搜索结果
关于「linux」的相关数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2023-0045 | CVE-2023-0045 kernel: Bypassing Spectre-BTI User Space Mitigations | 2023-02-03 | ||
AVD-2023-25012 | 空标题 | 2023-02-02 | ||
AVD-2023-0240 | 释放后使用 | 2023-01-30 | ||
AVD-2023-20928 | 加锁机制不恰当 | 2023-01-27 | ||
AVD-2022-47929 | Linux kernel 拒绝服务漏洞(CVE-2022-47929) | 2023-01-18 | ||
AVD-2023-0394 | CVE-2023-0394 Kernel: Null pointer deference in rawv6_push_pending_frames | 2023-01-17 | ||
AVD-2023-23559 | 整数溢出或超界折返 | 2023-01-13 | ||
AVD-2023-0266 | CVE-2023-0266 ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF | 2023-01-13 | ||
AVD-2023-0179 | CVE-2023-0179 kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan | 2023-01-13 | ||
AVD-2023-23454 | 使用不兼容类型访问资源(类型混淆) | 2023-01-12 | ||
AVD-2023-23455 | 使用不兼容类型访问资源(类型混淆) | 2023-01-12 | ||
AVD-2022-4696 | 释放后使用 | 2023-01-11 | ||
AVD-2022-4382 | 释放后使用 | 2023-01-11 | ||
AVD-2023-0210 | CVE-2023-0210 Kernel: Heap overflow in ksmbd_decode_ntlmssp_auth_blob cause remote DOS | 2023-01-10 | ||
AVD-2021-4305 | Inefficient Regular Expression Complexity | 2023-01-05 | ||
AVD-2022-47946 | 释放后使用 | 2022-12-24 | ||
AVD-2022-47943 | 跨界内存读 | 2022-12-24 | ||
AVD-2022-47938 | 跨界内存读 | 2022-12-24 | ||
AVD-2022-47939 | 释放后使用 | 2022-12-24 | ||
AVD-2022-47941 | 在移除最后引用时对内存的释放不恰当(内存泄露) | 2022-12-24 | ||
AVD-2022-47942 | 跨界内存写 | 2022-12-24 | ||
AVD-2022-4662 | Non-exit on Failed Initialization | 2022-12-23 | ||
AVD-2022-2196 | 不安全的默认资源初始化 | 2022-12-22 | ||
AVD-2022-4543 | CVE-2022-4543 kernel: KASLR Prefetch Bypass Breaks KPTI | 2022-12-19 | ||
AVD-2022-47518 | Out-of-bounds Write | 2022-12-18 | ||
AVD-2022-47519 | Out-of-bounds Write | 2022-12-18 | ||
AVD-2022-47520 | Out-of-bounds Read | 2022-12-18 | ||
AVD-2022-47521 | Out-of-bounds Write | 2022-12-18 | ||
AVD-2022-20566 | Improper Locking | 2022-12-17 | ||
AVD-2022-20568 | Use After Free | 2022-12-17 |