-11-openjdk |
否 |
完成修复 |
2023-02-03 |
2025-12-05 |
| CVE-2023-21830 |
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf; Oracle GraalVM Enterprise Edition: 20.3.8 and 21.3.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). |
Moderate |
java-1.8.0-openjdk |
否 |
完成修复 |
2023-02-03 |
2025-12-05 |
| CVE-2023-0045 |
No description is available for this CVE. |
Moderate |
kernel:4.19, kernel:6.6, kernel, kernel:5.10 |
否 |
完成修复 |
2023-02-03 |
2025-12-30 |
| CVE-2022-3560 |
A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack. |
Important |
pesign |
否 |
完成修复 |
2023-02-03 |
2026-01-04 |