com.h2database:h2 |
CVE-2021-42392 |
严重 |
1.4.200 |
2.0.206 |
h2: Remote Code Execution in Console
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42392
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-01-10 14:10 修改: 2023-02-24 22:15
|
com.h2database:h2 |
CVE-2021-42392 |
严重 |
1.4.200 |
2.0.206 |
h2: Remote Code Execution in Console
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42392
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-01-10 14:10 修改: 2023-02-24 22:15
|
com.h2database:h2 |
CVE-2022-23221 |
严重 |
1.4.200 |
2.1.210 |
h2: Loading of custom classes from remote servers through JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23221
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-01-19 17:15 修改: 2023-08-18 14:15
|
com.h2database:h2 |
CVE-2022-23221 |
严重 |
1.4.200 |
2.1.210 |
h2: Loading of custom classes from remote servers through JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23221
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-01-19 17:15 修改: 2023-08-18 14:15
|
com.hazelcast:hazelcast |
CVE-2022-36437 |
严重 |
3.11.4 |
3.12.13, 4.1.10, 4.2.6, 5.0.4, 5.1.3 |
hazelcast: Hazelcast connection caching
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36437
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-12-29 23:15 修改: 2023-01-09 18:33
|
com.hazelcast:hazelcast |
CVE-2022-36437 |
严重 |
3.12.11 |
3.12.13, 4.1.10, 4.2.6, 5.0.4, 5.1.3 |
hazelcast: Hazelcast connection caching
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36437
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-12-29 23:15 修改: 2023-01-09 18:33
|
com.hazelcast:hazelcast |
CVE-2022-36437 |
严重 |
3.12.11 |
3.12.13, 4.1.10, 4.2.6, 5.0.4, 5.1.3 |
hazelcast: Hazelcast connection caching
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36437
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-29 23:15 修改: 2023-01-09 18:33
|
com.hazelcast:hazelcast |
CVE-2022-36437 |
严重 |
3.12.11 |
3.12.13, 4.1.10, 4.2.6, 5.0.4, 5.1.3 |
hazelcast: Hazelcast connection caching
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36437
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-29 23:15 修改: 2023-01-09 18:33
|
com.twelvemonkeys.imageio:imageio-metadata |
CVE-2021-23792 |
严重 |
3.4.1 |
3.7.1 |
The package com.twelvemonkeys.imageio:imageio-metadata before 3.7.1 ar ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23792
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-05-06 20:15 修改: 2022-05-17 17:20
|
com.twelvemonkeys.imageio:imageio-metadata |
CVE-2021-23792 |
严重 |
3.4.1 |
3.7.1 |
The package com.twelvemonkeys.imageio:imageio-metadata before 3.7.1 ar ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23792
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-05-06 20:15 修改: 2022-05-17 17:20
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.7 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.7 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.commons:commons-configuration2 |
CVE-2022-33980 |
严重 |
2.7 |
2.8.0 |
apache-commons-configuration: Apache Commons Configuration insecure interpolation defaults
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33980
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-07-06 13:15 修改: 2022-12-08 03:19
|
org.apache.commons:commons-configuration2 |
CVE-2022-33980 |
严重 |
2.7 |
2.8.0 |
apache-commons-configuration: Apache Commons Configuration insecure interpolation defaults
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33980
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-07-06 13:15 修改: 2022-12-08 03:19
|
org.apache.commons:commons-text |
CVE-2022-42889 |
严重 |
1.5 |
1.10.0 |
apache-commons-text: variable interpolation RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42889
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-13 13:15 修改: 2024-01-19 16:15
|
org.apache.commons:commons-text |
CVE-2022-42889 |
严重 |
1.5 |
1.10.0 |
apache-commons-text: variable interpolation RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42889
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-13 13:15 修改: 2024-01-19 16:15
|
org.apache.commons:commons-text |
CVE-2022-42889 |
严重 |
1.5 |
1.10.0 |
apache-commons-text: variable interpolation RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42889
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-13 13:15 修改: 2024-01-19 16:15
|
org.apache.commons:commons-text |
CVE-2022-42889 |
严重 |
1.6 |
1.10.0 |
apache-commons-text: variable interpolation RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42889
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-13 13:15 修改: 2024-01-19 16:15
|
org.apache.commons:commons-text |
CVE-2022-42889 |
严重 |
1.6 |
1.10.0 |
apache-commons-text: variable interpolation RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42889
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-13 13:15 修改: 2024-01-19 16:15
|
org.apache.commons:commons-text |
CVE-2022-42889 |
严重 |
1.7 |
1.10.0 |
apache-commons-text: variable interpolation RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42889
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-13 13:15 修改: 2024-01-19 16:15
|
org.apache.commons:commons-text |
CVE-2022-42889 |
严重 |
1.7 |
1.10.0 |
apache-commons-text: variable interpolation RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42889
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-13 13:15 修改: 2024-01-19 16:15
|
org.apache.commons:commons-text |
CVE-2022-42889 |
严重 |
1.8 |
1.10.0 |
apache-commons-text: variable interpolation RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42889
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-13 13:15 修改: 2024-01-19 16:15
|
org.apache.commons:commons-text |
CVE-2022-42889 |
严重 |
1.8 |
1.10.0 |
apache-commons-text: variable interpolation RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42889
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-13 13:15 修改: 2024-01-19 16:15
|
org.apache.commons:commons-text |
CVE-2022-42889 |
严重 |
1.8 |
1.10.0 |
apache-commons-text: variable interpolation RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42889
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-13 13:15 修改: 2024-01-19 16:15
|
org.apache.tomcat:tomcat-catalina |
CVE-2024-52316 |
严重 |
9.0.63 |
9.0.96, 10.1.30, 11.0.1 |
tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52316
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-11-18 12:15 修改: 2024-11-18 17:11
|
org.hsqldb:hsqldb |
CVE-2022-41853 |
严重 |
2.3.0 |
2.7.1 |
hsqldb: Untrusted input may lead to RCE attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41853
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-06 18:17 修改: 2023-02-03 23:43
|
org.liquibase:liquibase-core |
CVE-2022-0839 |
严重 |
3.6.2 |
4.8.0 |
liquibase: Improper Restriction of XML External Entity
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0839
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-03-04 15:15 修改: 2023-02-22 17:45
|
org.liquibase:liquibase-core |
CVE-2022-0839 |
严重 |
3.6.2 |
4.8.0 |
liquibase: Improper Restriction of XML External Entity
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0839
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-03-04 15:15 修改: 2023-02-22 17:45
|
org.postgresql:postgresql |
CVE-2024-1597 |
严重 |
42.2.18 |
42.2.28, 42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2 |
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1597
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-19 13:15 修改: 2024-06-10 17:16
|
org.postgresql:postgresql |
CVE-2024-1597 |
严重 |
42.4.0 |
42.2.28, 42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2 |
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1597
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-19 13:15 修改: 2024-06-10 17:16
|
org.postgresql:postgresql |
CVE-2024-1597 |
严重 |
42.4.0 |
42.2.28, 42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2 |
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1597
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-19 13:15 修改: 2024-06-10 17:16
|
org.quartz-scheduler:quartz |
CVE-2019-13990 |
严重 |
1.8.7-atlassian-3 |
2.3.2 |
libquartz: XXE attacks via job description
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13990
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2019-07-26 19:15 修改: 2024-10-15 19:35
|
org.quartz-scheduler:quartz |
CVE-2019-13990 |
严重 |
1.8.7-atlassian-3 |
2.3.2 |
libquartz: XXE attacks via job description
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13990
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2019-07-26 19:15 修改: 2024-10-15 19:35
|
org.springframework.security:spring-security-core |
CVE-2022-22978 |
严重 |
4.2.16.RELEASE |
5.5.7, 5.6.4, 5.4.11 |
springframework: Authorization Bypass in RegexRequestMatcher
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22978
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-05-19 15:15 修改: 2023-04-11 23:15
|
org.springframework.security:spring-security-core |
CVE-2022-22978 |
严重 |
4.2.16.RELEASE |
5.5.7, 5.6.4, 5.4.11 |
springframework: Authorization Bypass in RegexRequestMatcher
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22978
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-05-19 15:15 修改: 2023-04-11 23:15
|
org.springframework:spring-beans |
CVE-2022-22965 |
严重 |
5.1.18.RELEASE |
5.2.20.RELEASE, 5.3.18 |
spring-framework: RCE via Data Binding on JDK 9+
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22965
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-04-01 23:15 修改: 2024-10-18 19:52
|
org.springframework:spring-beans |
CVE-2022-22965 |
严重 |
5.3.11 |
5.2.20.RELEASE, 5.3.18 |
spring-framework: RCE via Data Binding on JDK 9+
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22965
