CVE编号
利用情况
补丁情况
披露时间
参考链接 |
|
---|---|
https://github.com/budibase/budibase/commit/d35864be0854216693a01307f81ffcabf6d549df | |
https://huntr.dev/bounties/a13a56b7-04da-4560-b8ec-0d637d12a245 |
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | budibase | budibase | * |
Up to (excluding) 1.3.20 |
|||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | kernel | * |
Up to (excluding) 4.19.91-27.al7 |
|||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_3 | kernel | * |
Up to (excluding) 5.10.134-12.al8 |
|||||
运行在以下环境 | |||||||||
系统 | alma_linux_8 | kernel | * |
Up to (excluding) 4.18.0-372.19.1.rt7.176.el8_6 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | kernel | * |
Up to (excluding) 5.4.201-111.359.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2022 | kernel | * |
Up to (excluding) 5.15.54-25.126.amzn2022 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2023 | kernel | * |
Up to (excluding) 6.1.10-15.42-1.0-0.amzn2023 |
|||||
运行在以下环境 | |||||||||
系统 | anolis_os_7 | kernel | * |
Up to (excluding) 3.10 |
|||||
运行在以下环境 | |||||||||
系统 | anolis_os_8 | kernel | * |
Up to (excluding) 4.18 |
|||||
运行在以下环境 | |||||||||
系统 | centos_7 | kernel | * |
Up to (excluding) 3.10.0-1160.71.1.el7 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_5.2 | kernel | * |
Up to (excluding) 5.3.18-150300.93.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | kernel | * |
Up to (excluding) 5.3.18-150300.38.62.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | dtb-al | * |
Up to (excluding) 5.3.18-150300.59.90.1 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | kernel | * |
Up to (excluding) 3.10.0-1160.71.1.el7 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | kernel | * |
Up to (excluding) 4.18.0-372.19.1.el8_6 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_9 | kernel | * |
Up to (excluding) 5.14.0-70.17.1.el9_0 |
|||||
运行在以下环境 | |||||||||
系统 | rocky_linux_8 | kernel | * |
Up to (excluding) 4.18.0-372.19.1.rt7.176.el8_6 |
|||||