| CVE-2018-18689 |
The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, a Signature Wrapping vulnerability exists in multiple products. An attacker can use /ByteRange and xref manipulations that are not detected by the signature-validation logic. This affects Foxit Reader before 9.4 and PhantomPDF before 8.3.9 and 9.x before 9.4. It also affects eXpert PDF 12 Ultimate, Expert PDF Reader, Nitro Pro, Nitro Reader, PDF Architect 6, PDF Editor 6 Pro, PDF Experte 9 Ultimate, PDFelement6 Pro, PDF Studio Viewer 2018, PDF Studio Pro, PDF-XChange Editor and Viewer, Perfect PDF 10 Premium, Perfect PDF Reader, Soda PDF, and Soda PDF Desktop. |
Moderate |
kernel |
否 |
完成修复 |
2021-01-07 |
2026-01-20 |
| CVE-2020-8265 |
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits. |
Important |
nodejs, nodejs:20 |
否 |
完成修复 |
2021-01-06 |
2026-01-06 |
| CVE-2020-4761 |
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 188895. |
Moderate |
kernel |
否 |
完成修复 |
2021-01-05 |
2025-12-23 |
| CVE-2019-4728 |
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of untrusted data. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code with SYSTEM privileges. IBM X-Force ID: 172452. |
Important |
kernel |
否 |
完成修复 |
2021-01-05 |
2025-12-04 |
| CVE-2019-25013 |
The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read. |
Moderate |
glibc |
否 |
完成修复 |
2021-01-04 |
2025-12-11 |
| CVE-2020-35963 |
flb_gzip_compress in flb_gzip.c in Fluent Bit before 1.6.4 has an out-of-bounds write because it does not use the correct calculation of the maximum gzip data-size expansion. |
Moderate |
kernel |
否 |
完成修复 |
2021-01-03 |
2026-01-20 |
| CVE-2020-27846 |
A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. |
Critical |
grafana, grafana-pcp |
否 |
完成修复 |
2020-12-21 |
2026-01-10 |
| CVE-2020-29652 |
Go 语言的 golang.org/x/crypto/ssh 组件(版本 v0.0.0-20201203163018-be400aefbc4c)中存在空指针解引用漏洞,允许远程攻击者对 SSH 服务器造成拒绝服务攻击。 |
Important |
container-tools:an8, udica |
否 |
完成修复 |
2020-12-15 |
2025-12-29 |
| CVE-2020-27821 |
QEMU(Quick Emulator)是法国法布里斯-贝拉(Fabrice Bellard)个人开发者的一套模拟处理器软件。该软件具有速度快、跨平台等特点。在初始化内存区域缓存期间,在QEMU的内存管理API中发现了一个漏洞。执行MMIO操作时,此问题可能导致对MSI-X表的越界写访问。guest用户可能会利用此漏洞使主机上的QEMU进程崩溃,从而导致拒绝服务。此漏洞影响5.2.0之前的QEMU版本。 |
Moderate |
virt:an, libvirt |
否 |
完成修复 |
2020-12-02 |
2025-12-18 |
| CVE-2021-28210 |
An unlimited recursion in DxeCore in EDK II.\nA flaw was found in edk2. An unlimited recursion in DxeCore may allow an attacker to corrupt the system memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Important |
ovmf, edk2 |
否 |
完成修复 |
2020-11-19 |
2026-01-05 |
| CVE-2020-28366 |
Go before 1.14.12 and 1.15.x before 1.15.5 allows Code Injection.\nAn input validation vulnerability was found in Go. From a generated go file (from the cgo tool), it is possible to modify symbols within that object file and specify code. This flaw allows an attacker to create a repository that includes malicious pre-built object files that could execute arbitrary code when downloaded and run via `go get` or `go build` while building a Go project. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. |
Important |
gcc, golang, go-toolset:an8 |
是 |
完成修复 |
2020-11-12 |
2025-12-10 |
| CVE-2020-28362 |
Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.\nA flaw was found in the math/big package of Go's standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability. |
Important |
gcc, grafana, gcc-toolset-10-gcc, container-tools:1.0, container-tools:2.0, go-toolset:an8, container-tools:an8, golang, grafana-pcp |
是 |
完成修复 |
2020-11-12 |
2025-12-10 |
| CVE-2020-28916 |
QEMU(Quick Emulator)是法国法布里斯-贝拉(Fabrice Bellard)个人开发者的一套模拟处理器软件。该软件具有速度快、跨平台等特点。qemu5.0.0中的hw/net/e1000e_core.c通过一个带有空缓冲地址的RX描述符有产生无限循环。 |
Low |
virt:an, libvirt |
否 |
完成修复 |
2020-11-11 |
2025-12-18 |
| CVE-2020-16125 |
|
Low |
gdm |
否 |
完成修复 |
2020-11-09 |
2026-01-25 |
| CVE-2020-27216 |
In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability. |
Important |
jetty |
