CVE List

>
cve编号 漏洞描述 危险等级 包名 是否影响lns23-2 修复状态 发现时间 修复时间
CVE-2018-14463
Low tcpdump 完成修复 2019-10-01 2026-01-25
CVE-2018-14462
Low tcpdump 完成修复 2019-10-01 2026-01-25
CVE-2018-14461
Low tcpdump 完成修复 2019-10-01 2026-01-25
CVE-2019-16276
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.\nIt was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration.
Moderate gcc, golang, go-toolset:an8 完成修复 2019-09-25 2025-12-10
CVE-2019-20382
在ui/ VNC断开操作期间,QEMU 4.1.0在zrle_compress_data中的zrle_compress_data中存在内存泄漏,因为libz被滥用,导致在deflateInit2中分配的内存在deflateEnd中没有释放
Low libvirt, virt:an 完成修复 2019-09-16 2025-12-18
CVE-2019-18277
A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).
Moderate haproxy 完成修复 2019-09-13 2026-01-25
CVE-2019-15927
An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.
Important kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2019-09-04 2025-12-04
CVE-2019-15919
An issue was discovered in the Linux kernel before 5.0.10. SMB2_write in fs/cifs/smb2pdu.c has a use-after-free.
Important kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2019-09-04 2025-12-04
CVE-2019-15903
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
Important firefox, python, expat, thunderbird, cmake, python3, python27:2.7 完成修复 2019-09-04 2026-01-09
CVE-2019-12402
The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress.
Important apache-commons-compress 完成修复 2019-08-30 2026-01-06
CVE-2019-14866
Moderate cpio 完成修复 2019-08-29 2026-01-25
CVE-2018-20969
do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.
Important patch 完成修复 2019-08-15 2025-12-29
CVE-2019-14809
net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.
Important golang, go-toolset:an8 完成修复 2019-08-13 2025-12-10
CVE-2019-14806
Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id.
Important python-werkzeug 完成修复 2019-08-09 2026-01-04
CVE-2019-14271
In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.
Important docker 完成修复 2019-07-29 2026-01-08
CVE-2019-14378
Important toolbox, container-tools:1.0, slirp4netns 完成修复 2019-07-27 2025-12-30
CVE-2019-17543
LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."
Important lz4 完成修复 2019-07-17 2026-01-09
CVE-2018-14550
An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.
Important libpng 完成修复 2019-07-10 2026-01-05
CVE-2017-12652
libpng before 1.6.32 does not properly check the length of chunks against the user limit.
Low libpng 完成修复 2019-07-10 2026-01-25
CVE-2019-18276
An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.\nA privilege escalation vulnerability was found in bash in the way it dropped privileges when started with an effective user id not equal to the real user id. Bash may be vulnerable to this flaw if the setuid permission is set and the owner of the bash program itself is a non-root user. A local attacker could exploit this flaw to escalate their privileges on the system.
Important bash, bash-completion 完成修复 2019-07-01 2026-01-07
CVE-2019-10168
The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs accept an "emulator" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
Important libvirt 完成修复 2019-06-19 2025-12-09
CVE-2019-10167
The virConnectGetDomainCapabilities() libvirt API accepts an "emulatorbin" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
Important libvirt 完成修复 2019-06-19 2025-12-09
CVE-2019-10166
It was discovered that libvirtd would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.
Important libvrit 完成修复 2019-06-19 2025-12-09
CVE-2019-10161
我们发现libvirtd将允许只读客户端使用virDomainSaveImageGetXMLDesc() API,指定一个任意路径,该路径将通过libvirtd进程的权限进行访问。具有libvirtd套接字访问权限的攻击者可以使用它来探测任意文件的存在,导致拒绝服务或导致libvirtd执行任意程序。
Important libvirt 完成修复 2019-06-19 2025-12-09
CVE-2019-8324
An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.
Important ruby, ruby:2.5 完成修复 2019-06-17 2026-01-04
CVE-2018-16871
Moderate kernel 完成修复 2019-06-02 2025-12-23
CVE-2019-10132
A flaw was found in libvirt in version 4.1.0 and earlier. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Important libvirt, virt:an 完成修复 2019-05-20 2025-12-09
CVE-2019-13173
fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.
Important nodejs, nodejs:20, nodejs:10 完成修复 2019-05-15 2026-01-06
CVE-2018-12130
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Important virt:an, virt-v2v, kernel 完成修复 2019-05-13 2025-12-04
CVE-2018-12127
Microprocessor使用“加载端口”子组件从内存或IO执行加载操作。在加载操作期间,加载端口从内存或IO子系统接收数据,然后将数据提供给CPU寄存器和CPU管道中的操作。过时的加载操作结果存储在“加载端口”表中,直到被更新的操作覆盖。由攻击者触发的某些加载端口操作可用于显示有关先前过时请求的数据,这些请求通过时序侧信道将数据泄漏回攻击者。