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-04-01 23:15 修改: 2024-10-18 19:52
|
org.springframework:spring-web |
CVE-2016-1000027 |
严重 |
5.1.18.RELEASE |
6.0.0 |
spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000027
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2020-01-02 23:15 修改: 2023-04-20 09:15
|
org.springframework:spring-web |
CVE-2016-1000027 |
严重 |
5.3.11 |
6.0.0 |
spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000027
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2020-01-02 23:15 修改: 2023-04-20 09:15
|
org.springframework:spring-web |
CVE-2016-1000027 |
严重 |
5.3.19 |
6.0.0 |
spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000027
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2020-01-02 23:15 修改: 2023-04-20 09:15
|
org.springframework:spring-web |
CVE-2016-1000027 |
严重 |
5.3.19 |
6.0.0 |
spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000027
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2020-01-02 23:15 修改: 2023-04-20 09:15
|
org.springframework:spring-web |
CVE-2016-1000027 |
严重 |
5.3.21 |
6.0.0 |
spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000027
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2020-01-02 23:15 修改: 2023-04-20 09:15
|
org.springframework:spring-web |
CVE-2016-1000027 |
严重 |
5.3.21 |
6.0.0 |
spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000027
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2020-01-02 23:15 修改: 2023-04-20 09:15
|
org.springframework:spring-webmvc |
CVE-2022-22965 |
严重 |
5.1.18.RELEASE |
5.2.20.RELEASE, 5.3.18 |
spring-framework: RCE via Data Binding on JDK 9+
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22965
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-04-01 23:15 修改: 2024-10-18 19:52
|
org.springframework:spring-webmvc |
CVE-2022-22965 |
严重 |
5.3.11 |
5.2.20.RELEASE, 5.3.18 |
spring-framework: RCE via Data Binding on JDK 9+
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22965
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-04-01 23:15 修改: 2024-10-18 19:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.12.5 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.12.5 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.12.5 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.12.5 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.12.5 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.12.5 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.12.5 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.12.5 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.12.6 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.12.6 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.12.6 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.12.6 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.12.6 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.12.6 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.13.0 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.13.0 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.13.0 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.13.0 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.13.2.2 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.13.2.2 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.13.2.2 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.13.2.2 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.dataformat:jackson-dataformat-cbor |
CVE-2020-28491 |
高危 |
2.8.10 |
2.11.4, 2.12.1 |
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28491
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-02-18 16:15 修改: 2022-12-06 21:44
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.3.1 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.8.5 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.8.5 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.8.5 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.8.5 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.8.6 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.8.6 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.8.6 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.8.6 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.8.7 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.graphql-java:graphql-java |
CVE-2022-37734 |
高危 |
9.2 |
17.4, 18.3 |
graphql-java: DoS by malicious query
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37734
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-09-12 14:15 修改: 2023-08-08 14:22
|
com.graphql-java:graphql-java |
CVE-2022-37734 |
高危 |
9.2 |
17.4, 18.3 |
graphql-java: DoS by malicious query
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37734
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-12 14:15 修改: 2023-08-08 14:22
|
com.graphql-java:graphql-java |
CVE-2023-28867 |
高危 |
9.2 |
0.0.0-2023-03-20T01-49-44-80e3135, 17.5, 18.4, 19.4, 20.1 |
graphql-java: crafted GraphQL query causes stack consumption
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28867
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-27 01:15 修改: 2023-04-03 14:01
|
com.graphql-java:graphql-java |
CVE-2023-28867 |
高危 |
9.2 |
0.0.0-2023-03-20T01-49-44-80e3135, 17.5, 18.4, 19.4, 20.1 |
graphql-java: crafted GraphQL query causes stack consumption
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28867
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-27 01:15 修改: 2023-04-03 14:01
|
com.graphql-java:graphql-java |
CVE-2024-40094 |
高危 |
9.2 |
19.11, 20.9, 21.5 |
graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40094
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-07-30 07:15 修改: 2024-07-30 13:32
|
com.graphql-java:graphql-java |
CVE-2024-40094 |
高危 |
9.2 |
19.11, 20.9, 21.5 |
graphql-java: Allocation of Resources Without Limits or Throttling in GraphQL Java
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40094
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-07-30 07:15 修改: 2024-07-30 13:32
|
ch.qos.logback:logback-classic |
CVE-2023-6378 |
高危 |
1.2.3 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
ch.qos.logback:logback-classic |
CVE-2023-6378 |
高危 |
1.2.3 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
ch.qos.logback:logback-core |
CVE-2023-6378 |
高危 |
1.2.3 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
ch.qos.logback:logback-core |
CVE-2023-6378 |
高危 |
1.2.3 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
com.h2database:h2 |
CVE-2021-23463 |
高危 |
1.4.200 |
2.0.202 |
h2database: XXE injection vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23463
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-12-10 20:15 修改: 2023-08-18 14:15
|
com.h2database:h2 |
CVE-2021-23463 |
高危 |
1.4.200 |
2.0.202 |
h2database: XXE injection vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23463
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-12-10 20:15 修改: 2023-08-18 14:15
|
com.h2database:h2 |
CVE-2022-45868 |
高危 |
1.4.200 |
2.2.220 |
The web-based admin console in H2 Database Engine before 2.2.220 can b ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45868
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-11-23 21:15 修改: 2024-08-03 15:15
|
com.h2database:h2 |
CVE-2022-45868 |
高危 |
1.4.200 |
2.2.220 |
The web-based admin console in H2 Database Engine before 2.2.220 can b ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45868
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-11-23 21:15 修改: 2024-08-03 15:15
|
com.amazonaws:aws-java-sdk-s3 |
CVE-2022-31159 |
高危 |
1.11.1017 |
1.12.261 |
Partial Path Traversal in com.amazonaws:aws-java-sdk-s3
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31159
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-07-15 18:15 修改: 2022-07-22 16:27
|
com.hazelcast:hazelcast |
CVE-2023-33265 |
高危 |
3.11.4 |
5.2.4, 5.1.7, 5.0.5 |
Hazelcast Executor Services don't check client permissions properly
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33265
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-07-18 16:15 修改: 2023-07-28 13:20
|
com.hazelcast:hazelcast |
CVE-2023-45859 |
高危 |
3.11.4 |
5.2.5, 5.3.5 |
Missing permission checks on Hazelcast client protocol
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45859
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-28 22:15 修改: 2024-11-29 17:15
|
com.hazelcast:hazelcast |
CVE-2023-45860 |
高危 |
3.11.4 |
5.3.5, 5.2.5 |
Hazelcast: Permission checking in CSV File Source connector
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45860
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-16 10:15 修改: 2024-11-06 17:35
|
com.amazonaws:aws-java-sdk-s3 |
CVE-2022-31159 |
高危 |
1.11.1034 |
1.12.261 |
Partial Path Traversal in com.amazonaws:aws-java-sdk-s3
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31159
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-07-15 18:15 修改: 2022-07-22 16:27
|
com.amazonaws:aws-java-sdk-s3 |
CVE-2022-31159 |
高危 |
1.11.1034 |
1.12.261 |
Partial Path Traversal in com.amazonaws:aws-java-sdk-s3
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31159
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-07-15 18:15 修改: 2022-07-22 16:27
|
com.amazonaws:aws-java-sdk-s3 |
CVE-2022-31159 |
高危 |
1.11.310 |
1.12.261 |
Partial Path Traversal in com.amazonaws:aws-java-sdk-s3
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31159
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-07-15 18:15 修改: 2022-07-22 16:27
|
com.hazelcast:hazelcast |
CVE-2023-33265 |
高危 |
3.12.11 |
5.2.4, 5.1.7, 5.0.5 |
Hazelcast Executor Services don't check client permissions properly
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33265
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-07-18 16:15 修改: 2023-07-28 13:20
|
com.hazelcast:hazelcast |
CVE-2023-33265 |
高危 |