否 |
完成修复 |
2020-10-23 |
2026-01-06 |
| CVE-2020-15684 |
Mozilla developers reported memory safety bugs present in Firefox 81. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 82. |
Important |
firefox |
否 |
完成修复 |
2020-10-22 |
2026-01-04 |
| CVE-2020-14798 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N). |
Low |
java-11-openjdk, java-1.8.0-openjdk |
否 |
完成修复 |
2020-10-21 |
2025-12-05 |
| CVE-2020-25692 |
A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.\nA NULL pointer dereference flaw was found in the OpenLDAP server, during a request for renaming RDNs. This flaw allows a remote, unauthenticated attacker to crash the slapd process by sending a specially crafted request, causing a denial of service. The highest threat from this vulnerability is to system availability. |
Important |
compat-openldap, openldap |
否 |
完成修复 |
2020-10-19 |
2026-01-07 |
| CVE-2020-25637 |
Red Hat libvirt是美国红帽(Red Hat)公司的一个用于实现Linux虚拟化功能的Linux API,它支持各种Hypervisor,包括Xen和KVM,以及QEMU和用于其他操作系统的一些虚拟产品。 在6.8.0之前的版本的libvirt API中存在内存双重释放问题,该问题负责请求有关正在运行的QEMU域的网络接口的信息。此漏洞影响polkit访问控制驱动程序。具体来说,使用有限的ACL权限连接到读写套接字的客户端可能会利用此漏洞使libvirt守护程序崩溃,从而导致拒绝服务或潜在地提升其在系统上的特权。此漏洞带来的最大威胁是对数据机密性和完整性以及系统可用性的威胁。 |
Moderate |
virt:an, libvirt |
否 |
完成修复 |
2020-09-29 |
2025-12-18 |
| CVE-2020-14364 |
QEMU 5.2.0 https://www.qemu.org/blog/2020/12/ 已经修复此漏洞 |
Important |
virt:an, qemu-kvm |
否 |
完成修复 |
2020-08-23 |
2025-12-05 |
| CVE-2020-1472 |
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'. |
Critical |
openchange, samba |
否 |
完成修复 |
2020-08-17 |
2026-01-10 |
| CVE-2020-16092 |
QEMU(Quick Emulator)是法国法布里斯-贝拉(Fabrice Bellard)软件开发者的一套模拟处理器软件。该软件具有速度快、跨平台等特点。 \nQEMU 5.0.0及之前版本存在拒绝服务漏洞。该漏洞源于数据包处理过程中出现断言失败。攻击者可利用该漏洞导致hw / net / net_tx_pkt.c中的net_tx_pkt_add_raw_fragment发生拒绝服务。 |
Low |
virt:an, libvirt |
否 |
完成修复 |
2020-07-26 |
2025-12-18 |
| CVE-2020-14339 |
A flaw was found in libvirt, where it leaked a file descriptor for /dev/mapper/control into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. |
Important |
qemu |
否 |
完成修复 |
2020-07-16 |
2025-12-09 |
| CVE-2020-15859 |
QEMU(Quick Emulator)是法国法布里斯-贝拉(Fabrice Bellard)软件开发者的一套模拟处理器软件。该软件具有速度快、跨平台等特点。\nQEMU 4.2.0版本中的hw/net/e1000e_core.c文件存在安全漏洞。攻击者可利用该漏洞导致QEMU进程崩溃(拒绝服务)。 |
Moderate |
libvirt, virt:an |
否 |
完成修复 |
2020-07-15 |
2025-12-18 |
| CVE-2020-14664 |
Vulnerability in the Java SE product of Oracle Java SE (component: JavaFX). The supported version that is affected is Java SE: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H). |
Important |
java-11-openjdk |
否 |
完成修复 |
2020-07-15 |
2025-12-05 |
| CVE-2020-14581 |
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). |
Low |
java-11-openjdk, java-1.8.0-openjdk |
否 |
完成修复 |
2020-07-15 |
2025-12-05 |
| CVE-2020-15586 |
Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.\nA flaw was found Go's net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability. |
Moderate |
golang, go-toolset:an8 |
是 |
完成修复 |
2020-07-14 |
2025-12-10 |
| CVE-2019-17638 |
In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with other data. Thread1 then proceeds to write the buffer that now contains different data. This results in client1, which issued request1 seeing data from another request or response which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.). If the Jetty version cannot be upgraded, the vulnerability can be significantly reduced by configuring a responseHeaderSize significantly larger than the requestHeaderSize (12KB responseHeaderSize and 8KB requestHeaderSize). |
Important |
jetty |
否 |
完成修复 |
2020-07-09 |
2026-01-06 |
| CVE-2020-15503 |
LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength. |
Important |
LibRaw |
否 |
完成修复 |
2020-07-02 |
2026-01-05 |
| CVE-2020-10379 |
In Pillow before 7.1.0, there are two Buffer Overflows in libImaging/TiffDecode.c. |
Important |
python-pillow |
否 |
完成修复 |
2020-06-25 |
2026-01-04 |
| CVE-2018-21247 |
|
Moderate |
libvncserver |
否 |
完成修复 |
2020-06-16 |
