搜索结果
关于「enterprise_linux」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2024-50074 | parport:正确修复数组越界访问(CVE-2024-50074) | 2024-10-29 | ||
AVD-2024-9676 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CVE-2024-9676) | 2024-10-15 | ||
AVD-2024-9675 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CVE-2024-9675) | 2024-10-09 | ||
AVD-2024-9341 | Improper Link Resolution Before File Access ('Link Following') (CVE-2024-9341) | 2024-10-01 | ||
AVD-2024-8354 | Qemu-kvm:usb:usb_ep_get() 中的断言失败(CVE-2024-8354) | 2024-09-19 | ||
AVD-2024-45618 | Use of Uninitialized Variable (CVE-2024-45618) | 2024-09-02 | ||
AVD-2024-45617 | Use of Uninitialized Variable (CVE-2024-45617) | 2024-09-02 | ||
AVD-2024-45619 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CVE-2024-45619) | 2024-09-02 | ||
AVD-2024-45615 | Use of Uninitialized Variable (CVE-2024-45615) | 2024-09-02 | ||
AVD-2024-45620 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CVE-2024-45620) | 2024-09-02 | ||
AVD-2024-45616 | Use of Uninitialized Variable (CVE-2024-45616) | 2024-09-02 | ||
AVD-2024-8235 | NULL Pointer Dereference (CVE-2024-8235) | 2024-08-29 | ||
AVD-2024-6237 | Improper Handling of Missing Values (CVE-2024-6237) | 2024-07-09 | ||
AVD-2024-3183 | Freeipa:用户可以获取所有域用户的密码哈希值并执行离线暴力破解(CVE-2024-3183) | 2024-06-12 | ||
AVD-2024-5742 | Nano:在文件名上运行“chmod”和“chown”允许恶意用户使用指向 root 拥有的文件的恶意符号链接替换紧急文件(CVE-2024-5742) | 2024-06-12 | ||
AVD-2024-2698 | Freeipa:委派规则允许代理服务冒充任何用户访问另一个目标服务(CVE-2024-2698) | 2024-06-12 | ||
AVD-2024-3049 | Booth:特制的哈希可能导致 Booth 服务器接受无效的 hmac(CVE-2024-3049) | 2024-06-06 | ||
AVD-2024-6239 | Improper Input Validation (CVE-2024-6239) | 2024-06-06 | ||
AVD-2023-52160 | wpa_supplicant 安全漏洞 (CVE-2023-52160) | 2024-02-23 | ||
AVD-2023-6681 | Jwcrypto:通过特制的 jwe 破坏服务 (CVE-2023-6681) | 2024-02-12 | ||
AVD-2024-1062 | 389-ds-base 安全漏洞(CVE-2024-1062) | 2024-02-12 | ||
AVD-2024-1151 | 内核:开放 vswitch 内核模块中的堆栈溢出问题导致 dos (CVE-2024-1151) | 2024-02-11 | ||
AVD-2024-0229 | X.org Server 安全漏洞(CVE-2024-0229) | 2024-02-09 | ||
AVD-2023-6535 | Linux kernel 安全漏洞(CVE-2023-6535) | 2024-02-08 | ||
AVD-2023-6536 | Linux kernel 安全漏洞(CVE-2023-6536) | 2024-02-08 | ||
AVD-2023-6356 | Linux kernel 安全漏洞(CVE-2023-6356) | 2024-02-08 | ||
AVD-2024-1048 | Grub2:grub2-set-bootflag 可能被本地(伪)用户滥用 (CVE-2024-1048) | 2024-02-07 | ||
AVD-2024-0690 | Ansible-core:忽略 ansible_no_log 配置的任务中可能存在信息泄漏 (CVE-2024-0690) | 2024-02-06 | ||
AVD-2023-50781 | m2crypto 安全漏洞(CVE-2023-50781) | 2024-02-06 | ||
AVD-2023-6240 | 内核:rsa解密操作中的marvin漏洞侧通道泄漏(CVE-2023-6240) | 2024-02-04 |