| CVE-2018-14463 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-14462 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2018-14461 |
|
Low |
tcpdump |
否 |
完成修复 |
2019-10-01 |
2026-01-25 |
| CVE-2019-16276 |
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.\nIt was discovered that net/http (through net/textproto) in golang does not correctly interpret HTTP requests where an HTTP header contains spaces before the colon. This could be abused by an attacker to smuggle HTTP requests when a proxy or a firewall is placed behind a server implemented in Go or to filter bypasses depending on the specific network configuration. |
Moderate |
gcc, golang, go-toolset:an8 |
是 |
完成修复 |
2019-09-25 |
2025-12-10 |
| CVE-2019-20382 |
在ui/ VNC断开操作期间,QEMU 4.1.0在zrle_compress_data中的zrle_compress_data中存在内存泄漏,因为libz被滥用,导致在deflateInit2中分配的内存在deflateEnd中没有释放 |
Low |
libvirt, virt:an |
否 |
完成修复 |
2019-09-16 |
2025-12-18 |
| CVE-2019-18277 |
A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification). |
Moderate |
haproxy |
否 |
完成修复 |
2019-09-13 |
2026-01-25 |
| CVE-2019-15927 |
An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2019-09-04 |
2025-12-04 |
| CVE-2019-15919 |
An issue was discovered in the Linux kernel before 5.0.10. SMB2_write in fs/cifs/smb2pdu.c has a use-after-free. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2019-09-04 |
2025-12-04 |
| CVE-2019-15903 |
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read. |
Important |
firefox, python, expat, thunderbird, cmake, python3, python27:2.7 |
否 |
完成修复 |
2019-09-04 |
2026-01-09 |
| CVE-2019-12402 |
The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress. |
Important |
apache-commons-compress |
否 |
完成修复 |
2019-08-30 |
2026-01-06 |
| CVE-2019-14866 |
|
Moderate |
cpio |
否 |
完成修复 |
2019-08-29 |
2026-01-25 |
| CVE-2018-20969 |
do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter. |
Important |
patch |
否 |
完成修复 |
2019-08-15 |
2025-12-29 |
| CVE-2019-14809 |
net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com. |
Important |
golang, go-toolset:an8 |
是 |
完成修复 |
2019-08-13 |
2025-12-10 |
| CVE-2019-14806 |
Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id. |
Important |
python-werkzeug |
否 |
完成修复 |
2019-08-09 |
2026-01-04 |
| CVE-2019-14271 |
In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container. |
Important |
docker |
否 |
完成修复 |
2019-07-29 |
2026-01-08 |
| CVE-2019-14378 |
|
Important |
toolbox, container-tools:1.0, slirp4netns |
否 |
完成修复 |
2019-07-27 |
2025-12-30 |
| CVE-2019-17543 |
LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk." |
Important |
lz4 |
否 |
完成修复 |
2019-07-17 |
2026-01-09 |
| CVE-2018-14550 |
An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png. |
Important |
libpng |
否 |
完成修复 |
2019-07-10 |
2026-01-05 |
| CVE-2017-12652 |
libpng before 1.6.32 does not properly check the length of chunks against the user limit. |
Low |
libpng |
否 |
完成修复 |
2019-07-10 |
2026-01-25 |
| CVE-2019-18276 |
An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.\nA privilege escalation vulnerability was found in bash in the way it dropped privileges when started with an effective user id not equal to the real user id. Bash may be vulnerable to this flaw if the setuid permission is set and the owner of the bash program itself is a non-root user. A local attacker could exploit this flaw to escalate their privileges on the system. |
Important |
bash, bash-completion |
否 |
完成修复 |
2019-07-01 |
2026-01-07 |
| CVE-2019-10168 |
The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs accept an "emulator" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges. |
Important |
libvirt |
否 |
完成修复 |
2019-06-19 |
2025-12-09 |
| CVE-2019-10167 |
The virConnectGetDomainCapabilities() libvirt API accepts an "emulatorbin" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges. |
Important |
libvirt |
否 |
完成修复 |
2019-06-19 |
2025-12-09 |
| CVE-2019-10166 |
It was discovered that libvirtd would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed. |
Important |
libvrit |
否 |
完成修复 |
2019-06-19 |
