docker.io/apache/shenyu-admin:2.7.0 linux/amd64

docker.io/apache/shenyu-admin:2.7.0 - Trivy安全扫描结果 扫描时间: 2025-02-12 09:09
全部漏洞信息
低危漏洞:5 中危漏洞:25 高危漏洞:16 严重漏洞:0

系统OS: alpine 3.19.2 扫描引擎: Trivy 扫描时间: 2025-02-12 09:09

docker.io/apache/shenyu-admin:2.7.0 (alpine 3.19.2) (alpine)
低危漏洞:2 中危漏洞:6 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
libcrypto3 CVE-2024-4741 中危 3.1.5-r0 3.1.6-r0 openssl: Use After Free with SSL_free_buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741

镜像层: sha256:af9a70194aa4d12f967dbd4bcb1ce9c98ba42adb4ec05536080fd4560155e809

发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01

libcrypto3 CVE-2024-5535 中危 3.1.5-r0 3.1.6-r0 openssl: SSL_select_next_proto buffer overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535

镜像层: sha256:af9a70194aa4d12f967dbd4bcb1ce9c98ba42adb4ec05536080fd4560155e809

发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15

libcrypto3 CVE-2024-6119 中危 3.1.5-r0 3.1.7-r0 openssl: Possible denial of service in X.509 name checks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119

镜像层: sha256:af9a70194aa4d12f967dbd4bcb1ce9c98ba42adb4ec05536080fd4560155e809

发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35

libssl3 CVE-2024-4741 中危 3.1.5-r0 3.1.6-r0 openssl: Use After Free with SSL_free_buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741

镜像层: sha256:af9a70194aa4d12f967dbd4bcb1ce9c98ba42adb4ec05536080fd4560155e809

发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01

libssl3 CVE-2024-5535 中危 3.1.5-r0 3.1.6-r0 openssl: SSL_select_next_proto buffer overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535

镜像层: sha256:af9a70194aa4d12f967dbd4bcb1ce9c98ba42adb4ec05536080fd4560155e809

发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15

libssl3 CVE-2024-6119 中危 3.1.5-r0 3.1.7-r0 openssl: Possible denial of service in X.509 name checks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119

镜像层: sha256:af9a70194aa4d12f967dbd4bcb1ce9c98ba42adb4ec05536080fd4560155e809

发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35

libcrypto3 CVE-2024-9143 低危 3.1.5-r0 3.1.7-r1 openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143

镜像层: sha256:af9a70194aa4d12f967dbd4bcb1ce9c98ba42adb4ec05536080fd4560155e809

发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35

libssl3 CVE-2024-9143 低危 3.1.5-r0 3.1.7-r1 openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143

镜像层: sha256:af9a70194aa4d12f967dbd4bcb1ce9c98ba42adb4ec05536080fd4560155e809

发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35

Java (jar)
低危漏洞:3 中危漏洞:19 高危漏洞:16 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
com.google.protobuf:protobuf-java CVE-2024-7254 高危 3.21.11 3.25.5, 4.27.5, 4.28.2 protobuf: StackOverflow vulnerability in Protocol Buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15

com.google.protobuf:protobuf-java CVE-2024-7254 高危 3.21.7 3.25.5, 4.27.5, 4.28.2 protobuf: StackOverflow vulnerability in Protocol Buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15

com.thoughtworks.xstream:xstream CVE-2022-40151 高危 1.4.19 1.4.20 xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40151

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2022-09-16 10:15 修改: 2022-09-20 18:11

com.thoughtworks.xstream:xstream CVE-2022-41966 高危 1.4.19 1.4.20 xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41966

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2022-12-28 00:15 修改: 2023-06-27 14:04

com.thoughtworks.xstream:xstream CVE-2024-47072 高危 1.4.19 1.4.21 com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47072

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-11-08 00:15 修改: 2024-11-08 19:01

commons-io:commons-io CVE-2024-47554 高危 2.11.0 2.14.0 apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15

io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p 高危 4.1.79.Final 4.1.100.Final io.netty:netty-codec-http2 vulnerable to HTTP/2 Rapid Reset Attack

漏洞详情: https://github.com/advisories/GHSA-xpw8-rcwv-8f8p

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

org.apache.commons:commons-compress CVE-2024-25710 高危 1.22 1.26.0 commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15

org.apache.tomcat.embed:tomcat-embed-core CVE-2024-50379 高危 10.1.25 11.0.2, 10.1.34, 9.0.98 tomcat: RCE due to TOCTOU issue in JSP compilation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50379

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-12-17 13:15 修改: 2025-01-03 12:15

org.apache.tomcat.embed:tomcat-embed-core CVE-2024-56337 高危 10.1.25 11.0.2, 10.1.34, 9.0.98 tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56337

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-12-20 16:15 修改: 2025-01-03 12:15

org.bitbucket.b_c:jose4j CVE-2023-31582 高危 0.9.2 0.9.3 jose4j: Insecure iteration count setting

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31582

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2023-10-25 18:17 修改: 2023-10-31 15:18

org.springframework:spring-webmvc CVE-2024-38816 高危 6.1.10 6.1.13 spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-09-13 06:15 修改: 2024-12-27 16:15

org.springframework:spring-webmvc CVE-2024-38819 高危 6.1.10 6.1.14 org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38819