Moderate virt:an, virt-v2v, kernel 完成修复 2019-05-13 2025-12-18
CVE-2018-12126
现代英特尔微处理器实现了硬件级的微优化,以提高向CPU缓存写入数据的性能。写入操作被分成STA(存储地址)和STD(存储数据)子操作。这些子操作允许处理器将地址生成逻辑切换到这些子操作中以进行优化写入。这些子操作都写入称为“处理器存储缓冲器”的共享分布式处理器结构。因此,未经授权的攻击者可以使用此漏洞读取驻留在CPU的处理器存储缓冲区内的私有数据。
Moderate virt:an, virt-v2v, kernel 完成修复 2019-05-13 2025-12-18
CVE-2019-11811
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
Important kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2019-05-07 2025-12-04
CVE-2019-12155
qxl: check release info object\n \n When releasing spice resources in release_resource() routine,\n if release info object 'ext.info' is null, it leads to null\n pointer dereference. Add check to avoid it.\n \n
Low virt:an, sgabios 完成修复 2019-04-24 2025-12-18
CVE-2018-16877
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation.
Important pacemaker 完成修复 2019-04-16 2026-01-05
CVE-2019-0215
In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions.
Important httpd:2.4, mod_md 完成修复 2019-03-31 2026-01-09
CVE-2019-0211
In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.
Important httpd:2.4, mod_md 完成修复 2019-03-31 2026-01-09
CVE-2018-18506
Moderate firefox, thunderbird 完成修复 2019-03-19 2026-01-24
CVE-2019-3833
Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server.
Important openwsman 完成修复 2019-03-14 2026-01-05
CVE-2019-9741
Moderate golang, go-toolset:an8 完成修复 2019-03-12 2025-12-10
CVE-2019-3863
A flaw was found in libssh2 before 1.8.1 creating a vulnerability on the SSH client side. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used by the SSH client as an index to copy memory causing in an out of bounds memory write error.
Important libssh2 完成修复 2019-03-12 2026-01-04
CVE-2019-3857
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
Important libssh2 完成修复 2019-03-12 2026-01-04
CVE-2019-3856
An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
Important libssh2 完成修复 2019-03-12 2026-01-04
CVE-2019-3855
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
Important libssh2 完成修复 2019-03-12 2026-01-04
CVE-2019-3890
It was discovered evolution-ews before 3.31.3 does not check the validity of SSL certificates. An attacker could abuse this flaw to get confidential information by tricking the user into connecting to a fake server without the user noticing the difference.\nIt was discovered evolution-ews does not check the validity of SSL certificates. An attacker could abuse this flaw to get confidential information by tricking the user into connecting to a fake server without the user noticing the difference.
Important evolution-data-server, atkmm, evolution-mapi, evolution-ews 完成修复 2019-02-15 2026-01-07
CVE-2018-18511
Moderate firefox, thunderbird 完成修复 2019-02-11 2026-01-24
CVE-2018-20749
LibVNC before 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete.
Important libvncserver 完成修复 2019-01-31 2026-01-05
CVE-2019-9169
Moderate glibc 完成修复 2019-01-19 2025-12-11
CVE-2019-9003
In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a "service ipmievd restart" loop.
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2019-01-16 2025-12-17
CVE-2018-20721
URI_FUNC() in UriParse.c in uriparser before 0.9.1 has an out-of-bounds read (in uriParse*Ex* functions) for an incomplete URI with an IPv6 address containing an embedded IPv4 address, such as a "//[::44.1" address.
Low uriparser 完成修复 2019-01-16 2026-01-25
CVE-2019-2534
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N).
Important mariadb, mariadb:10.5, mysql:8.0, mariadb:10.3, mysql 完成修复 2019-01-15 2026-01-04
CVE-2019-6706
Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.
Important lua-rpm-macros 完成修复 2019-01-10 2026-01-04
CVE-2018-20673
binutils 2.31.1 合并的 libiberty 代码 (cplus-dem.c) 可能在特定输入目标文件的情况下产生缓冲区溢出问题。
Low gcc 完成修复 2018-12-26 2025-12-15
CVE-2018-20483
Low curl 完成修复 2018-12-25 2026-01-25
CVE-2018-20657
The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, has a memory leak via a crafted string, leading to a denial of service (memory consumption), as demonstrated by cxxfilt, a related issue to CVE-2018-12698.
Low gdb 完成修复 2018-12-17 2025-12-09
CVE-2018-20815
A heap buffer overflow issue was found in the load_device_tree() function of QEMU, which is invoked to load a device tree blob at boot time. It occurs due to device tree size manipulation before buffer allocation, which could overflow a signed int type. A user/process could use this flaw to potentially execute arbitrary code on a host system with privileges of the QEMU process.
