搜索结果
关于「openshift_container_platform」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2025-8283 | Netavark:Podman:Netavark可能会将主机名解散到意外的主机(CVE-2025-8283) | 2025-07-29 | ||
AVD-2025-7519 | POLKIT:带有大量嵌套元素的XML策略文件可能会导致界限(CVE-2025-7519) | 2025-07-14 | ||
AVD-2025-32990 | Gnutls:Gnutls Certtool模板解析中的脆弱性(CVE-2025-32990) | 2025-07-10 | ||
AVD-2025-32989 | Gnutls:Gnutls SCT扩展解析中的脆弱性(CVE-2025-32989) | 2025-07-10 | ||
AVD-2025-32988 | Gnutls:Gnutls其他名称SAN Export(CVE-2025-32988)中的脆弱性 | 2025-07-10 | ||
AVD-2025-6170 | libxml2:Xmllint Interactive shell命令处理中的堆栈缓冲区溢出(CVE-2025-6170) | 2025-06-17 | ||
AVD-2025-5914 | libarchive:double free at ractive_read_format_rar_seek_data()in aCRIVE_READ_READ_SUPPORT_FORMAT_RAR.C(CVE-2025-5914) | 2025-06-10 | ||
AVD-2025-5917 | libarchive:build_ustar_entry_name()在aCRIVE_WRITE_SET_SET_FORMAT_PAX.C(CVE-2025-5917)中通过一个错误关闭 | 2025-06-10 | ||
AVD-2025-5918 | libarchive:可能会触发过去的EOF的读取文件流(CVE-2025-5918) | 2025-06-10 | ||
AVD-2025-5915 | libarchive:heap buffer在copy_from_lzss_window()中读取atravive_read_support_format_rar.c(cve-2025-5915) | 2025-06-10 | ||
AVD-2025-5916 | libarchive:读取warc文件时的整数溢出,aCrive_read_support_format_warc.c(cve-2025-5916) | 2025-06-10 | ||
AVD-2025-4598 | SystemD-Coredump:允许本地攻击者崩溃SUID程序并获得对最终核心转储的访问(CVE-2025-4598)的竞赛状况 | 2025-05-30 | ||
AVD-2025-0678 | GNU GRUB 安全漏洞(CVE-2025-0678) | 2025-03-04 | ||
AVD-2024-45778 | GNU GRUB 安全漏洞(CVE-2024-45778) | 2025-03-04 | ||
AVD-2024-45782 | GNU GRUB 安全漏洞(CVE-2024-45782) | 2025-03-04 | ||
AVD-2025-26465 | OpenSSH 客户端VerifyHostKeyDNS 中间人攻击漏洞(CVE-2025-26465) | 2025-02-19 | ||
AVD-2024-50312 | Exposure of Sensitive Information to an Unauthorized Actor (CVE-2024-50312) | 2024-10-17 | ||
AVD-2024-50311 | Uncontrolled Resource Consumption (CVE-2024-50311) | 2024-10-17 | ||
AVD-2024-9676 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CVE-2024-9676) | 2024-10-15 | ||
AVD-2024-9675 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CVE-2024-9675) | 2024-10-09 | ||
AVD-2024-9341 | Improper Link Resolution Before File Access ('Link Following') (CVE-2024-9341) | 2024-10-01 | ||
AVD-2024-8883 | Keycloak:易受攻击的重定向 uri 验证导致开放重定向(CVE-2024-8883) | 2024-09-20 | ||
AVD-2024-4629 | Improper Enforcement of a Single, Unique Action (CVE-2024-4629) | 2024-09-03 | ||
AVD-2024-3056 | Uncontrolled Resource Consumption (CVE-2024-3056) | 2024-07-25 | ||
AVD-2024-7079 | Missing Authentication for Critical Function (CVE-2024-7079) | 2024-07-24 | ||
AVD-2024-6387 | OpenSSH Server 远程代码执行漏洞(CVE-2024-6387) | 2024-07-01 | ||
AVD-2024-5037 | Authentication Bypass by Spoofing (CVE-2024-5037) | 2024-06-05 | ||
AVD-2024-5154 | Exposure of Resource to Wrong Sphere (CVE-2024-5154) | 2024-05-27 | ||
AVD-2024-1132 | Keycloak:重定向验证中的路径横向 (CVE-2024-1132) | 2024-04-17 | ||
AVD-2024-0406 | Mholt/archiver:路径遍历漏洞 (CVE-2024-0406) | 2024-04-07 |