2026-01-25 |
| CVE-2020-14155 |
|
Low |
pcre |
否 |
完成修复 |
2020-06-14 |
2026-01-25 |
| CVE-2019-20838 |
|
Low |
pcre |
否 |
完成修复 |
2020-06-14 |
2026-01-25 |
| CVE-2020-10702 |
A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU. |
Moderate |
virt:an, qemu, qemu-kvm-ma, qemu-kvm |
否 |
完成修复 |
2020-06-04 |
2025-12-18 |
| CVE-2020-29368 |
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1. |
Important |
kernel:5.10, kernel:4.19, kernel |
是 |
完成修复 |
2020-06-03 |
2025-12-04 |
| CVE-2020-12723 |
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls. |
Important |
perl |
否 |
完成修复 |
2020-06-02 |
2026-01-05 |
| CVE-2020-10878 |
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection. |
Important |
perl |
否 |
完成修复 |
2020-06-02 |
2026-01-05 |
| CVE-2020-12389 |
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76. |
Important |
firefox |
否 |
完成修复 |
2020-05-26 |
2026-01-04 |
| CVE-2020-10756 |
An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. |
Moderate |
container-tools:an8, qemu-kvm, udica |
否 |
完成修复 |
2020-05-26 |
2025-12-18 |
| CVE-2020-13114 |
An issue was discovered in libexif before 0.6.22. An unrestricted size in handling Canon EXIF MakerNote data could lead to consumption of large amounts of compute time for decoding EXIF data. |
Important |
libexif |
否 |
完成修复 |
2020-05-21 |
2026-01-06 |
| CVE-2020-13113 |
An issue was discovered in libexif before 0.6.22. Use of uninitialized memory in EXIF Makernote handling could lead to crashes and potential use-after-free conditions. |
Important |
libexif |
否 |
完成修复 |
2020-05-21 |
2026-01-06 |
| CVE-2020-13659 |
address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.\nA NULL pointer dereference flaw was found in the MegaRAID SAS 8708EM2 emulator of the QEMU. This issue occurs because the address_space_map() API while mapping physical memory into the host's virtual address space, may return NULL without setting the length parameter to zero (0). This flaw allows a guest user or process to crash the QEMU process on the host resulting in a denial of service. |
Low |
qemu |
否 |
完成修复 |
2020-05-14 |
2025-12-18 |
| CVE-2020-12762 |
json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend. |
Important |
libfastjson, json-c |
否 |
完成修复 |
2020-05-09 |
2026-01-08 |
| CVE-2020-12279 |
An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. checkout.c mishandles equivalent filenames that exist because of NTFS short names. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1353. |
Low |
libgit2 |
否 |
完成修复 |
2020-04-28 |
2026-01-25 |
| CVE-2020-12243 |
In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash). |
Important |
compat-openldap, openldap |
否 |
完成修复 |
2020-04-28 |
2026-01-07 |
| CVE-2020-11947 |
QEMU是一套由法布里斯·贝拉(Fabrice Bellard)所编写的、以GPL许可证分发源码的模拟处理器,在GNU/Linux平台上使用广泛。\n\nQEMU 4.1.0中的block/iscsi.c中的iscsi_aio_ioctl_cb存在堆缓冲区溢出漏洞。攻击者可利用该漏洞获取进程内存中的信息。 |
Low |
virt:an, libvirt |
否 |
完成修复 |
2025-12-12 |
2025-12-18 |
| CVE-2020-1730 |
|
Moderate |
libssh |
否 |
完成修复 |
2020-04-08 |
2026-01-25 |
| CVE-2020-11100 |
In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.\nA flaw was found in the way HAProxy processed certain HTTP/2 request packets. This flaw allows an attacker to send crafted HTTP/2 request packets, which cause memory corruption, leading to a crash or potential remote arbitrary code execution with the permissions of the user running HAProxy. |
Important |
haproxy |
否 |
完成修复 |
2020-04-02 |
2026-01-05 |
| CVE-2020-10663 |
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.\nA flaw was found in rubygem-json. While parsing certain JSON documents, the json gem (including the one bundled with Ruby) can be coerced into creating arbitrary objects in the target system. This is the same issue as CVE-2013-0269. |
Important |
rubygem-json |
否 |
完成修复 |
2020-03-19 |
2026-01-04 |
| CVE-2020-10029 |
|
Moderate |
glibc |
否 |
完成修复 |
2020-02-11 |
2025-12-11 |
| CVE-2020-1711 |
An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host. |
