搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-52842 | 洗衣2.3.0-通过反射XSS收购帐户(CVE-2025-52842) | 2025-07-03 | ||
| AVD-2025-52841 | 洗衣2.3.0-收购CSRF(CVE-2025-52841)的帐户收购 | 2025-07-03 | ||
| AVD-2025-38093 | ARM64:DTS:QCOM:X1E80100:添加GPU冷却(CVE-2025-38093) | 2025-07-02 | ||
| AVD-2025-38092 | ksmbd:使用list_first_entry_or_null for Opinfo_get_list()(CVE-2025-38092) | 2025-07-02 | ||
| AVD-2025-38091 | DRM/AMD/显示:检查流ID DML21包装器以获取plane_id(CVE-2025-38091) | 2025-07-02 | ||
| AVD-2025-38090 | 驱动程序/rapidio/rio_cm.c:防止可能的堆覆盖(CVE-2025-38090) | 2025-06-30 | ||
| AVD-2025-38089 | SUNRPC:SVC_GARBAGE在SVC Auth Processing期间作为验证错误(CVE-2025-38089) | 2025-06-30 | ||
| AVD-2025-38088 | PowerPC/PowerNV/Memtrace:修复MEMTRACE MMAP中的界限问题(CVE-2025-38088) | 2025-06-30 | ||
| AVD-2025-38087 | net/sched:在taprio_dev_notifier(cve-2025-38087)中使用fix-frie-free-free-free-free-free-free-free-free-free-free-fime | 2025-06-30 | ||
| AVD-2025-38086 | 网络:CH9200:修复MII_NWAY_RESTART期间的非初始化访问(CVE-2025-38086) | 2025-06-28 | ||
| AVD-2025-38085 | mm/hugetlb:修复bumet_pmd_unshare()vs vs gup-fast Race(CVE-2025-38085) | 2025-06-28 | ||
| AVD-2025-38084 | mm/hugetlb:在VMA拆分期间的解开页面表,而不是在(CVE-2025-38084)之前 | 2025-06-28 | ||
| AVD-2025-46708 | GPU DDK-来宾VM可以从其他VM(CVE-2025-46708)处理工作负载延迟FW和GPU | 2025-06-28 | ||
| AVD-2025-46707 | GPU DDK-宾客VM可以在FW关闭之后覆盖其自己的FW VZ连接状态(CVE-2025-46707) | 2025-06-28 | ||
| AVD-2025-36038 | IBM WebSphere应用程序服务器代码执行(CVE-2025-36038) | 2025-06-26 | ||
| AVD-2025-0966 | IBM Infosphere信息服务器SQL注入(CVE-2025-0966) | 2025-06-25 | ||
| AVD-2025-3629 | IBM Infosphere信息服务器文件操作(CVE-2025-3629) | 2025-06-21 | ||
| AVD-2025-3221 | IBM Infosphere信息服务器拒绝服务(CVE-2025-3221) | 2025-06-21 | ||
| AVD-2025-38083 | net_sched:prio:修复prio_tune()(CVE-2025-38083)中的比赛 | 2025-06-20 | ||
| AVD-2025-36050 | IBM Qradar SIEM信息披露(CVE-2025-36050) | 2025-06-20 | ||
| AVD-2025-33121 | IBM Qradar SIEM XML外部实体注入(CVE-2025-33121) | 2025-06-20 | ||
| AVD-2025-33117 | IBM Qradar SIEM命令执行(CVE-2025-33117) | 2025-06-20 | ||
| AVD-2025-1349 | IBM Sterling B2B集成器和IBM Sterling文件网关跨站点脚本(CVE-2025-1349) | 2025-06-19 | ||
| AVD-2025-1348 | IBM Sterling B2B集成商和IBM Sterling文件网关信息披露(CVE-2025-1348) | 2025-06-19 | ||
| AVD-2024-54172 | IBM Sterling B2B积分器和IBM Sterling文件网关跨站点伪造(CVE-2024-54172) | 2025-06-19 | ||
| AVD-2025-36049 | IBM WebMethods集成SEVER XML外部实体注入(CVE-2025-36049) | 2025-06-19 | ||
| AVD-2025-36048 | IBM WebMethods集成级别代码执行(CVE-2025-36048) | 2025-06-19 | ||
| AVD-2024-54183 | IBM Sterling B2B集成器和IBM Sterling文件网关跨站点脚本(CVE-2024-54183) | 2025-06-19 | ||
| AVD-2022-50232 | ARM64:在交换机页面上设置UXN(CVE-2022-50232) | 2025-06-18 | ||
| AVD-2022-50231 | 加密:ARM64/Poly1305-修复读取的读数(CVE-2022-50231) | 2025-06-18 |