3.12.11 |
5.2.4, 5.1.7, 5.0.5 |
Hazelcast Executor Services don't check client permissions properly
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33265
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-07-18 16:15 修改: 2023-07-28 13:20
|
com.hazelcast:hazelcast |
CVE-2023-33265 |
高危 |
3.12.11 |
5.2.4, 5.1.7, 5.0.5 |
Hazelcast Executor Services don't check client permissions properly
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33265
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-07-18 16:15 修改: 2023-07-28 13:20
|
com.hazelcast:hazelcast |
CVE-2023-45859 |
高危 |
3.12.11 |
5.2.5, 5.3.5 |
Missing permission checks on Hazelcast client protocol
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45859
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-28 22:15 修改: 2024-11-29 17:15
|
com.hazelcast:hazelcast |
CVE-2023-45859 |
高危 |
3.12.11 |
5.2.5, 5.3.5 |
Missing permission checks on Hazelcast client protocol
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45859
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-28 22:15 修改: 2024-11-29 17:15
|
com.hazelcast:hazelcast |
CVE-2023-45859 |
高危 |
3.12.11 |
5.2.5, 5.3.5 |
Missing permission checks on Hazelcast client protocol
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45859
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-28 22:15 修改: 2024-11-29 17:15
|
com.hazelcast:hazelcast |
CVE-2023-45860 |
高危 |
3.12.11 |
5.3.5, 5.2.5 |
Hazelcast: Permission checking in CSV File Source connector
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45860
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-16 10:15 修改: 2024-11-06 17:35
|
com.hazelcast:hazelcast |
CVE-2023-45860 |
高危 |
3.12.11 |
5.3.5, 5.2.5 |
Hazelcast: Permission checking in CSV File Source connector
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45860
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-16 10:15 修改: 2024-11-06 17:35
|
com.hazelcast:hazelcast |
CVE-2023-45860 |
高危 |
3.12.11 |
5.3.5, 5.2.5 |
Hazelcast: Permission checking in CSV File Source connector
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45860
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-16 10:15 修改: 2024-11-06 17:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
8.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
8.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
8.20.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
8.21.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
8.21.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
8.22 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
8.22 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
8.22.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
8.22.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
8.22.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
8.4 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
8.4 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
9.8.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
9.8.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.thoughtworks.xstream:xstream |
CVE-2021-39139 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39139
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39139 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39139
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39141 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39141
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39141 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39141
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39144 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39144
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-23 18:15 修改: 2024-06-28 13:42
|
com.thoughtworks.xstream:xstream |
CVE-2021-39144 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39144
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-08-23 18:15 修改: 2024-06-28 13:42
|
com.thoughtworks.xstream:xstream |
CVE-2021-39145 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39145
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39145 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39145
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39146 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39146
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39146 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39146
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39147 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39147
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39147 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39147
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39148 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39148
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39148 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39148
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39149 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39149
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39149 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39149
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39150 |
高危 |
1.4.17 |
1.4.18 |
xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39150
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-23 19:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39150 |
高危 |
1.4.17 |
1.4.18 |
xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39150
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-08-23 19:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39151 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39151
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39151 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39151
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39152 |
高危 |
1.4.17 |
1.4.18 |
xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39152
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-23 19:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39152 |
高危 |
1.4.17 |
1.4.18 |
xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39152
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-08-23 19:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39153 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39153
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39153 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39153
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39154 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39154
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-39154 |
高危 |
1.4.17 |
1.4.18 |
xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39154
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-08-23 18:15 修改: 2023-11-07 03:37
|
com.thoughtworks.xstream:xstream |
CVE-2021-43859 |
高危 |
1.4.17 |
1.4.19 |
xstream: Injecting highly recursive collections or maps can cause a DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43859
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-02-01 12:15 修改: 2023-11-07 03:39
|
com.thoughtworks.xstream:xstream |
CVE-2021-43859 |
高危 |
1.4.17 |
1.4.19 |
xstream: Injecting highly recursive collections or maps can cause a DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43859
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-02-01 12:15 修改: 2023-11-07 03:39
|
com.thoughtworks.xstream:xstream |
CVE-2022-40151 |
高危 |
1.4.17 |
1.4.20 |
xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40151
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-09-16 10:15 修改: 2022-09-20 18:11
|
com.thoughtworks.xstream:xstream |
CVE-2022-40151 |
高危 |
1.4.17 |
1.4.20 |
xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40151
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-16 10:15 修改: 2022-09-20 18:11
|
com.thoughtworks.xstream:xstream |
CVE-2022-41966 |
高危 |
1.4.17 |
1.4.20 |
xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41966
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-12-28 00:15 修改: 2023-06-27 14:04
|
com.thoughtworks.xstream:xstream |
CVE-2022-41966 |
高危 |
1.4.17 |
1.4.20 |
xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41966
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-28 00:15 修改: 2023-06-27 14:04
|
com.thoughtworks.xstream:xstream |
CVE-2024-47072 |
高危 |
1.4.17 |
1.4.21 |
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47072
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-11-08 00:15 修改: 2024-11-08 19:01
|
com.thoughtworks.xstream:xstream |
CVE-2024-47072 |
高危 |
1.4.17 |
1.4.21 |
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47072
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-11-08 00:15 修改: 2024-11-08 19:01
|
com.thoughtworks.xstream:xstream |
CVE-2021-43859 |
高危 |
1.4.18 |
1.4.19 |
xstream: Injecting highly recursive collections or maps can cause a DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43859
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-02-01 12:15 修改: 2023-11-07 03:39
|
com.thoughtworks.xstream:xstream |
CVE-2022-40151 |
高危 |
1.4.18 |
1.4.20 |
xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40151
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-09-16 10:15 修改: 2022-09-20 18:11
|
com.thoughtworks.xstream:xstream |
CVE-2022-41966 |
高危 |
1.4.18 |
1.4.20 |
xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41966
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-12-28 00:15 修改: 2023-06-27 14:04
|
com.thoughtworks.xstream:xstream |
CVE-2024-47072 |
高危 |
1.4.18 |
1.4.21 |
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47072
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-11-08 00:15 修改: 2024-11-08 19:01
|
com.thoughtworks.xstream:xstream |
CVE-2022-40151 |
高危 |
1.4.19 |
1.4.20 |
xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40151