Important qemu 完成修复 2018-12-13 2025-12-10
CVE-2018-19985
Low kernel 完成修复 2018-12-11 2026-01-20
CVE-2018-20169
Moderate kernel 完成修复 2018-12-04 2025-12-23
CVE-2018-19824
Moderate kernel 完成修复 2018-12-03 2025-12-23
CVE-2018-18356
An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Important thunderbird 完成修复 2018-12-03 2026-01-05
CVE-2018-16884
A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
Important kernel 完成修复 2018-11-26 2025-12-04
CVE-2018-19854
Moderate kernel 完成修复 2018-11-02 2025-12-23
CVE-2018-10933
A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
Important libssh 完成修复 2018-10-17 2026-01-08
CVE-2018-15471
An issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products. The Linux netback driver allows frontends to control mapping of requests to request queues. When processing a request to set or change this mapping, some input validation (e.g., for an integer overflow) was missing or flawed, leading to OOB access in hash handling. A malicious or buggy frontend may cause the (usually privileged) backend to make out of bounds memory accesses, potentially resulting in one or more of privilege escalation, Denial of Service (DoS), or information leaks.\nA flaw in the netback module allowed frontends to control mapping of requests to request queues. An attacker can change this mapping by requesting invalid mapping requests allowing the (usually privileged) backend to access out-of-bounds memory access for reading and writing.
Important kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2018-08-14 2025-12-04
CVE-2018-8037
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.\n
Important xsom, pki-deps:10.6 完成修复 2018-07-21 2026-01-04
CVE-2017-18342
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.
Important PyYAML 完成修复 2018-06-27 2026-01-04
CVE-2018-14613
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c.\nAn issue was discovered in the btrfs filesystem code in the Linux kernel. An invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image is due to a lack of block group item validation in check_leaf_item() in fs/btrfs/tree-checker.c function. This could lead to a system crash and a denial of service.
Moderate kernel:6.6, kernel:4.19, kernel:5.10 完成修复 2018-05-26 2025-12-17
CVE-2019-16680
Moderate file-roller 完成修复 2018-03-13 2026-01-25
CVE-2017-18216
In fs/ocfs2/cluster/nodemanager.c in the Linux kernel before 4.15, local users can cause a denial of service (NULL pointer dereference and BUG) because a required mutex is not used.\nIn fs/ocfs2/cluster/nodemanager.c in the Linux kernel before 4.15, local users can cause a denial of service (NULL pointer dereference and BUG) because a required mutex is not used.
Moderate kernel:5.10, kernel:4.19, kernel:6.6 完成修复 2017-11-16 2025-12-17
CVE-2016-10228
https://sourceware.org/bugzilla/show_bug.cgi?id=19519\n
Low glibc 完成修复 2017-01-24 2025-12-11
CVE-2016-10745
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.\nA flaw was found in Pallets Jinja prior to version 2.8.1 allows sandbox escape. Python's string format method added to strings can be used to discover potentially dangerous values including configuration values. The highest threat from this vulnerability is to data confidentiality and integrity as well as system integrity.
Important python27:2.7, python-jinja2 完成修复 2016-12-29 2026-01-04
CVE-2015-3416
The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.\nIt was found that SQLite's sqlite3VXPrintf() function did not properly handle precision and width values during floating-point conversions. A local attacker could submit a specially crafted SELECT statement that would crash the SQLite process, or have other unspecified impacts.
Moderate sqlite 完成修复 2015-03-31 2026-01-25
CVE-2025-58188
Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.
Moderate golang 完成修复 2025-12-01 2025-12-10
CVE-2025-13699
A flaw was found in MariaDB. This vulnerability allows remote attackers to execute arbitrary code on affected installations via improper validation of a user-supplied path prior to using it in file operations in the mariadb-dump utility, requiring user interaction.
Important mariadb:10.5, mariadb, mariadb:10.3 完成修复 2025-12-01 2025-12-29
CVE-2025-2486
The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.
Low edk2 完成修复 2025-11-28 2026-01-25
CVE-2025-47913
SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.
Important golang 完成修复 2025-11-26 2025-12-10
CVE-2025-13502