2025-12-09 |
| CVE-2019-10161 |
我们发现libvirtd将允许只读客户端使用virDomainSaveImageGetXMLDesc() API,指定一个任意路径,该路径将通过libvirtd进程的权限进行访问。具有libvirtd套接字访问权限的攻击者可以使用它来探测任意文件的存在,导致拒绝服务或导致libvirtd执行任意程序。 |
Important |
libvirt |
是 |
完成修复 |
2019-06-19 |
2025-12-09 |
| CVE-2019-8324 |
An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check. |
Important |
ruby, ruby:2.5 |
否 |
完成修复 |
2019-06-17 |
2026-01-04 |
| CVE-2018-16871 |
|
Moderate |
kernel |
否 |
完成修复 |
2019-06-02 |
2025-12-23 |
| CVE-2019-10132 |
A flaw was found in libvirt in version 4.1.0 and earlier. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Important |
libvirt, virt:an |
否 |
完成修复 |
2019-05-20 |
2025-12-09 |
| CVE-2019-13173 |
fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable. |
Important |
nodejs, nodejs:20, nodejs:10 |
是 |
完成修复 |
2019-05-15 |
2026-01-06 |
| CVE-2018-12130 |
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf |
Important |
virt:an, virt-v2v, kernel |
是 |
完成修复 |
2019-05-13 |
2025-12-04 |
| CVE-2018-12127 |
Microprocessor使用“加载端口”子组件从内存或IO执行加载操作。在加载操作期间,加载端口从内存或IO子系统接收数据,然后将数据提供给CPU寄存器和CPU管道中的操作。过时的加载操作结果存储在“加载端口”表中,直到被更新的操作覆盖。由攻击者触发的某些加载端口操作可用于显示有关先前过时请求的数据,这些请求通过时序侧信道将数据泄漏回攻击者。 |
Moderate |
virt:an, virt-v2v, kernel |
否 |
完成修复 |
2019-05-13 |
2025-12-18 |
| CVE-2018-12126 |
现代英特尔微处理器实现了硬件级的微优化,以提高向CPU缓存写入数据的性能。写入操作被分成STA(存储地址)和STD(存储数据)子操作。这些子操作允许处理器将地址生成逻辑切换到这些子操作中以进行优化写入。这些子操作都写入称为“处理器存储缓冲器”的共享分布式处理器结构。因此,未经授权的攻击者可以使用此漏洞读取驻留在CPU的处理器存储缓冲区内的私有数据。 |
Moderate |
virt:an, virt-v2v, kernel | >
否 |
完成修复 |
2019-05-13 |
2025-12-18 |
| CVE-2019-11811 |
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. |
Important |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2019-05-07 |
2025-12-04 |
| CVE-2019-12155 |
qxl: check release info object\n \n When releasing spice resources in release_resource() routine,\n if release info object 'ext.info' is null, it leads to null\n pointer dereference. Add check to avoid it.\n \n |
Low |
virt:an, sgabios |
否 |
完成修复 |
2019-04-24 |
2025-12-18 |
| CVE-2018-16877 |
A flaw was found in the way pacemaker's client-server authentication was implemented in versions up to and including 2.0.0. A local attacker could use this flaw, and combine it with other IPC weaknesses, to achieve local privilege escalation. |
Important |
pacemaker |
否 |
完成修复 |
2019-04-16 |
2026-01-05 |
| CVE-2019-0215 |
In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions. |
Important |
httpd:2.4, mod_md |
否 |
完成修复 |
2019-03-31 |
2026-01-09 |
| CVE-2019-0211 |
In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected. |
Important |
httpd:2.4, mod_md |
否 |
完成修复 |
2019-03-31 |
2026-01-09 |
| CVE-2018-18506 |
|
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2019-03-19 |
2026-01-24 |
| CVE-2019-3833 |
Openwsman, versions up to and including 2.6.9, are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server. |
Important |
openwsman |
否 |
完成修复 |
2019-03-14 |
2026-01-05 |
| CVE-2019-9741 |
|
Moderate |
golang, go-toolset:an8 |
是 |
完成修复 |
2019-03-12 |
2025-12-10 |
| CVE-2019-3863 |
A flaw was found in libssh2 before 1.8.1 creating a vulnerability on the SSH client side. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used by the SSH client as an index to copy memory causing in an out of bounds memory write error. |
Important |
libssh2 |
否 |
完成修复 |
2019-03-12 |
2026-01-04 |
| CVE-2019-3857 |
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server. |
Important |
libssh2 |
否 |
完成修复 |
2019-03-12 |
2026-01-04 |
| CVE-2019-3856 |
An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server. |
Important |
libssh2 |
否 |
完成修复 |
2019-03-12 |
2026-01-04 |
| CVE-2019-3855 |
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server. |
Important |
libssh2 |
否 |
完成修复 |
2019-03-12 |
2026-01-04 |
| CVE-2019-3890 |
It was discovered evolution-ews before 3.31.3 does not check the validity of SSL certificates. An attacker could abuse this flaw to get confidential information by tricking the user into connecting to a fake server without the user noticing the difference.\nIt was discovered evolution-ews does not check the validity of SSL certificates. An attacker could abuse this flaw to get confidential information by tricking the user into connecting to a fake server without the user noticing the difference. |
