docker.io/airbyte/connector-builder-server:1.3.1 linux/amd64

docker.io/airbyte/connector-builder-server:1.3.1 - Trivy安全扫描结果 扫描时间: 2025-01-03 15:13
全部漏洞信息
低危漏洞:1 中危漏洞:48 高危漏洞:3 严重漏洞:0

系统OS: amazon 2 (Karoo) 扫描引擎: Trivy 扫描时间: 2025-01-03 15:13

docker.io/airbyte/connector-builder-server:1.3.1 (amazon 2 (Karoo)) (amazon)
低危漏洞:0 中危漏洞:43 高危漏洞:2 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
expat CVE-2024-45490 高危 2.1.0-15.amzn2.0.3 2.1.0-15.amzn2.0.4 libexpat: Negative Length Parsing Vulnerability in libexpat

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490

镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269

发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24

expat-devel CVE-2024-45490 高危 2.1.0-15.amzn2.0.3 2.1.0-15.amzn2.0.4 libexpat: Negative Length Parsing Vulnerability in libexpat

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24

avahi-libs CVE-2024-52616 中危 0.6.31-20.amzn2.0.5 0.6.31-20.amzn2.0.7 avahi: Avahi Wide-Area DNS Predictable Transaction IDs

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52616

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-11-21 21:15 修改: 2024-11-21 21:15

apr CVE-2023-49582 中危 1.7.2-1.amzn2 1.7.2-1.amzn2.0.1 APR: Lax permissions in Apache Portable Runtime shared memory

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49582

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-08-26 14:15 修改: 2024-08-27 16:04

avahi-libs CVE-2024-52615 中危 0.6.31-20.amzn2.0.5 0.6.31-20.amzn2.0.7 avahi: Avahi Wide-Area DNS Uses Constant Source Port

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52615

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-11-21 21:15 修改: 2024-11-21 21:15

glibc CVE-2024-33600 中危 2.26-64.amzn2.0.2 2.26-64.amzn2.0.3 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-common CVE-2024-33600 中危 2.26-64.amzn2.0.2 2.26-64.amzn2.0.3 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-devel CVE-2024-33600 中危 2.26-64.amzn2.0.2 2.26-64.amzn2.0.3 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-headers CVE-2024-33600 中危 2.26-64.amzn2.0.2 2.26-64.amzn2.0.3 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-langpack-en CVE-2024-33600 中危 2.26-64.amzn2.0.2 2.26-64.amzn2.0.3 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-minimal-langpack CVE-2024-33600 中危 2.26-64.amzn2.0.2 2.26-64.amzn2.0.3 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

kernel-devel CVE-2024-44987 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: ipv6: prevent UAF in ip6_send_skb()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44987

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-04 20:15 修改: 2024-09-05 17:53

kernel-devel CVE-2024-46738 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: VMCI: Fix use-after-free when removing resource in vmci_resource_remove()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46738

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:35

kernel-devel CVE-2024-46743 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: of/irq: Prevent device address out-of-bounds read in interrupt map walk

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46743

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:32

kernel-devel CVE-2024-46744 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: Squashfs: sanity check symbolic link size

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46744

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-30 13:36

kernel-devel CVE-2024-46745 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: Input: uinput - reject requests with unreasonable number of slots

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46745

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30

kernel-devel CVE-2024-46750 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: PCI: Add missing bridge lock to pci_bus_lock()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46750

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-30 13:27

kernel-devel CVE-2024-46756 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: hwmon: (w83627ehf) Fix underflows seen when writing limit attributes

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46756

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29

kernel-devel CVE-2024-46757 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: hwmon: (nct6775-core) Fix underflows seen when writing limit attributes

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46757

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29

kernel-devel CVE-2024-46758 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: hwmon: (lm95234) Fix underflows seen when writing limit attributes

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46758

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29

kernel-devel CVE-2024-46759 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: hwmon: (adc128d818) Fix underflows seen when writing limit attributes

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46759

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:28

kernel-devel CVE-2024-46780 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: nilfs2: protect references to superblock parameters exposed in sysfs

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46780

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-11-20 17:31

kernel-devel CVE-2024-46781 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: nilfs2: fix missing cleanup on rollforward recovery error

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46781

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:37

kernel-devel CVE-2024-46800 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: sch/netem: fix use after free in netem_dequeue

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46800

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-20 17:18

kernel-devel CVE-2024-46829 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: rtmutex: Drop rt_mutex::wait_lock before scheduling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46829

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:27

kernel-devel CVE-2024-46840 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: btrfs: clean up our handling of refs == 0 in snapshot delete

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46840

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-27 13:15 修改: 2024-10-08 18:15

kernel-headers CVE-2024-44987 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: ipv6: prevent UAF in ip6_send_skb()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44987

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-04 20:15 修改: 2024-09-05 17:53

kernel-headers CVE-2024-46738 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: VMCI: Fix use-after-free when removing resource in vmci_resource_remove()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46738

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:35

kernel-headers CVE-2024-46743 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: of/irq: Prevent device address out-of-bounds read in interrupt map walk

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46743

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:32

kernel-headers CVE-2024-46744 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: Squashfs: sanity check symbolic link size

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46744

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-30 13:36

kernel-headers CVE-2024-46745 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: Input: uinput - reject requests with unreasonable number of slots

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46745

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-20 12:30

kernel-headers CVE-2024-46750 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: PCI: Add missing bridge lock to pci_bus_lock()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46750

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-30 13:27

kernel-headers CVE-2024-46756 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: hwmon: (w83627ehf) Fix underflows seen when writing limit attributes