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-09-16 10:15 修改: 2022-09-20 18:11
|
com.thoughtworks.xstream:xstream |
CVE-2022-40151 |
高危 |
1.4.19 |
1.4.20 |
xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40151
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-16 10:15 修改: 2022-09-20 18:11
|
com.thoughtworks.xstream:xstream |
CVE-2022-40151 |
高危 |
1.4.19 |
1.4.20 |
xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40151
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-16 10:15 修改: 2022-09-20 18:11
|
com.thoughtworks.xstream:xstream |
CVE-2022-41966 |
高危 |
1.4.19 |
1.4.20 |
xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41966
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-12-28 00:15 修改: 2023-06-27 14:04
|
com.thoughtworks.xstream:xstream |
CVE-2022-41966 |
高危 |
1.4.19 |
1.4.20 |
xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41966
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-28 00:15 修改: 2023-06-27 14:04
|
com.thoughtworks.xstream:xstream |
CVE-2022-41966 |
高危 |
1.4.19 |
1.4.20 |
xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41966
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-28 00:15 修改: 2023-06-27 14:04
|
com.thoughtworks.xstream:xstream |
CVE-2024-47072 |
高危 |
1.4.19 |
1.4.21 |
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47072
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-11-08 00:15 修改: 2024-11-08 19:01
|
com.thoughtworks.xstream:xstream |
CVE-2024-47072 |
高危 |
1.4.19 |
1.4.21 |
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47072
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-11-08 00:15 修改: 2024-11-08 19:01
|
com.thoughtworks.xstream:xstream |
CVE-2024-47072 |
高危 |
1.4.19 |
1.4.21 |
com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47072
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-11-08 00:15 修改: 2024-11-08 19:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.11.0 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.11.0 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
commons-fileupload:commons-fileupload |
CVE-2023-24998 |
高危 |
1.4 |
1.5 |
FileUpload: FileUpload DoS with excessive parts
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11
|
commons-fileupload:commons-fileupload |
CVE-2023-24998 |
高危 |
1.4 |
1.5 |
FileUpload: FileUpload DoS with excessive parts
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11
|
commons-fileupload:commons-fileupload |
CVE-2023-24998 |
高危 |
1.4 |
1.5 |
FileUpload: FileUpload DoS with excessive parts
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.10.0 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.10.0 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.8.0 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.8.0 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
io.netty:netty-codec |
CVE-2021-37136 |
高危 |
4.1.65.Final |
4.1.68.Final |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty-codec |
CVE-2021-37137 |
高危 |
4.1.65.Final |
4.1.68.Final |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.11.0 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.11.0 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.11.0 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
net.minidev:json-smart |
CVE-2021-31684 |
高危 |
1.3.2 |
1.3.3, 2.4.4 |
json-smart: Denial of Service in JSONParserByteArray function
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31684
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-06-01 20:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2021-31684 |
高危 |
1.3.2 |
1.3.3, 2.4.4 |
json-smart: Denial of Service in JSONParserByteArray function
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31684
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-06-01 20:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
1.3.2 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
1.3.2 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
1.3.3 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
1.3.3 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.3 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.3 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.4.7 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.4.7 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.4.7 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.4.7 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.4.7 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.4.7 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.11.0 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.11.0 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.7 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.7 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.20 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.20 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.21 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.21 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.21 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.11.0 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.11.1 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.11.1 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.11.1 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.11.1 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.11.1 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.11.1 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.11.1 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.11.1 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.12.1 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.12.1 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.12.1 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
org.apache.santuario:xmlsec |
CVE-2021-40690 |
高危 |
2.2.0 |
2.2.3, 2.1.7 |
xml-security: XPath Transform abuse allows for information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40690
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-09-19 18:15 修改: 2023-11-07 03:38
|
org.apache.santuario:xmlsec |
CVE-2021-40690 |
高危 |
2.2.0 |
2.2.3, 2.1.7 |
xml-security: XPath Transform abuse allows for information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40690
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-09-19 18:15 修改: 2023-11-07 03:38
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.12.1 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
org.apache.tomcat:tomcat-catalina |
CVE-2023-46589 |
高危 |
9.0.63 |
11.0.0-M11, 10.1.16, 9.0.83, 8.5.96 |
tomcat: HTTP request smuggling via malformed trailer headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46589
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-11-28 16:15 修改: 2024-07-12 16:11
|
org.apache.tomcat:tomcat-catalina |
CVE-2024-50379 |
高危 |
9.0.63 |
11.0.2, 10.1.34, 9.0.98 |
tomcat: RCE due to TOCTOU issue in JSP compilation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50379
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-12-17 13:15 修改: 2025-01-03 12:15
|
org.apache.tomcat:tomcat-coyote |
CVE-2022-42252 |
高危 |
9.0.45 |
9.0.68, 10.0.27, 10.1.1 |
tomcat: request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42252
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-11-01 09:15 修改: 2023-05-30 06:15
|
org.apache.tomcat:tomcat-coyote |
CVE-2023-24998 |
高危 |
9.0.45 |
10.1.5, 11.0.0-M5, 8.5.88, 9.0.71 |
FileUpload: FileUpload DoS with excessive parts
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11
|
org.apache.tomcat:tomcat-coyote |
CVE-2024-34750 |
高危 |
9.0.45 |
11.0.0-M21, 10.1.25, 9.0.90 |
tomcat: Improper Handling of Exceptional Conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34750
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-07-03 20:15 修改: 2024-07-09 16:22
|
org.apache.tomcat:tomcat-coyote |
CVE-2022-42252 |
高危 |
9.0.54 |
9.0.68, 10.0.27, 10.1.1 |
tomcat: request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42252
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-11-01 09:15 修改: 2023-05-30 06:15
|
org.apache.tomcat:tomcat-coyote |
CVE-2023-24998 |
高危 |
9.0.54 |
10.1.5, 11.0.0-M5, 8.5.88, 9.0.71 |
FileUpload: FileUpload DoS with excessive parts
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11
|
org.apache.tomcat:tomcat-coyote |
CVE-2024-34750 |
高危 |
9.0.54 |
11.0.0-M21, 10.1.25, 9.0.90 |
tomcat: Improper Handling of Exceptional Conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34750
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-07-03 20:15 修改: 2024-07-09 16:22
|
org.apache.tomcat:tomcat-coyote |
CVE-2022-42252 |
高危 |
9.0.63 |
9.0.68, 10.0.27, 10.1.1 |
tomcat: request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42252
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-11-01 09:15 修改: 2023-05-30 06:15
|
org.apache.tomcat:tomcat-coyote |
CVE-2022-42252 |
高危 |
9.0.63 |
9.0.68, 10.0.27, 10.1.1 |
tomcat: request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42252
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-11-01 09:15 修改: 2023-05-30 06:15
|
org.apache.tomcat:tomcat-coyote |
CVE-2023-24998 |
高危 |
9.0.63 |
10.1.5, 11.0.0-M5, 8.5.88, 9.0.71 |
FileUpload: FileUpload DoS with excessive parts
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11
|
org.apache.tomcat:tomcat-coyote |
CVE-2023-24998 |
高危 |
9.0.63 |
10.1.5, 11.0.0-M5, 8.5.88, 9.0.71 |
FileUpload: FileUpload DoS with excessive parts
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11
|
org.apache.tomcat:tomcat-coyote |
CVE-2024-34750 |
高危 |
9.0.63 |
11.0.0-M21, 10.1.25, 9.0.90 |
tomcat: Improper Handling of Exceptional Conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34750
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-07-03 20:15 修改: 2024-07-09 16:22
|