Important |
evolution-data-server, atkmm, evolution-mapi, evolution-ews |
否 |
完成修复 |
2019-02-15 |
2026-01-07 |
| CVE-2018-18511 |
|
Moderate |
firefox, thunderbird |
否 |
完成修复 |
2019-02-11 |
2026-01-24 |
| CVE-2018-20749 |
LibVNC before 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete. |
Important |
libvncserver |
否 |
完成修复 |
2019-01-31 |
2026-01-05 |
| CVE-2019-9169 |
|
Moderate |
glibc |
否 |
完成修复 |
2019-01-19 |
2025-12-11 |
| CVE-2019-9003 |
In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a "service ipmievd restart" loop. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2019-01-16 |
2025-12-17 |
| CVE-2018-20721 |
URI_FUNC() in UriParse.c in uriparser before 0.9.1 has an out-of-bounds read (in uriParse*Ex* functions) for an incomplete URI with an IPv6 address containing an embedded IPv4 address, such as a "//[::44.1" address. |
Low |
uriparser |
否 |
完成修复 |
2019-01-16 |
2026-01-25 |
| CVE-2019-2534 |
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N). |
Important |
mariadb, mariadb:10.5, mysql:8.0, mariadb:10.3, mysql |
否 |
完成修复 |
2019-01-15 |
2026-01-04 |
| CVE-2019-6706 |
Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships. |
Important |
lua-rpm-macros |
否 |
完成修复 |
2019-01-10 |
2026-01-04 |
| CVE-2018-20673 |
binutils 2.31.1 合并的 libiberty 代码 (cplus-dem.c) 可能在特定输入目标文件的情况下产生缓冲区溢出问题。 |
Low |
gcc |
否 |
完成修复 |
2018-12-26 |
2025-12-15 |
| CVE-2018-20483 |
|
Low |
curl |
否 |
完成修复 |
2018-12-25 |
2026-01-25 |
| CVE-2018-20657 |
The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, has a memory leak via a crafted string, leading to a denial of service (memory consumption), as demonstrated by cxxfilt, a related issue to CVE-2018-12698. |
Low |
gdb |
否 |
完成修复 |
2018-12-17 |
2025-12-09 |
| CVE-2018-20815 |
A heap buffer overflow issue was found in the load_device_tree() function of QEMU, which is invoked to load a device tree blob at boot time. It occurs due to device tree size manipulation before buffer allocation, which could overflow a signed int type. A user/process could use this flaw to potentially execute arbitrary code on a host system with privileges of the QEMU process. |
Important |
qemu |
否 |
完成修复 |
2018-12-13 |
2025-12-10 |
| CVE-2018-19985 |
|
Low |
kernel |
否 |
完成修复 |
2018-12-11 |
2026-01-20 |
| CVE-2018-20169 |
|
Moderate |
kernel |
否 |
完成修复 |
2018-12-04 |
2025-12-23 |
| CVE-2018-19824 |
|
Moderate |
kernel |
否 |
完成修复 |
2018-12-03 |
2025-12-23 |
| CVE-2018-18356 |
An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
Important |
thunderbird |
否 |
完成修复 |
2018-12-03 |
2026-01-05 |
| CVE-2018-16884 |
A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. |
Important |
kernel |
是 |
完成修复 |
2018-11-26 |
2025-12-04 |
| CVE-2018-19854 |
|
Moderate |
kernel |
否 |
完成修复 |
2018-11-02 |
2025-12-23 |
| CVE-2018-10933 |
A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access. |
Important |
libssh |
否 |
完成修复 |
2018-10-17 |
2026-01-08 |
| CVE-2018-15471 |
An issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products. The Linux netback driver allows frontends to control mapping of requests to request queues. When processing a request to set or change this mapping, some input validation (e.g., for an integer overflow) was missing or flawed, leading to OOB access in hash handling. A malicious or buggy frontend may cause the (usually privileged) backend to make out of bounds memory accesses, potentially resulting in one or more of privilege escalation, Denial of Service (DoS), or information leaks.\nA flaw in the netback module allowed frontends to control mapping of requests to request queues. An attacker can change this mapping by requesting invalid mapping requests allowing the (usually privileged) backend to access out-of-bounds memory access for reading and writing. |
Important |
kernel:6.6, kernel:4.19, kernel:5.10 |
是 |
完成修复 |
2018-08-14 |
2025-12-04 |