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-12-19 18:15 修改: 2025-01-10 13:15

org.yaml:snakeyaml CVE-2022-1471 高危 1.33 2.0 SnakeYaml: Constructor Deserialization Remote Code Execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15

xerces:xercesImpl CVE-2012-0881 高危 2.11.0 2.12.0 xml: xerces-j2 hash table collisions CPU usage DoS (oCERT-2011-003)

漏洞详情: https://avd.aquasec.com/nvd/cve-2012-0881

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2017-10-30 16:29 修改: 2023-02-13 00:23

xerces:xercesImpl CVE-2013-4002 高危 2.11.0 2.12.0 OpenJDK: XML parsing Denial of Service (JAXP, 8017298)

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4002

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2013-07-23 11:03 修改: 2023-11-07 02:16

org.apache.commons:commons-compress CVE-2023-42503 中危 1.22 1.24.0 apache-commons-compress: Denial of service via CPU consumption for malformed TAR file

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42503

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2023-09-14 08:15 修改: 2024-02-21 21:27

org.apache.commons:commons-compress CVE-2024-26308 中危 1.22 1.26.0 commons-compress: OutOfMemoryError unpacking broken Pack200 file

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26308

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-02-19 09:15 修改: 2024-03-21 19:54

org.apache.httpcomponents:httpclient CVE-2020-13956 中危 4.5.3 4.5.13, 5.0.3 apache-httpclient: incorrect handling of malformed authority component in request URIs

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17

com.google.guava:guava CVE-2023-2976 中危 29.0-android 32.0.0-android guava: insecure temporary directory creation

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15

com.squareup.okio:okio CVE-2023-3635 中危 1.17.5 3.4.0, 1.17.6 okio: GzipSource class improper exception handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17

io.netty:netty-codec-http CVE-2024-29025 中危 4.1.79.Final 4.1.108.Final netty-codec-http: Allocation of Resources Without Limits or Throttling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29025

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-03-25 20:15 修改: 2024-06-21 22:15

org.bitbucket.b_c:jose4j CVE-2023-51775 中危 0.9.2 0.9.4 jose4j: denial of service via specially crafted JWE

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51775

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-02-29 01:42 修改: 2024-08-14 19:35

org.bitbucket.b_c:jose4j GHSA-jgvc-jfgh-rjvv 中危 0.9.2 0.9.3 Chosen Ciphertext Attack in Jose4j

漏洞详情: https://github.com/advisories/GHSA-jgvc-jfgh-rjvv

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

org.bouncycastle:bcpkix-jdk18on CVE-2023-33202 中危 1.72 1.73 bc-java: Out of memory while parsing ASN.1 crafted data in org.bouncycastle.openssl.PEMParser class

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33202

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2023-11-23 16:15 修改: 2024-09-09 13:53

org.springframework.ldap:spring-ldap-core CVE-2024-38829 中危 3.2.4 3.2.8, 2.4.4 spring-ldap: Spring LDAP sensitive data exposure for case-sensitive comparisons

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38829

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-12-04 21:15 修改: 2024-12-10 15:15

org.springframework:spring-context CVE-2024-38820 中危 6.1.10 6.1.14 The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-10-18 06:15 修改: 2024-11-29 12:15

org.springframework:spring-web CVE-2024-38809 中危 6.1.10 5.3.38, 6.0.23, 6.1.12 org.springframework:spring-web: Spring Framework DoS via conditional HTTP request

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45

com.google.guava:guava CVE-2023-2976 中危 30.1-jre 32.0.0-android guava: insecure temporary directory creation

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15

io.netty:netty-common CVE-2024-47535 中危 4.1.111.Final 4.1.115 netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01

io.netty:netty-common CVE-2024-47535 中危 4.1.79.Final 4.1.115 netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01

io.netty:netty-handler CVE-2023-34462 中危 4.1.79.Final 4.1.94.Final netty: SniHandler 16MB allocation leads to OOM

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34462

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2023-06-22 23:15 修改: 2024-06-21 19:15

ch.qos.logback:logback-core CVE-2024-12798 中危 1.5.6 1.5.13, 1.3.15 logback-core: arbitrary code execution via JaninoEventEvaluator

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12798

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-12-19 16:15 修改: 2025-01-03 14:15

xerces:xercesImpl CVE-2020-14338 中危 2.11.0 2.12.0.sp3 wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14338

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2020-09-17 15:15 修改: 2023-11-07 03:17

xerces:xercesImpl CVE-2022-23437 中危 2.11.0 2.12.2 xerces-j2: infinite loop when handling specially crafted XML document payloads

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23437

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2022-01-24 15:15 修改: 2023-08-08 14:22

com.google.guava:guava CVE-2020-8908 低危 30.1-jre 32.0.0-android guava: local information disclosure via temporary directory created with unsafe permissions

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30

com.google.guava:guava CVE-2020-8908 低危 29.0-android 32.0.0-android guava: local information disclosure via temporary directory created with unsafe permissions

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30

ch.qos.logback:logback-core CVE-2024-12801 低危 1.5.6 1.5.13, 1.3.15 logback-core: SaxEventRecorder vulnerable to Server-Side Request Forgery (SSRF) attacks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12801

镜像层: sha256:b782aea7133b8a373cdc3e4dc1c5fb42f2ef0b7397755507c09e0de8e95ec44b

发布日期: 2024-12-19 17:15 修改: 2025-01-03 14:15