A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and integer underflow, leading to a UIProcess crash (DoS) via a crafted payload to the GLib remote inspector server.
Important webkit2gtk3, webkitgtk 完成修复 2025-11-26 2026-01-04
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Important nodejs 完成修复 2023-10-10 2026-01-04
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Important nghttp2 完成修复 2023-10-19 2026-01-03
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Important golang 完成修复 2023-11-14 2025-12-17
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Important golang-dbus 完成修复 2023-11-14 2025-12-16
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Important haproxy 完成修复 NULL 2026-01-04
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Important nginx 完成修复 NULL 2026-01-04
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Important httpd 完成修复 NULL 2026-01-04
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Important tomcat 完成修复 NULL 2026-01-04
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Important git-lfs 完成修复 NULL 2026-01-04
CVE-2023-44487
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Important skopeo 完成修复 NULL 2026-01-04
CVE-2023-37369
In Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2, there can be an application crash in QXmlStreamReader via a crafted XML string that triggers a situation in which a prefix is greater than a length.
Important python-qt5 完成修复 2023-12-21 2026-01-04
CVE-2023-37369
在5.15.15之前的Qt、6.2.9之前的6.x以及6.5.2之前的6.3.x到6.5.x中,QXmlStreamReader中可能会通过精心设计的XML字符串导致应用程序崩溃,从而触发前缀为大于长度。
Important qt5 完成修复 2023-12-21 2026-01-04
CVE-2023-37369
在5.15.15之前的Qt、6.2.9之前的6.x以及6.5.2之前的6.3.x到6.5.x中,QXmlStreamReader中可能会通过精心设计的XML字符串导致应用程序崩溃,从而触发前缀为大于长度。
Important qt5-qt3d, qt5-qtbase, qt5-qtconnectivity,qt-qtdeclarative, qt5-qtdoc 完成修复 2023-12-21 2026-01-03
CVE-2023-37369
在5.15.15之前的Qt、6.2.9之前的6.x以及6.5.2之前的6.3.x到6.5.x中,QXmlStreamReader中可能会通过精心设计的XML字符串导致应用程序崩溃,从而触发前缀为大于长度。\n
Important qt5-qtwebkit, qt5-qtwebsockets, qt5-qtx11extras, qt5-qtxmlpatterns, qt5-doc 完成修复 2023-12-11 2026-01-03
CVE-2023-37369
在5.15.15之前的Qt、6.2.9之前的6.x以及6.5.2之前的6.3.x到6.5.x中,QXmlStreamReader中可能会通过精心设计的XML字符串导致应用程序崩溃,从而触发前缀为大于长度。\n
Important qt5-qtquick3d, qt5-qtquickcontrols, qt5-qtquickcontrols2, qt5-qtremoteobjects 完成修复 2023-12-21 2026-01-03
CVE-2022-41720
A flaw was found in OS, net/http golang library. In Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted in a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With the fix applied, the behavior of os.DirFS("") has changed. Previously, an empty root was treated equivalently to "/", so os.DirFS("").Open(tmp) would open the path "/tmp". This now returns an error.
Important buildah, butane, conmon, containernetworking-plugins, git-lfs 完成修复 NULL 2026-01-04
CVE-2022-41720
A flaw was found in OS, net/http golang library. In Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted in a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With the fix applied, the behavior of os.DirFS("") has changed. Previously, an empty root was treated equivalently to "/", so os.DirFS("").Open(tmp) would open the path "/tmp". This now returns an error.
Important go-toolset, grafana, grafana-pcp, ignition, osbuild-composer 完成修复 NULL 2025-12-17
CVE-2022-41720
A flaw was found in OS, net/http golang library. In Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted in a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With the fix applied, the behavior of os.DirFS("") has changed. Previously, an empty root was treated equivalently to "/", so os.DirFS("").Open(tmp) would open the path "/tmp". This now returns an error.
Important podman,skopeo, toolbox, weldr-client 完成修复 NULL 2025-12-16
CVE-2021-33197
In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.
Important git, golang 完成修复 NULL 2025-12-17
CVE-2019-9514
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
Important golang 完成修复 NULL 2025-12-17
CVE-2019-9514
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
Important nginx 完成修复 NULL 2026-01-04
CVE-2019-9514
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
Important nodejs 完成修复 NULL 2026-01-04
CVE-2019-9514
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
Important jetty 完成修复 NULL 2026-01-03
CVE-2019-9514
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
Important nodejs-packaging 完成修复 NULL 2026-01-03

第1页 | 上一页| 下一页 | 最后一页

©龙芯开源社区 all right reserved,powered by Gitbook文档更新时间: 2026-03-16 12:14:50

results matching ""

    No results matching ""

    results matching ""

      No results matching ""