| CVE-2018-8037 |
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.\n |
Important |
xsom, pki-deps:10.6 |
否 |
完成修复 |
2018-07-21 |
2026-01-04 |
| CVE-2017-18342 |
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function. |
Important |
PyYAML |
否 |
完成修复 |
2018-06-27 |
2026-01-04 |
| CVE-2018-14613 |
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c.\nAn issue was discovered in the btrfs filesystem code in the Linux kernel. An invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image is due to a lack of block group item validation in check_leaf_item() in fs/btrfs/tree-checker.c function. This could lead to a system crash and a denial of service. |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2018-05-26 |
2025-12-17 |
| CVE-2019-16680 |
|
Moderate |
file-roller |
否 |
完成修复 |
2018-03-13 |
2026-01-25 |
| CVE-2017-18216 |
In fs/ocfs2/cluster/nodemanager.c in the Linux kernel before 4.15, local users can cause a denial of service (NULL pointer dereference and BUG) because a required mutex is not used.\nIn fs/ocfs2/cluster/nodemanager.c in the Linux kernel before 4.15, local users can cause a denial of service (NULL pointer dereference and BUG) because a required mutex is not used. |
Moderate |
kernel:5.10, kernel:4.19, kernel:6.6 |
否 |
完成修复 |
2017-11-16 |
2025-12-17 |
| CVE-2016-10228 |
https://sourceware.org/bugzilla/show_bug.cgi?id=19519\n |
Low |
glibc |
否 |
完成修复 |
2017-01-24 |
2025-12-11 |
| CVE-2016-10745 |
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.\nA flaw was found in Pallets Jinja prior to version 2.8.1 allows sandbox escape. Python's string format method added to strings can be used to discover potentially dangerous values including configuration values. The highest threat from this vulnerability is to data confidentiality and integrity as well as system integrity. |
Important |
python27:2.7, python-jinja2 |
否 |
完成修复 |
2016-12-29 |
2026-01-04 |
| CVE-2015-3416 |
The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.\nIt was found that SQLite's sqlite3VXPrintf() function did not properly handle precision and width values during floating-point conversions. A local attacker could submit a specially crafted SELECT statement that would crash the SQLite process, or have other unspecified impacts. |
Moderate |
sqlite |
否 |
完成修复 |
2015-03-31 |
2026-01-25 |
| CVE-2025-58188 |
Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains. |
Moderate |
golang |
是 |
完成修复 |
2025-12-01 |
2025-12-10 |
| CVE-2025-13699 |
A flaw was found in MariaDB. This vulnerability allows remote attackers to execute arbitrary code on affected installations via improper validation of a user-supplied path prior to using it in file operations in the mariadb-dump utility, requiring user interaction. |
Important |
mariadb:10.5, mariadb, mariadb:10.3 |
是 |
完成修复 |
2025-12-01 |
2025-12-29 |
| CVE-2025-2486 |
The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733. |
Low |
edk2 |
否 |
完成修复 |
2025-11-28 |
2026-01-25 |
| CVE-2025-47913 |
SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process. |
Important |
golang |
是 |
完成修复 |
2025-11-26 |
2025-12-10 |
| CVE-2025-13502 |
A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and integer underflow, leading to a UIProcess crash (DoS) via a crafted payload to the GLib remote inspector server. |
Important |
webkit2gtk3, webkitgtk |
是 |
完成修复 |
2025-11-26 |
2026-01-04 |
| CVE-2023-44487 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
Important |
nodejs |
否 |
完成修复 |
2023-10-10 |
2026-01-04 |
| CVE-2023-44487 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
Important |
nghttp2 |
否 |
完成修复 |
2023-10-19 |
2026-01-03 |
| CVE-2023-44487 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
Important |
golang |
否 |
完成修复 |
2023-11-14 |
2025-12-17 |
| CVE-2023-44487 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
Important |
golang-dbus |
否 |
完成修复 |
2023-11-14 |
2025-12-16 |
| CVE-2023-44487 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
Important |
haproxy |
否 |
完成修复 |
NULL |
2026-01-04 |
| CVE-2023-44487 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