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46756

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29

kernel-headers CVE-2024-46757 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: hwmon: (nct6775-core) Fix underflows seen when writing limit attributes

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46757

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29

kernel-headers CVE-2024-46758 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: hwmon: (lm95234) Fix underflows seen when writing limit attributes

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46758

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:29

kernel-headers CVE-2024-46759 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: hwmon: (adc128d818) Fix underflows seen when writing limit attributes

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46759

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:28

kernel-headers CVE-2024-46780 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: nilfs2: protect references to superblock parameters exposed in sysfs

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46780

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-11-20 17:31

kernel-headers CVE-2024-46781 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: nilfs2: fix missing cleanup on rollforward recovery error

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46781

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:37

kernel-headers CVE-2024-46800 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: sch/netem: fix use after free in netem_dequeue

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46800

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-18 08:15 修改: 2024-09-20 17:18

kernel-headers CVE-2024-46829 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: rtmutex: Drop rt_mutex::wait_lock before scheduling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46829

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:27

kernel-headers CVE-2024-46840 中危 4.14.353-270.569.amzn2 4.14.355-271.569.amzn2 kernel: btrfs: clean up our handling of refs == 0 in snapshot delete

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46840

镜像层: sha256:132c92b311333b8cc61b6dbcee27700252f2c2ee997b850d7150543465525a65

发布日期: 2024-09-27 13:15 修改: 2024-10-08 18:15

libcrypt CVE-2024-33600 中危 2.26-64.amzn2.0.2 2.26-64.amzn2.0.3 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libxml2 CVE-2024-34459 中危 2.9.1-6.amzn2.5.13 2.9.1-6.amzn2.5.14 libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459

镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269

发布日期: 2024-05-14 15:39 修改: 2024-08-22 18:35

vim-data CVE-2024-43802 中危 2:9.0.2153-1.amzn2.0.1 2:9.0.2153-1.amzn2.0.2 vim: Heap Buffer Overflow in Vim's Typeahead Buffer Handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43802

镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269

发布日期: 2024-08-26 19:15 修改: 2024-08-27 13:02

vim-minimal CVE-2024-43802 中危 2:9.0.2153-1.amzn2.0.1 2:9.0.2153-1.amzn2.0.2 vim: Heap Buffer Overflow in Vim's Typeahead Buffer Handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43802

镜像层: sha256:1744c642d3df1bb8b96ce8fd2f141c61b428d0e075d46dd6cf48d25b534bf269

发布日期: 2024-08-26 19:15 修改: 2024-08-27 13:02

Java (jar)
低危漏洞:1 中危漏洞:3 高危漏洞:1 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
org.keycloak:keycloak-core CVE-2024-10039 高危 25.0.2 26.0.6 keycloak-core: mTLS passthrough

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10039

镜像层: sha256:4593cfc6ce723a70c97173dff23ce104a6d352cd544296173c589dc5b239753f

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

io.netty:netty-common CVE-2024-47535 中危 4.1.114.Final 4.1.115 netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535

镜像层: sha256:4593cfc6ce723a70c97173dff23ce104a6d352cd544296173c589dc5b239753f

发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01

ch.qos.logback:logback-core CVE-2024-12798 中危 1.5.12 1.5.13 logback-core: arbitrary code execution via JaninoEventEvaluator

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12798

镜像层: sha256:4593cfc6ce723a70c97173dff23ce104a6d352cd544296173c589dc5b239753f

发布日期: 2024-12-19 16:15 修改: 2024-12-19 16:15

org.keycloak:keycloak-core CVE-2024-7318 中危 25.0.2 24.0.7, 25.0.4 keycloak-core: One Time Passcode (OTP) is valid longer than expiration timeSeverity

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7318

镜像层: sha256:4593cfc6ce723a70c97173dff23ce104a6d352cd544296173c589dc5b239753f

发布日期: 2024-09-09 19:15 修改: 2024-10-07 20:15

ch.qos.logback:logback-core CVE-2024-12801 低危 1.5.12 1.5.13 logback-core: SaxEventRecorder vulnerable to Server-Side Request Forgery (SSRF) attacks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12801

镜像层: sha256:4593cfc6ce723a70c97173dff23ce104a6d352cd544296173c589dc5b239753f

发布日期: 2024-12-19 17:15 修改: 2024-12-19 17:15

Python (python-pkg)
低危漏洞:0 中危漏洞:2 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
Jinja2 CVE-2024-56201 中危 3.1.4 3.1.5 jinja2: Jinja has a sandbox breakout through malicious filenames

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56201

镜像层: sha256:a8bcb8790e989e9dac54df737d5e2ebfb6ac0ce21fdcdddd4f95e5006d8d680a

发布日期: 2024-12-23 16:15 修改: 2024-12-24 02:15

Jinja2 CVE-2024-56326 中危 3.1.4 3.1.5 jinja2: Jinja has a sandbox breakout through indirect reference to format method

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56326

镜像层: sha256:a8bcb8790e989e9dac54df737d5e2ebfb6ac0ce21fdcdddd4f95e5006d8d680a

发布日期: 2024-12-23 16:15 修改: 2024-12-27 18:15

/home/airbyte/.cache/pip/http-v2/e/b/5/4/a/eb54ad8098bbce2484999b06578a3689563ea077088029e738ccebf4.body ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/airbyte/.pyenv/versions/3.10.15/lib/python3.10/site-packages/PyJWT-2.10.1.dist-info/METADATA ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息