搜索结果
关于「enterprise_linux」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2025-31176 | gnuplot:plot3d_points上的gnuplot分割故障(CVE-2025-31176) | 2025-03-27 | ||
AVD-2024-45778 | GNU GRUB 安全漏洞(CVE-2024-45778) | 2025-03-04 | ||
AVD-2025-0678 | GNU GRUB 安全漏洞(CVE-2025-0678) | 2025-03-04 | ||
AVD-2024-45782 | GNU GRUB 安全漏洞(CVE-2024-45782) | 2025-03-04 | ||
AVD-2025-26600 | XORG:Xwayland:在PlayReLeastEvents()(CVE-2025-26600)中无使用时使用。 | 2025-02-26 | ||
AVD-2025-26596 | Xorg:Xwayland:XKBWRITEKEYSYMSS中的堆溢出()(CVE-2025-26596) | 2025-02-26 | ||
AVD-2025-26595 | Xorg:Xwayland:XKBVModMaskText()中的缓冲区溢出(CVE-2025-26595) | 2025-02-26 | ||
AVD-2025-26594 | X.org:Xwayland:无用的根光标(CVE-2025-26594) | 2025-02-26 | ||
AVD-2025-26601 | XORG:Xwayland:在Syncinittrigger()(CVE-2025-26601)中不使用时使用。 | 2025-02-26 | ||
AVD-2025-26597 | XORG:Xwayland:XkbChangeTypesofkey()中的缓冲区溢出(CVE-2025-26597) | 2025-02-26 | ||
AVD-2025-26598 | XORG:Xwayland:在CreatePointerBarrierClient()(CVE-2025-26598)中写入界限 | 2025-02-26 | ||
AVD-2025-26599 | Xorg:Xwayland:在CompredirectWindow()(CVE-2025-26599)中使用非初始化指针 | 2025-02-26 | ||
AVD-2024-45777 | grub2:grub-core/getText:整数溢出会导致堆OOB写入。 (CVE-2024-45777) | 2025-02-20 | ||
AVD-2025-26465 | OpenSSH 客户端VerifyHostKeyDNS 中间人攻击漏洞(CVE-2025-26465) | 2025-02-19 | ||
AVD-2024-50074 | parport:正确修复数组越界访问(CVE-2024-50074) | 2024-10-29 | ||
AVD-2024-9676 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CVE-2024-9676) | 2024-10-15 | ||
AVD-2024-9675 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CVE-2024-9675) | 2024-10-09 | ||
AVD-2024-9341 | Improper Link Resolution Before File Access ('Link Following') (CVE-2024-9341) | 2024-10-01 | ||
AVD-2024-8354 | Qemu-kvm:usb:usb_ep_get() 中的断言失败(CVE-2024-8354) | 2024-09-19 | ||
AVD-2024-45616 | Use of Uninitialized Variable (CVE-2024-45616) | 2024-09-02 | ||
AVD-2024-45615 | Use of Uninitialized Variable (CVE-2024-45615) | 2024-09-02 | ||
AVD-2024-45619 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CVE-2024-45619) | 2024-09-02 | ||
AVD-2024-45618 | Use of Uninitialized Variable (CVE-2024-45618) | 2024-09-02 | ||
AVD-2024-45617 | Use of Uninitialized Variable (CVE-2024-45617) | 2024-09-02 | ||
AVD-2024-45620 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CVE-2024-45620) | 2024-09-02 | ||
AVD-2024-8235 | NULL Pointer Dereference (CVE-2024-8235) | 2024-08-29 | ||
AVD-2023-39328 | Openjpeg:通过精心设计的图像文件拒绝服务(CVE-2023-39328) | 2024-07-09 | ||
AVD-2024-6237 | Improper Handling of Missing Values (CVE-2024-6237) | 2024-07-09 | ||
AVD-2023-39327 | Uncontrolled Resource Consumption (CVE-2023-39327) | 2024-07-04 | ||
AVD-2024-5742 | Nano:在文件名上运行“chmod”和“chown”允许恶意用户使用指向 root 拥有的文件的恶意符号链接替换紧急文件(CVE-2024-5742) | 2024-06-12 |