Important |
nginx |
否 |
完成修复 |
NULL |
2026-01-04 |
| CVE-2023-44487 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
Important |
httpd |
否 |
完成修复 |
NULL |
2026-01-04 |
| CVE-2023-44487 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
Important |
tomcat |
否 |
完成修复 |
NULL |
2026-01-04 |
| CVE-2023-44487 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
Important |
git-lfs |
否 |
完成修复 |
NULL |
2026-01-04 |
| CVE-2023-44487 |
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
Important |
skopeo |
否 |
完成修复 |
NULL |
2026-01-04 |
| CVE-2023-37369 |
In Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2, there can be an application crash in QXmlStreamReader via a crafted XML string that triggers a situation in which a prefix is greater than a length. |
Important |
python-qt5 |
否 |
完成修复 |
2023-12-21 |
2026-01-04 |
| CVE-2023-37369 |
在5.15.15之前的Qt、6.2.9之前的6.x以及6.5.2之前的6.3.x到6.5.x中,QXmlStreamReader中可能会通过精心设计的XML字符串导致应用程序崩溃,从而触发前缀为大于长度。 |
Important |
qt5 |
否 |
完成修复 |
2023-12-21 |
2026-01-04 |
| CVE-2023-37369 |
在5.15.15之前的Qt、6.2.9之前的6.x以及6.5.2之前的6.3.x到6.5.x中,QXmlStreamReader中可能会通过精心设计的XML字符串导致应用程序崩溃,从而触发前缀为大于长度。 |
Important |
qt5-qt3d, qt5-qtbase, qt5-qtconnectivity,qt-qtdeclarative, qt5-qtdoc |
否 |
完成修复 |
2023-12-21 |
2026-01-03 |
| CVE-2023-37369 |
在5.15.15之前的Qt、6.2.9之前的6.x以及6.5.2之前的6.3.x到6.5.x中,QXmlStreamReader中可能会通过精心设计的XML字符串导致应用程序崩溃,从而触发前缀为大于长度。\n |
Important |
qt5-qtwebkit, qt5-qtwebsockets, qt5-qtx11extras, qt5-qtxmlpatterns, qt5-doc |
否 |
完成修复 |
2023-12-11 |
2026-01-03 |
| CVE-2023-37369 |
在5.15.15之前的Qt、6.2.9之前的6.x以及6.5.2之前的6.3.x到6.5.x中,QXmlStreamReader中可能会通过精心设计的XML字符串导致应用程序崩溃,从而触发前缀为大于长度。\n |
Important |
qt5-qtquick3d, qt5-qtquickcontrols, qt5-qtquickcontrols2, qt5-qtremoteobjects |
否 |
完成修复 |
2023-12-21 |
2026-01-03 |
| CVE-2022-41720 |
A flaw was found in OS, net/http golang library. In Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted in a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With the fix applied, the behavior of os.DirFS("") has changed. Previously, an empty root was treated equivalently to "/", so os.DirFS("").Open(tmp) would open the path "/tmp". This now returns an error. |
Important |
buildah, butane, conmon, containernetworking-plugins, git-lfs |
否 |
完成修复 |
NULL |
2026-01-04 |
| CVE-2022-41720 |
A flaw was found in OS, net/http golang library. In Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted in a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With the fix applied, the behavior of os.DirFS("") has changed. Previously, an empty root was treated equivalently to "/", so os.DirFS("").Open(tmp) would open the path "/tmp". This now returns an error. |
Important |
go-toolset, grafana, grafana-pcp, ignition, osbuild-composer |
否 |
完成修复 |
NULL |
2025-12-17 |
| CVE-2022-41720 |
A flaw was found in OS, net/http golang library. In Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted in a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With the fix applied, the behavior of os.DirFS("") has changed. Previously, an empty root was treated equivalently to "/", so os.DirFS("").Open(tmp) would open the path "/tmp". This now returns an error. |
Important |
podman,skopeo, toolbox, weldr-client |
否 |
完成修复 |
NULL |
2025-12-16 |
| CVE-2021-33197 |
In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers. |
Important |
git, golang |
否 |
完成修复 |
NULL |
2025-12-17 |
| CVE-2019-9514 |
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both. |
Important |
golang |
否 |
完成修复 |
NULL |
2025-12-17 |
| CVE-2019-9514 |
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both. |
Important |
nginx |
否 |
完成修复 |
NULL |
2026-01-04 |
| CVE-2019-9514 |
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both. |
Important |
nodejs |
否 |
完成修复 |
NULL |
2026-01-04 |
| CVE-2019-9514 |
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both. |
Important |
jetty |
否 |
完成修复 |
NULL |
2026-01-03 |
| CVE-2019-9514 |
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both. |
Important |
nodejs-packaging |
否 |
完成修复 |
NULL |
2026-01-03 |