Important |
virt:an, libvirt |
否 |
完成修复 |
2020-01-22 |
2025-12-09 |
| CVE-2019-20386 |
|
Low |
systemd |
否 |
完成修复 |
2020-01-21 |
2026-01-25 |
| CVE-2020-25690 |
|
Moderate |
fontforge |
否 |
完成修复 |
2020-01-20 |
2026-01-25 |
| CVE-2020-1751 |
|
Moderate |
glibc |
否 |
完成修复 |
2020-01-19 |
2025-12-11 |
| CVE-2020-1752 |
|
Moderate |
glibc |
否 |
完成修复 |
2020-01-16 |
2025-12-11 |
| CVE-2020-10703 |
在上游版本3.10.0中引入的libvirt API中找到了NULL指针取消引用,并在libvirt 6.0.0中进行了修复,以根据其目标路径获取存储池。更详细地说,此缺陷会影响没有目标路径创建的存储池,例如基于网络的池(例如gluster和RBD)。具有只读连接的非特权用户可能会利用此漏洞使libvirt守护程序崩溃,从而可能导致拒绝服务。\n |
Moderate |
libvirt |
否 |
完成修复 |
2020-01-13 |
2025-12-18 |
| CVE-2019-19956 |
|
Moderate |
libxml2 |
否 |
完成修复 |
2020-01-07 |
2026-01-25 |
| CVE-2020-7039 |
libslirp 4.1.0版本的tcp_subr.c文件的‘tcp_emu’函数存在安全漏洞,该漏洞源于程序没有正确管理内存。攻击者可利用该漏洞造成拒绝服务或可能执行任意代码。 |
Important |
libslirp |
否 |
完成修复 |
2020-01-06 |
2026-01-04 |
| CVE-2020-5312 |
libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.\nA flaw was discovered in python-pillow does where it does not properly restrict operations within the bounds of a memory buffer when decoding PCX images. An application that uses python-pillow to decode untrusted images may be vulnerable to this flaw, which can allow an attacker to crash the application or potentially execute code on the system. |
Important |
python-pillow |
否 |
完成修复 |
2020-01-03 |
2026-01-04 |
| CVE-2020-5311 |
libImaging/SgiRleDecode.c in Pillow before 6.2.2 has an SGI buffer overflow.\nAn out-of-bounds write flaw was discovered in python-pillow in the way SGI RLE images are decoded. An application that uses python-pillow to decode untrusted images may be vulnerable to this flaw, which can allow an attacker to crash the application or potentially execute code on the system. |
Important |
python-pillow |
否 |
完成修复 |
2020-01-03 |
2026-01-04 |
| CVE-2019-15692 |
TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow. Vulnerability could be triggered from CopyRectDecoder due to incorrect value checks. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. |
Important |
tigervnc |
否 |
完成修复 |
2019-12-26 |
2026-01-04 |
| CVE-2019-15691 |
TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity. |
Important |
tigervnc |
否 |
完成修复 |
2019-12-26 |
2026-01-04 |
| CVE-2019-19921 |
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.) |
Important |
docker, container-tools:2.0, container-tools:an8, container-tools:3.0, container-tools:4.0, container-tools:1.0, runc |
否 |
完成修复 |
2019-12-21 |
2026-01-08 |
| CVE-2019-20907 |
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.\nA flaw was found in python. In Lib/tarfile.py an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation. |
Important |
python36:3.6, python-Bottleneck, python38:3.8 |
否 |
完成修复 |
2019-12-10 |
2026-01-10 |
| CVE-2019-20485 |
在6.0.0之前,libvirt中的qemu/qemu_driver.c错误地将查询期间的监控作业分配给客户代理,从而允许攻击者导致拒绝服务(API阻塞)。 |
Moderate |
perl-Sys-Virt, virt:an |
否 |
完成修复 |
2019-12-04 |
2025-12-18 |
| CVE-2019-14889 |
|
Low |
libssh |
否 |
完成修复 |
2019-12-04 |
2026-01-25 |
| CVE-2019-19330 |
The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks. |
Moderate |
haproxy |
否 |
完成修复 |
2019-11-25 |
2026-01-25 |
| CVE-2018-12207 |
Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access. |
Important |
kpatch-patch, kernel |
是 |
完成修复 |
2019-11-11 |
2025-12-04 |
| CVE-2019-19012 |
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.\nAn integer overflow vulnerability leading to an out-of-bounds read was found in the way Oniguruma handled regular expression quantifiers. A remote attacker could abuse this flaw by providing a malformed regular expression that, when processed by an application linked to Oniguruma, could crash the application, causing a denial of service. |
Important |
oniguruma, ruby:2.5, php:7.2, php:7.3 |
否 |
完成修复 |
2019-11-08 |
2026-01-05 |
| CVE-2019-18874 |
psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.\nA double free issue has been discovered in python-psutil because of the mishandling of refcounts while converting system data into Python objects in functions like psutil_disk_partitions(), psutil_users(), psutil_net_if_addrs(), and others. In particular cases, a local attacker may be able to get code execution by manipulating system resources that python-psutil then tries to convert. |
Important |
python38:3.8, python-psutil |
否 |
完成修复 |
2019-11-07 |
2026-01-09 |
| CVE-2019-19204 |
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch_interval_quantifier (formerly known as fetch_range_quantifier) in regparse.c, PFETCH is called without checking PEND. This leads to a heap-based buffer over-read.\nAn out-of-bounds read vulnerability was found in Oniguruma in the way it handled regular expression quantifiers. A remote attacker could abuse this flaw by providing a malformed regular expression that, when processed by an application linked to Oniguruma, could possibly crash the application, resulting in a denial of service. |
Important |
oniguruma, php:7.3 |
否 |
完成修复 |
2019-11-06 |
2026-01-05 |
| CVE-2019-19203 |
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read.\nAn out-of-bounds read vulnerability was found in the way Oniguruma handled regular expressions with GB18030 character encoding. A UChar pointer is dereferenced without checking if it passed the end of the matched string, leading to a heap-based buffer over-read. A remote attacker could abuse this flaw by providing a malformed regular expression that, when processed by an application linked to Oniguruma, might crash the application causing a denial of service. |
Important |
oniguruma, php:7.3 |
否 |
完成修复 |
2019-11-06 |
2026-01-05 |
| CVE-2019-18218 |
cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write). |
Important |
file |
否 |
完成修复 |
2019-10-21 |
2026-01-09 |
| CVE-2019-17596 |
Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates. |
Important |
golang, go-toolset:an8 |
是 |
完成修复 |
2019-10-17 |
2025-12-10 |
| CVE-2019-17594 |
|
Moderate |
ncurses |
否 |
完成修复 |
2019-10-10 |
2026-01-25 |
| CVE-2019-17450 |
|
Low |
binutils |
否 |
完成修复 |
2019-10-07 |
2025-12-11 |
| CVE-2019-16865 |
An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.\nA flaw was discovered in the way the python-pillow may allocate a large amount of memory or require a long time while processing specially crafted image files, possibly causing a denial of service. Applications that use the library to process untrusted files may be vulnerable to this flaw. |
Important |
python-pillow |
否 |
完成修复 |
2019-10-04 |
2026-01-04 |
| CVE-2019-16866 |
Unbound before 1.9.4 accesses uninitialized memory, which allows remote attackers to trigger a crash via a crafted NOTIFY query. The source IP address of the query must match an access-control rule. |
Moderate |
unbound |
否 |
完成修复 |
2019-10-03 |
2026-01-25 |
| CVE-2018-16452 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-16451 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-16300 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-16230 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-16229 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-16228 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-16227 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-14882 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-14881 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-14880 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-14879 |
|
Moderate |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-14470 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-14469 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-14468 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-14467 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-14466 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-14465 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-14464 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |