搜索结果
关于「enterprise_linux」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2024-45778 | GNU GRUB 安全漏洞(CVE-2024-45778) | 2025-03-04 | ||
AVD-2024-45782 | GNU GRUB 安全漏洞(CVE-2024-45782) | 2025-03-04 | ||
AVD-2025-0678 | GNU GRUB 安全漏洞(CVE-2025-0678) | 2025-03-04 | ||
AVD-2025-26594 | X.org:Xwayland:无用的根光标(CVE-2025-26594) | 2025-02-26 | ||
AVD-2025-26598 | XORG:Xwayland:在CreatePointerBarrierClient()(CVE-2025-26598)中写入界限 | 2025-02-26 | ||
AVD-2025-26596 | Xorg:Xwayland:XKBWRITEKEYSYMSS中的堆溢出()(CVE-2025-26596) | 2025-02-26 | ||
AVD-2025-26597 | XORG:Xwayland:XkbChangeTypesofkey()中的缓冲区溢出(CVE-2025-26597) | 2025-02-26 | ||
AVD-2025-26599 | Xorg:Xwayland:在CompredirectWindow()(CVE-2025-26599)中使用非初始化指针 | 2025-02-26 | ||
AVD-2025-26601 | XORG:Xwayland:在Syncinittrigger()(CVE-2025-26601)中不使用时使用。 | 2025-02-26 | ||
AVD-2025-26600 | XORG:Xwayland:在PlayReLeastEvents()(CVE-2025-26600)中无使用时使用。 | 2025-02-26 | ||
AVD-2025-26595 | Xorg:Xwayland:XKBVModMaskText()中的缓冲区溢出(CVE-2025-26595) | 2025-02-26 | ||
AVD-2025-26465 | OpenSSH 客户端VerifyHostKeyDNS 中间人攻击漏洞(CVE-2025-26465) | 2025-02-19 | ||
AVD-2024-50074 | parport:正确修复数组越界访问(CVE-2024-50074) | 2024-10-29 | ||
AVD-2024-9676 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CVE-2024-9676) | 2024-10-15 | ||
AVD-2024-9675 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CVE-2024-9675) | 2024-10-09 | ||
AVD-2024-9341 | Improper Link Resolution Before File Access ('Link Following') (CVE-2024-9341) | 2024-10-01 | ||
AVD-2024-8354 | Qemu-kvm:usb:usb_ep_get() 中的断言失败(CVE-2024-8354) | 2024-09-19 | ||
AVD-2024-45620 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CVE-2024-45620) | 2024-09-02 | ||
AVD-2024-45617 | Use of Uninitialized Variable (CVE-2024-45617) | 2024-09-02 | ||
AVD-2024-45616 | Use of Uninitialized Variable (CVE-2024-45616) | 2024-09-02 | ||
AVD-2024-45618 | Use of Uninitialized Variable (CVE-2024-45618) | 2024-09-02 | ||
AVD-2024-45619 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CVE-2024-45619) | 2024-09-02 | ||
AVD-2024-45615 | Use of Uninitialized Variable (CVE-2024-45615) | 2024-09-02 | ||
AVD-2024-8235 | NULL Pointer Dereference (CVE-2024-8235) | 2024-08-29 | ||
AVD-2024-6237 | Improper Handling of Missing Values (CVE-2024-6237) | 2024-07-09 | ||
AVD-2024-5742 | Nano:在文件名上运行“chmod”和“chown”允许恶意用户使用指向 root 拥有的文件的恶意符号链接替换紧急文件(CVE-2024-5742) | 2024-06-12 | ||
AVD-2024-3183 | Freeipa:用户可以获取所有域用户的密码哈希值并执行离线暴力破解(CVE-2024-3183) | 2024-06-12 | ||
AVD-2024-2698 | Freeipa:委派规则允许代理服务冒充任何用户访问另一个目标服务(CVE-2024-2698) | 2024-06-12 | ||
AVD-2024-3049 | Booth:特制的哈希可能导致 Booth 服务器接受无效的 hmac(CVE-2024-3049) | 2024-06-06 | ||
AVD-2024-6239 | Improper Input Validation (CVE-2024-6239) | 2024-06-06 |