org.apache.tomcat:tomcat-coyote |
CVE-2024-34750 |
高危 |
9.0.63 |
11.0.0-M21, 10.1.25, 9.0.90 |
tomcat: Improper Handling of Exceptional Conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34750
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-07-03 20:15 修改: 2024-07-09 16:22
|
org.apache.tomcat:tomcat-util |
CVE-2022-45143 |
高危 |
9.0.45 |
8.5.84, 9.0.69 |
tomcat: JsonErrorReportValve injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45143
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-01-03 19:15 修改: 2023-06-27 13:15
|
org.apache.tomcat:tomcat-util |
CVE-2024-38286 |
高危 |
9.0.45 |
11.0.0-M21, 10.1.25, 9.0.90 |
tomcat: Denial of Service in Tomcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38286
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-11-07 08:15 修改: 2024-11-08 19:01
|
org.apache.tomcat:tomcat-util |
CVE-2022-45143 |
高危 |
9.0.54 |
8.5.84, 9.0.69 |
tomcat: JsonErrorReportValve injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45143
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-01-03 19:15 修改: 2023-06-27 13:15
|
org.apache.tomcat:tomcat-util |
CVE-2024-38286 |
高危 |
9.0.54 |
11.0.0-M21, 10.1.25, 9.0.90 |
tomcat: Denial of Service in Tomcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38286
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-11-07 08:15 修改: 2024-11-08 19:01
|
org.apache.tomcat:tomcat-util |
CVE-2022-45143 |
高危 |
9.0.63 |
8.5.84, 9.0.69 |
tomcat: JsonErrorReportValve injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45143
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-01-03 19:15 修改: 2023-06-27 13:15
|
org.apache.tomcat:tomcat-util |
CVE-2022-45143 |
高危 |
9.0.63 |
8.5.84, 9.0.69 |
tomcat: JsonErrorReportValve injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45143
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-01-03 19:15 修改: 2023-06-27 13:15
|
org.apache.tomcat:tomcat-util |
CVE-2024-38286 |
高危 |
9.0.63 |
11.0.0-M21, 10.1.25, 9.0.90 |
tomcat: Denial of Service in Tomcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38286
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-11-07 08:15 修改: 2024-11-08 19:01
|
org.apache.tomcat:tomcat-util |
CVE-2024-38286 |
高危 |
9.0.63 |
11.0.0-M21, 10.1.25, 9.0.90 |
tomcat: Denial of Service in Tomcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38286
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-11-07 08:15 修改: 2024-11-08 19:01
|
org.apache.velocity:velocity |
CVE-2020-13936 |
高危 |
1.6.4-atlassian-23 |
|
velocity: arbitrary code execution when attacker is able to modify templates
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13936
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-03-10 08:15 修改: 2023-11-07 03:17
|
org.apache.velocity:velocity |
CVE-2020-13936 |
高危 |
1.6.4-atlassian-23 |
|
velocity: arbitrary code execution when attacker is able to modify templates
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13936
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-03-10 08:15 修改: 2023-11-07 03:17
|
org.apache.xmlgraphics:batik-bridge |
CVE-2022-44729 |
高危 |
1.14 |
1.17 |
batik: Server-Side Request Forgery vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44729
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15
|
org.apache.xmlgraphics:batik-bridge |
CVE-2022-44729 |
高危 |
1.14 |
1.17 |
batik: Server-Side Request Forgery vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44729
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15
|
org.apache.xmlgraphics:batik-transcoder |
CVE-2022-44729 |
高危 |
1.14 |
1.17 |
batik: Server-Side Request Forgery vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44729
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15
|
org.apache.xmlgraphics:batik-transcoder |
CVE-2022-44729 |
高危 |
1.14 |
1.17 |
batik: Server-Side Request Forgery vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44729
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15
|
org.bitbucket.b_c:jose4j |
CVE-2023-31582 |
高危 |
0.6.3 |
0.9.3 |
jose4j: Insecure iteration count setting
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31582
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-10-25 18:17 修改: 2023-10-31 15:18
|
org.bitbucket.b_c:jose4j |
CVE-2023-31582 |
高危 |
0.6.3 |
0.9.3 |
jose4j: Insecure iteration count setting
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31582
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-10-25 18:17 修改: 2023-10-31 15:18
|
org.clojure:clojure |
CVE-2024-22871 |
高危 |
1.10.1 |
1.11.2, 1.12.0-alpha9 |
An issue in Clojure versions 1.20 to 1.12.0-alpha5 allows an attacker ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22871
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-29 02:15 修改: 2024-08-13 19:35
|
org.clojure:clojure |
CVE-2024-22871 |
高危 |
1.10.1 |
1.11.2, 1.12.0-alpha9 |
An issue in Clojure versions 1.20 to 1.12.0-alpha5 allows an attacker ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22871
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-29 02:15 修改: 2024-08-13 19:35
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.hibernate:hibernate-core |
CVE-2020-25638 |
高危 |
5.2.18.Final |
5.4.24.Final, 5.3.20.Final |
hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25638
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2020-12-02 15:15 修改: 2023-11-07 03:20
|
org.hibernate:hibernate-core |
CVE-2020-25638 |
高危 |
5.2.18.Final |
5.4.24.Final, 5.3.20.Final |
hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25638
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2020-12-02 15:15 修改: 2023-11-07 03:20
|
org.hibernate:hibernate-core |
CVE-2020-25638 |
高危 |
5.3.2.Final |
5.4.24.Final, 5.3.20.Final |
hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25638
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2020-12-02 15:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.12.1 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
org.jdom:jdom |
CVE-2021-33813 |
高危 |
1.1.3 |
|
jdom: XXE allows attackers to cause a DoS via a crafted HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33813
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-06-16 12:15 修改: 2023-11-07 03:35
|
org.json:json |
CVE-2022-45688 |
高危 |
20070829 |
20230227 |
json stack overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16
|
org.json:json |
CVE-2022-45688 |
高危 |
20070829 |
20230227 |
json stack overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16
|
org.json:json |
CVE-2023-5072 |
高危 |
20070829 |
20231013 |
JSON-java: parser confusion leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5072
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-10-12 17:15 修改: 2024-06-21 19:15
|
org.json:json |
CVE-2023-5072 |
高危 |
20070829 |
20231013 |
JSON-java: parser confusion leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5072
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-10-12 17:15 修改: 2024-06-21 19:15
|
org.json:json |
CVE-2022-45688 |
高危 |
20220320 |
20230227 |
json stack overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16
|
org.json:json |
CVE-2022-45688 |
高危 |
20220320 |
20230227 |
json stack overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16
|
org.json:json |
CVE-2023-5072 |
高危 |
20220320 |
20231013 |
JSON-java: parser confusion leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5072
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-10-12 17:15 修改: 2024-06-21 19:15
|
org.json:json |
CVE-2023-5072 |
高危 |
20220320 |
20231013 |
JSON-java: parser confusion leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5072
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-10-12 17:15 修改: 2024-06-21 19:15
|
org.jsoup:jsoup |
CVE-2021-37714 |
高危 |
1.9.2 |
1.14.2 |
jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37714
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-18 15:15 修改: 2023-11-07 03:37
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.12.1 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.12.1 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.12.1 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
org.postgresql:postgresql |
CVE-2022-21724 |
高危 |
42.2.18 |
42.2.25, 42.3.2 |
jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21724
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-02-02 12:15 修改: 2023-11-07 03:43
|
org.postgresql:postgresql |
CVE-2022-31197 |
高危 |
42.2.18 |
42.2.26, 42.4.1, 42.3.7 |
postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31197
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-08-03 19:15 修改: 2023-11-07 03:47
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.12.1 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.12.1 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
org.postgresql:postgresql |
CVE-2022-31197 |
高危 |
42.4.0 |
42.2.26, 42.4.1, 42.3.7 |
postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31197
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-08-03 19:15 修改: 2023-11-07 03:47
|
org.postgresql:postgresql |
CVE-2022-31197 |
高危 |
42.4.0 |
42.2.26, 42.4.1, 42.3.7 |
postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31197
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-08-03 19:15 修改: 2023-11-07 03:47
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.12.1 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.12.1 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.12.3 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.12.3 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
org.springframework.security:spring-security-core |
CVE-2024-22257 |
高危 |
4.2.16.RELEASE |
5.7.12, 5.8.11, 6.1.8, 6.2.3 |
spring-security: Broken Access Control With Direct Use of AuthenticatedVoter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22257
