org.springframework.security:spring-security-web |
CVE-2024-38821 |
严重 |
6.1.2 |
5.7.13, 5.8.15, 6.2.7, 6.0.13, 6.1.11, 6.3.4 |
Spring-WebFlux: Authorization Bypass of Static Resources in WebFlux Applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38821
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-10-28 07:15 修改: 2024-10-28 13:58
|
ch.qos.logback:logback-core |
CVE-2023-6378 |
高危 |
1.4.8 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
com.h2database:h2 |
CVE-2022-45868 |
高危 |
2.1.214 |
2.2.220 |
The web-based admin console in H2 Database Engine before 2.2.220 can b ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45868
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2022-11-23 21:15 修改: 2024-08-03 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.11.0 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-46589 |
高危 |
10.1.11 |
11.0.0-M11, 10.1.16, 9.0.83, 8.5.96 |
tomcat: HTTP request smuggling via malformed trailer headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46589
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2023-11-28 16:15 修改: 2024-07-12 16:11
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2024-34750 |
高危 |
10.1.11 |
11.0.0-M21, 10.1.25, 9.0.90 |
tomcat: Improper Handling of Exceptional Conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34750
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-07-03 20:15 修改: 2024-07-09 16:22
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2024-50379 |
高危 |
10.1.11 |
11.0.2, 10.1.34, 9.0.98 |
tomcat: RCE due to TOCTOU issue in JSP compilation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50379
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-12-17 13:15 修改: 2025-01-03 12:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2024-56337 |
高危 |
10.1.11 |
11.0.2, 10.1.34, 9.0.98 |
tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56337
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-12-20 16:15 修改: 2025-01-03 12:15
|
org.springframework.security:spring-security-core |
CVE-2024-22234 |
高危 |
6.1.2 |
6.1.7, 6.2.2 |
spring-security: Broken Access Control in Spring Security With Direct Use of isFullyAuthenticated
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22234
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-02-20 07:15 修改: 2024-08-01 13:46
|
org.springframework.security:spring-security-core |
CVE-2024-22257 |
高危 |
6.1.2 |
5.7.12, 5.8.11, 6.1.8, 6.2.3 |
spring-security: Broken Access Control With Direct Use of AuthenticatedVoter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22257
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-03-18 15:15 修改: 2024-11-12 16:35
|
ch.qos.logback:logback-classic |
CVE-2023-6378 |
高危 |
1.4.8 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
org.springframework:spring-web |
CVE-2024-22243 |
高危 |
6.0.11 |
6.1.4, 6.0.17, 5.3.32 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22243
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-02-23 05:15 修改: 2024-08-22 15:35
|
org.springframework:spring-web |
CVE-2024-22259 |
高危 |
6.0.11 |
6.1.5, 6.0.18, 5.3.33 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47
|
org.springframework:spring-web |
CVE-2024-22262 |
高危 |
6.0.11 |
5.3.34, 6.0.19, 6.1.6 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35
|
org.springframework:spring-webmvc |
CVE-2023-34053 |
高危 |
6.0.11 |
6.0.14 |
springframework: io.micrometer: micrometer-core classpath vulnerable to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34053
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2023-11-28 09:15 修改: 2023-12-14 10:15
|
org.springframework:spring-webmvc |
CVE-2024-38816 |
高危 |
6.0.11 |
6.1.13 |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-09-13 06:15 修改: 2024-12-27 16:15
|
org.springframework:spring-webmvc |
CVE-2024-38819 |
高危 |
6.0.11 |
6.1.14 |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38819
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-12-19 18:15 修改: 2025-01-10 13:15
|
org.yaml:snakeyaml |
CVE-2022-1471 |
高危 |
1.33 |
2.0 |
SnakeYaml: Constructor Deserialization Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15
|
org.springframework.security:spring-security-config |
CVE-2023-34042 |
中危 |
6.1.2 |
6.1.4, 6.0.7, 5.8.7, 5.7.11 |
spring-security-config: Incorrect Permission Assignment for spring-security.xsd
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34042
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-02-05 22:15 修改: 2024-11-29 12:15
|
com.squareup.okio:okio-jvm |
CVE-2023-3635 |
中危 |
3.0.0 |
3.4.0 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
ch.qos.logback:logback-core |
CVE-2024-12798 |
中危 |
1.4.8 |
1.5.13, 1.3.15 |
logback-core: arbitrary code execution via JaninoEventEvaluator
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12798
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-12-19 16:15 修改: 2025-01-03 14:15
|
org.springframework.security:spring-security-core |
CVE-2024-38827 |
中危 |
6.1.2 |
5.7.14, 5.8.16, 6.0.14, 6.1.12, 6.2.8, 6.3.5 |
spring-security: authorization bypass for case sensitive comparisons
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38827
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-12-02 15:15 修改: 2024-12-02 15:15
|
io.netty:netty-codec-http |
CVE-2024-29025 |
中危 |
4.1.94.Final |
4.1.108.Final |
netty-codec-http: Allocation of Resources Without Limits or Throttling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29025
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-03-25 20:15 修改: 2024-06-21 22:15
|
org.springframework:spring-context |
CVE-2024-38820 |
中危 |
6.0.11 |
6.1.14 |
The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-10-18 06:15 修改: 2024-11-29 12:15
|
io.netty:netty-common |
CVE-2024-47535 |
中危 |
4.1.94.Final |
4.1.115 |
netty: Denial of Service attack on windows app using Netty
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-41080 |
中危 |
10.1.11 |
8.5.93, 9.0.80, 10.1.13, 11.0.0-M11 |
tomcat: Open Redirect vulnerability in FORM authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41080
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2023-08-25 21:15 修改: 2023-11-03 19:00
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-42795 |
中危 |
10.1.11 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
tomcat: improper cleaning of recycled objects could lead to information leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42795
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2023-10-10 18:15 修改: 2023-11-04 06:15
|
org.springframework:spring-web |
CVE-2024-38809 |
中危 |
6.0.11 |
5.3.38, 6.0.23, 6.1.12 |
org.springframework:spring-web: Spring Framework DoS via conditional HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-44487 |
中危 |
10.1.11 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2023-10-10 14:15 修改: 2024-12-20 17:40
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-45648 |
中危 |
10.1.11 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
tomcat: incorrectly parsed http trailer headers can cause request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45648
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2023-10-10 19:15 修改: 2023-11-04 06:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2024-24549 |
中危 |
10.1.11 |
8.5.99, 9.0.86, 10.1.19, 11.0.0-M17 |
Tomcat: HTTP/2 header handling DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24549
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-03-13 16:15 修改: 2024-11-04 22:35
|
org.apache.tomcat.embed:tomcat-embed-websocket |
CVE-2024-23672 |
中危 |
10.1.11 |
11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 |
Tomcat: WebSocket DoS with incomplete closing handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23672
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-03-13 16:15 修改: 2024-11-18 22:35
|
ch.qos.logback:logback-core |
CVE-2024-12801 |
低危 |
1.4.8 |
1.5.13, 1.3.15 |
logback-core: SaxEventRecorder vulnerable to Server-Side Request Forgery (SSRF) attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12801
镜像层: sha256:2db25abe2ebda599053fb39e06edb145f3a59c6ef54f9040c5f0f5e68b2b3822
发布日期: 2024-12-19 17:15 修改: 2025-01-03 14:15
|