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-18 15:15 修改: 2024-11-12 16:35
|
org.springframework.security:spring-security-core |
CVE-2024-22257 |
高危 |
4.2.16.RELEASE |
5.7.12, 5.8.11, 6.1.8, 6.2.3 |
spring-security: Broken Access Control With Direct Use of AuthenticatedVoter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22257
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-03-18 15:15 修改: 2024-11-12 16:35
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.12.3 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
org.springframework:spring-beans |
CVE-2022-22970 |
高危 |
5.1.18.RELEASE |
5.2.22.RELEASE, 5.3.20 |
springframework: DoS via data binding to multipartFile or servlet part
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22970
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-05-12 20:15 修改: 2022-10-07 13:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.12.3 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
org.springframework:spring-beans |
CVE-2022-22970 |
高危 |
5.3.11 |
5.2.22.RELEASE, 5.3.20 |
springframework: DoS via data binding to multipartFile or servlet part
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22970
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-05-12 20:15 修改: 2022-10-07 13:17
|
org.springframework:spring-beans |
CVE-2022-22970 |
高危 |
5.3.19 |
5.2.22.RELEASE, 5.3.20 |
springframework: DoS via data binding to multipartFile or servlet part
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22970
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-05-12 20:15 修改: 2022-10-07 13:17
|
org.springframework:spring-beans |
CVE-2022-22970 |
高危 |
5.3.19 |
5.2.22.RELEASE, 5.3.20 |
springframework: DoS via data binding to multipartFile or servlet part
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22970
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-05-12 20:15 修改: 2022-10-07 13:17
|
org.springframework:spring-context |
CVE-2022-22968 |
高危 |
5.1.18.RELEASE |
5.3.19, 5.2.21.RELEASE |
Framework: Data Binding Rules Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22968
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-04-14 21:15 修改: 2022-10-19 15:15
|
org.springframework:spring-context |
CVE-2022-22968 |
高危 |
5.3.11 |
5.3.19, 5.2.21.RELEASE |
Framework: Data Binding Rules Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22968
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-04-14 21:15 修改: 2022-10-19 15:15
|
org.springframework:spring-expression |
CVE-2023-20863 |
高危 |
5.1.18.RELEASE |
6.0.8, 5.3.27, 5.2.24.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20863
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-04-13 20:15 修改: 2024-06-10 17:16
|
org.springframework:spring-expression |
CVE-2023-20863 |
高危 |
5.3.11 |
6.0.8, 5.3.27, 5.2.24.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20863
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-04-13 20:15 修改: 2024-06-10 17:16
|
org.springframework:spring-expression |
CVE-2023-20863 |
高危 |
5.3.19 |
6.0.8, 5.3.27, 5.2.24.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20863
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-04-13 20:15 修改: 2024-06-10 17:16
|
org.springframework:spring-expression |
CVE-2023-20863 |
高危 |
5.3.19 |
6.0.8, 5.3.27, 5.2.24.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20863
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-04-13 20:15 修改: 2024-06-10 17:16
|
org.springframework:spring-expression |
CVE-2023-20863 |
高危 |
5.3.21 |
6.0.8, 5.3.27, 5.2.24.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20863
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-04-13 20:15 修改: 2024-06-10 17:16
|
org.springframework:spring-expression |
CVE-2023-20863 |
高危 |
5.3.21 |
6.0.8, 5.3.27, 5.2.24.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20863
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-04-13 20:15 修改: 2024-06-10 17:16
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.12.3 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
org.springframework:spring-web |
CVE-2024-22243 |
高危 |
5.1.18.RELEASE |
6.1.4, 6.0.17, 5.3.32 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22243
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-23 05:15 修改: 2024-08-22 15:35
|
org.springframework:spring-web |
CVE-2024-22259 |
高危 |
5.1.18.RELEASE |
6.1.5, 6.0.18, 5.3.33 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47
|
org.springframework:spring-web |
CVE-2024-22262 |
高危 |
5.1.18.RELEASE |
5.3.34, 6.0.19, 6.1.6 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.12.3 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
org.springframework:spring-web |
CVE-2024-22243 |
高危 |
5.3.11 |
6.1.4, 6.0.17, 5.3.32 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22243
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-23 05:15 修改: 2024-08-22 15:35
|
org.springframework:spring-web |
CVE-2024-22259 |
高危 |
5.3.11 |
6.1.5, 6.0.18, 5.3.33 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47
|
org.springframework:spring-web |
CVE-2024-22262 |
高危 |
5.3.11 |
5.3.34, 6.0.19, 6.1.6 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.12.3 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.12.3 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
org.springframework:spring-web |
CVE-2024-22243 |
高危 |
5.3.19 |
6.1.4, 6.0.17, 5.3.32 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22243
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-23 05:15 修改: 2024-08-22 15:35
|
org.springframework:spring-web |
CVE-2024-22243 |
高危 |
5.3.19 |
6.1.4, 6.0.17, 5.3.32 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22243
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-23 05:15 修改: 2024-08-22 15:35
|
org.springframework:spring-web |
CVE-2024-22259 |
高危 |
5.3.19 |
6.1.5, 6.0.18, 5.3.33 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47
|
org.springframework:spring-web |
CVE-2024-22259 |
高危 |
5.3.19 |
6.1.5, 6.0.18, 5.3.33 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47
|
org.springframework:spring-web |
CVE-2024-22262 |
高危 |
5.3.19 |
5.3.34, 6.0.19, 6.1.6 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35
|
org.springframework:spring-web |
CVE-2024-22262 |
高危 |
5.3.19 |
5.3.34, 6.0.19, 6.1.6 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.12.5 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.12.5 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
org.springframework:spring-web |
CVE-2024-22243 |
高危 |
5.3.21 |
6.1.4, 6.0.17, 5.3.32 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22243
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-23 05:15 修改: 2024-08-22 15:35
|
org.springframework:spring-web |
CVE-2024-22243 |
高危 |
5.3.21 |
6.1.4, 6.0.17, 5.3.32 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22243
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-23 05:15 修改: 2024-08-22 15:35
|
org.springframework:spring-web |
CVE-2024-22259 |
高危 |
5.3.21 |
6.1.5, 6.0.18, 5.3.33 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47
|
org.springframework:spring-web |
CVE-2024-22259 |
高危 |
5.3.21 |
6.1.5, 6.0.18, 5.3.33 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47
|
org.springframework:spring-web |
CVE-2024-22262 |
高危 |
5.3.21 |
5.3.34, 6.0.19, 6.1.6 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35
|
org.springframework:spring-web |
CVE-2024-22262 |
高危 |
5.3.21 |
5.3.34, 6.0.19, 6.1.6 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.12.5 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
org.springframework:spring-webmvc |
CVE-2024-38819 |
高危 |
5.1.18.RELEASE |
6.1.14 |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38819
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-12-19 18:15 修改: 2025-01-10 13:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.12.5 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
org.springframework:spring-webmvc |
CVE-2024-38816 |
高危 |
5.3.11 |
6.1.13 |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-09-13 06:15 修改: 2024-12-27 16:15
|
org.springframework:spring-webmvc |
CVE-2024-38819 |
高危 |
5.3.11 |
6.1.14 |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38819
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-12-19 18:15 修改: 2025-01-10 13:15
|
org.springframework:spring-webmvc |
CVE-2024-38816 |
高危 |
5.3.19 |
6.1.13 |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-09-13 06:15 修改: 2024-12-27 16:15
|
org.springframework:spring-webmvc |
CVE-2024-38816 |
高危 |
5.3.19 |
6.1.13 |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-09-13 06:15 修改: 2024-12-27 16:15
|
org.springframework:spring-webmvc |
CVE-2024-38819 |
高危 |
5.3.19 |
6.1.14 |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38819
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-12-19 18:15 修改: 2025-01-10 13:15
|
org.springframework:spring-webmvc |
CVE-2024-38819 |
高危 |
5.3.19 |
6.1.14 |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38819
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-12-19 18:15 修改: 2025-01-10 13:15
|
org.springframework:spring-webmvc |
CVE-2024-38816 |
高危 |
5.3.21 |
6.1.13 |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-09-13 06:15 修改: 2024-12-27 16:15
|
org.springframework:spring-webmvc |
CVE-2024-38816 |
高危 |
5.3.21 |
6.1.13 |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-09-13 06:15 修改: 2024-12-27 16:15
|
org.springframework:spring-webmvc |
CVE-2024-38819 |
高危 |
5.3.21 |
6.1.14 |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38819
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-12-19 18:15 修改: 2025-01-10 13:15
|
org.springframework:spring-webmvc |
CVE-2024-38819 |
高危 |
5.3.21 |
6.1.14 |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38819
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-12-19 18:15 修改: 2025-01-10 13:15
|
org.xerial.snappy:snappy-java |
CVE-2023-34455 |
高危 |
1.1.1.7 |
1.1.10.1 |
snappy-java: Unchecked chunk length leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17
|
org.xerial.snappy:snappy-java |
CVE-2023-43642 |
高危 |
1.1.1.7 |
1.1.10.4 |
snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46
|
org.xerial.snappy:snappy-java |
CVE-2023-34455 |
高危 |
1.1.7.3 |
1.1.10.1 |
snappy-java: Unchecked chunk length leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17
|
org.xerial.snappy:snappy-java |
CVE-2023-43642 |
高危 |
1.1.7.3 |
1.1.10.4 |
snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46
|
org.yaml:snakeyaml |
CVE-2022-1471 |
高危 |
1.26 |
2.0 |
SnakeYaml: Constructor Deserialization Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15
|
org.yaml:snakeyaml |
CVE-2022-1471 |
高危 |
1.26 |
2.0 |
SnakeYaml: Constructor Deserialization Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15
|
org.yaml:snakeyaml |
CVE-2022-25857 |
高危 |
1.26 |
1.31 |
snakeyaml: Denial of Service due to missing nested depth limitation for collections
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25857
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-08-30 05:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-25857 |
高危 |
1.26 |
1.31 |
snakeyaml: Denial of Service due to missing nested depth limitation for collections
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25857
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-08-30 05:15 修改: 2024-03-15 11:15
|
software.amazon.ion:ion-java |
CVE-2024-21634 |
高危 |
1.0.2 |
1.10.5 |
ion-java: ion-java: Ion Java StackOverflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21634
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-01-03 23:15 修改: 2024-01-10 16:38
|
software.amazon.ion:ion-java |
CVE-2024-21634 |
高危 |
1.0.2 |
1.10.5 |
ion-java: ion-java: Ion Java StackOverflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21634
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-01-03 23:15 修改: 2024-01-10 16:38
|
xalan:xalan |
CVE-2022-34169 |
高危 |
2.7.2 |
2.7.3 |
OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34169
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-07-19 18:15 修改: 2024-06-21 19:15
|
xalan:xalan |
CVE-2022-34169 |
高危 |
2.7.2 |
2.7.3 |
OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34169
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-07-19 18:15 修改: 2024-06-21 19:15
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.4.39.v20210325 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.4.39.v20210325 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.4.41.v20210516 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.4.41.v20210516 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.4.41.v20210516 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.4.41.v20210516 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.4.43.v20210629 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.4.43.v20210629 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.4.43.v20210629 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.4.43.v20210629 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.4.39.v20210325 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2024-8184 |
中危 |
9.4.39.v20210325 |
12.0.9, 10.0.24, 11.0.24, 9.4.56 |
org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8184
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:00
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.4.43.v20210629 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.4.43.v20210629 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2024-8184 |
中危 |
9.4.43.v20210629 |
12.0.9, 10.0.24, 11.0.24, 9.4.56 |
org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8184
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:00
|
org.eclipse.jetty:jetty-server |
CVE-2024-8184 |
中危 |
9.4.43.v20210629 |
12.0.9, 10.0.24, 11.0.24, 9.4.56 |
org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8184
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:00
|
org.glassfish.jersey.core:jersey-common |
CVE-2021-28168 |
中危 |
2.31 |
2.34, 3.0.2 |
jersey: Local information disclosure via system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28168
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-04-22 18:15 修改: 2023-11-07 03:32
|
org.hibernate.validator:hibernate-validator |
CVE-2020-10693 |
中危 |
6.0.17.Final |
6.1.5.Final, 6.0.20.Final |
hibernate-validator: Improper input validation in the interpolation of constraint error messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10693
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2020-05-06 14:15 修改: 2023-11-07 03:14
|
org.hibernate.validator:hibernate-validator |
CVE-2020-10693 |
中危 |
6.0.17.Final |
6.1.5.Final, 6.0.20.Final |
hibernate-validator: Improper input validation in the interpolation of constraint error messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10693
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2020-05-06 14:15 修改: 2023-11-07 03:14
|
org.hibernate.validator:hibernate-validator |
CVE-2023-1932 |
中危 |
6.0.17.Final |
6.2.0.Final |
hibernate-validator: rendering of invalid html with SafeHTML leads to HTML injection and XSS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1932
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-11-07 10:15 修改: 2024-11-08 19:01
|
org.hibernate.validator:hibernate-validator |
CVE-2023-1932 |
中危 |
6.0.17.Final |
6.2.0.Final |
hibernate-validator: rendering of invalid html with SafeHTML leads to HTML injection and XSS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1932
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-11-07 10:15 修改: 2024-11-08 19:01
|
org.hibernate.validator:hibernate-validator |
CVE-2023-1932 |
中危 |
6.0.21.Final |
6.2.0.Final |
hibernate-validator: rendering of invalid html with SafeHTML leads to HTML injection and XSS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1932
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-11-07 10:15 修改: 2024-11-08 19:01
|
org.hibernate.validator:hibernate-validator |
CVE-2023-1932 |
中危 |
6.0.21.Final |
6.2.0.Final |
hibernate-validator: rendering of invalid html with SafeHTML leads to HTML injection and XSS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1932
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-11-07 10:15 修改: 2024-11-08 19:01
|
org.hibernate.validator:hibernate-validator |
CVE-2023-1932 |
中危 |
6.0.22.Final |
6.2.0.Final |
hibernate-validator: rendering of invalid html with SafeHTML leads to HTML injection and XSS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1932
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-11-07 10:15 修改: 2024-11-08 19:01
|
org.hibernate.validator:hibernate-validator |
CVE-2023-1932 |
中危 |
6.0.22.Final |
6.2.0.Final |
hibernate-validator: rendering of invalid html with SafeHTML leads to HTML injection and XSS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1932
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-11-07 10:15 修改: 2024-11-08 19:01
|
org.apache.santuario:xmlsec |
CVE-2023-44483 |
中危 |
2.2.0 |
2.3.4, 2.2.6, 3.0.3 |
santuario: Private Key disclosure in debug-log output
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44483
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-10-20 10:15 修改: 2023-10-27 18:49
|
org.apache.santuario:xmlsec |
CVE-2023-44483 |
中危 |
2.2.0 |
2.3.4, 2.2.6, 3.0.3 |
santuario: Private Key disclosure in debug-log output
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44483
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-10-20 10:15 修改: 2023-10-27 18:49
|
org.hibernate:hibernate-core |
CVE-2019-14900 |
中危 |
5.2.18.Final |
5.3.18, 5.4.18, 5.5.0.Beta1 |
hibernate: SQL injection issue in Hibernate ORM
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14900
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2020-07-06 19:15 修改: 2023-11-07 03:05
|
org.hibernate:hibernate-core |
CVE-2019-14900 |
中危 |
5.2.18.Final |
5.3.18, 5.4.18, 5.5.0.Beta1 |
hibernate: SQL injection issue in Hibernate ORM
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14900
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2020-07-06 19:15 修改: 2023-11-07 03:05
|
org.apache.tika:tika-core |
CVE-2022-30973 |
中危 |
1.22 |
1.28.3 |
tika-core: incomplete fix for CVE-2022-30126
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30973
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-05-31 14:15 修改: 2022-10-27 16:41
|
org.hibernate:hibernate-core |
CVE-2019-14900 |
中危 |
5.3.2.Final |
5.3.18, 5.4.18, 5.5.0.Beta1 |
hibernate: SQL injection issue in Hibernate ORM
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14900
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2020-07-06 19:15 修改: 2023-11-07 03:05
|
org.apache.tika:tika-core |
CVE-2022-30973 |
中危 |
1.22 |
1.28.3 |
tika-core: incomplete fix for CVE-2022-30126
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30973
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-05-31 14:15 修改: 2022-10-27 16:41
|
org.apache.tika:tika-core |
CVE-2022-30973 |
中危 |
1.23 |
1.28.3 |
tika-core: incomplete fix for CVE-2022-30126
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30973
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-05-31 14:15 修改: 2022-10-27 16:41
|
org.jetbrains.kotlin:kotlin-stdlib |
CVE-2020-29582 |
中危 |
1.2.31 |
1.4.21 |
kotlin: vulnerable Java API was used for temporary file and folder creation which could result in information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29582
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-02-03 16:15 修改: 2023-11-07 03:21
|
org.jetbrains.kotlin:kotlin-stdlib |
CVE-2022-24329 |
中危 |
1.2.31 |
1.6.0 |
kotlin: Not possible to lock dependencies for Multiplatform Gradle Projects
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24329
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-02-25 15:15 修改: 2024-10-29 15:36
|
org.apache.tika:tika-core |
CVE-2022-30973 |
中危 |
1.23 |
1.28.3 |
tika-core: incomplete fix for CVE-2022-30126
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30973
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-05-31 14:15 修改: 2022-10-27 16:41
|
com.hazelcast:hazelcast |
CVE-2023-33264 |
中危 |
3.12.11 |
5.3.0 |
hazelcast: Improper password mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33264
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-05-22 01:15 修改: 2023-06-02 17:41
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.14.1 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.14.1 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
org.apache.tomcat:tomcat-catalina |
CVE-2023-28708 |
中危 |
9.0.63 |
11.0.0-M3, 10.1.6, 9.0.72, 8.5.86 |
tomcat: not including the secure attribute causes information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28708
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-22 11:15 修改: 2023-11-07 04:10
|
org.apache.tomcat:tomcat-catalina |
CVE-2024-54677 |
中危 |
9.0.63 |
11.0.2, 10.1.34, 9.0.98 |
tomcat: Apache Tomcat: DoS in examples web application
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-54677
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-12-17 13:15 修改: 2024-12-18 17:15
|
com.thoughtworks.xstream:xstream |
CVE-2021-39140 |
中危 |
1.4.17 |
1.4.18 |
xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39140
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-08-23 19:15 修改: 2023-11-07 03:37
|
net.minidev:json-smart |
CVE-2021-27568 |
中危 |
2.3 |
1.3.2, 2.4.1, 2.3.1 |
json-smart: uncaught exception may lead to crash or information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27568
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-02-23 02:15 修改: 2023-11-07 03:31
|
org.jsoup:jsoup |
CVE-2022-36033 |
中危 |
1.14.3 |
1.15.3 |
jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36033
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-08-29 17:15 修改: 2022-12-08 03:48
|
org.jsoup:jsoup |
CVE-2022-36033 |
中危 |
1.14.3 |
1.15.3 |
jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36033
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-08-29 17:15 修改: 2022-12-08 03:48
|
org.jsoup:jsoup |
CVE-2022-36033 |
中危 |
1.14.3 |
1.15.3 |
jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36033
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-08-29 17:15 修改: 2022-12-08 03:48
|
net.minidev:json-smart |
CVE-2021-27568 |
中危 |
2.3 |
1.3.2, 2.4.1, 2.3.1 |
json-smart: uncaught exception may lead to crash or information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27568
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-02-23 02:15 修改: 2023-11-07 03:31
|
org.jsoup:jsoup |
CVE-2022-36033 |
中危 |
1.9.2 |
1.15.3 |
jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36033
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-08-29 17:15 修改: 2022-12-08 03:48
|
org.apache.tomcat:tomcat-coyote |
CVE-2023-44487 |
中危 |
9.0.45 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-10-10 14:15 修改: 2024-12-20 17:40
|
org.apache.tomcat:tomcat-coyote |
CVE-2024-24549 |
中危 |
9.0.45 |
11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 |
Tomcat: HTTP/2 header handling DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24549
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-13 16:15 修改: 2024-11-04 22:35
|
org.owasp.antisamy:antisamy |
CVE-2016-10006 |
中危 |
1.5.3-atlassian-7 |
1.5.5 |
In OWASP AntiSamy before 1.5.5, by submitting a specially crafted inpu ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10006
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2016-12-24 18:59 修改: 2019-11-14 13:22
|
org.owasp.antisamy:antisamy |
CVE-2016-10006 |
中危 |
1.5.3-atlassian-7 |
1.5.5 |
In OWASP AntiSamy before 1.5.5, by submitting a specially crafted inpu ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10006
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2016-12-24 18:59 修改: 2019-11-14 13:22
|
org.owasp.antisamy:antisamy |
CVE-2016-10006 |
中危 |
1.5.3-atlassian-7 |
1.5.5 |
In OWASP AntiSamy before 1.5.5, by submitting a specially crafted inpu ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-10006
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2016-12-24 18:59 修改: 2019-11-14 13:22
|
org.owasp.antisamy:antisamy |
CVE-2017-14735 |
中危 |
1.5.3-atlassian-7 |
1.5.7 |
OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstr ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14735
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2017-09-25 21:29 修改: 2021-07-20 23:15
|
org.owasp.antisamy:antisamy |
CVE-2017-14735 |
中危 |
1.5.3-atlassian-7 |
1.5.7 |
OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstr ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14735
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2017-09-25 21:29 修改: 2021-07-20 23:15
|
org.owasp.antisamy:antisamy |
CVE-2017-14735 |
中危 |
1.5.3-atlassian-7 |
1.5.7 |
OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstr ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-14735
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2017-09-25 21:29 修改: 2021-07-20 23:15
|
org.owasp.antisamy:antisamy |
CVE-2022-28367 |
中危 |
1.5.3-atlassian-7 |
1.6.6 |
OWASP AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28367
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-04-21 23:15 修改: 2022-05-03 20:49
|
org.owasp.antisamy:antisamy |
CVE-2022-28367 |
中危 |
1.5.3-atlassian-7 |
1.6.6 |
OWASP AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28367
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-04-21 23:15 修改: 2022-05-03 20:49
|
org.owasp.antisamy:antisamy |
CVE-2022-28367 |
中危 |
1.5.3-atlassian-7 |
1.6.6 |
OWASP AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28367
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-04-21 23:15 修改: 2022-05-03 20:49
|
org.owasp.antisamy:antisamy |
CVE-2022-29577 |
中危 |
1.5.3-atlassian-7 |
1.6.7 |
Cross-site Scripting in OWASP AntiSamy
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29577
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-04-21 23:15 修改: 2023-02-23 18:47
|
org.owasp.antisamy:antisamy |
CVE-2022-29577 |
中危 |
1.5.3-atlassian-7 |
1.6.7 |
Cross-site Scripting in OWASP AntiSamy
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29577
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-04-21 23:15 修改: 2023-02-23 18:47
|
org.owasp.antisamy:antisamy |
CVE-2022-29577 |
中危 |
1.5.3-atlassian-7 |
1.6.7 |
Cross-site Scripting in OWASP AntiSamy
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29577
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-04-21 23:15 修改: 2023-02-23 18:47
|
org.owasp.antisamy:antisamy |
CVE-2023-43643 |
中危 |
1.5.3-atlassian-7 |
1.7.4 |
AntiSamy is a library for performing fast, configurable cleansing of H ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43643
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-10-09 14:15 修改: 2023-10-13 17:35
|
org.owasp.antisamy:antisamy |
CVE-2023-43643 |
中危 |
1.5.3-atlassian-7 |
1.7.4 |
AntiSamy is a library for performing fast, configurable cleansing of H ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43643
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-10-09 14:15 修改: 2023-10-13 17:35
|
org.owasp.antisamy:antisamy |
CVE-2023-43643 |
中危 |
1.5.3-atlassian-7 |
1.7.4 |
AntiSamy is a library for performing fast, configurable cleansing of H ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43643
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-10-09 14:15 修改: 2023-10-13 17:35
|
org.owasp.antisamy:antisamy |
CVE-2024-23635 |
中危 |
1.5.3-atlassian-7 |
1.7.5 |
AntiSamy is a library for performing fast, configurable cleansing of H ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23635
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-02 17:15 修改: 2024-02-10 01:38
|
org.owasp.antisamy:antisamy |
CVE-2024-23635 |
中危 |
1.5.3-atlassian-7 |
1.7.5 |
AntiSamy is a library for performing fast, configurable cleansing of H ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23635
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-02 17:15 修改: 2024-02-10 01:38
|
org.owasp.antisamy:antisamy |
CVE-2024-23635 |
中危 |
1.5.3-atlassian-7 |
1.7.5 |
AntiSamy is a library for performing fast, configurable cleansing of H ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23635
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-02 17:15 修改: 2024-02-10 01:38
|
org.owasp.antisamy:antisamy |
CVE-2021-35043 |
中危 |
1.5.8 |
1.6.4 |
AntiSamy: XSS via HTML attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35043
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-07-19 15:15 修改: 2022-10-29 02:49
|
org.owasp.antisamy:antisamy |
CVE-2021-35043 |
中危 |
1.5.8 |
1.6.4 |
AntiSamy: XSS via HTML attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35043
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-07-19 15:15 修改: 2022-10-29 02:49
|
org.owasp.antisamy:antisamy |
CVE-2021-35043 |
中危 |
1.5.8 |
1.6.4 |
AntiSamy: XSS via HTML attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35043
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-07-19 15:15 修改: 2022-10-29 02:49
|
org.owasp.antisamy:antisamy |
CVE-2022-28367 |
中危 |
1.5.8 |
1.6.6 |
OWASP AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28367
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-04-21 23:15 修改: 2022-05-03 20:49
|
org.owasp.antisamy:antisamy |
CVE-2022-28367 |
中危 |
1.5.8 |
1.6.6 |
OWASP AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28367
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-04-21 23:15 修改: 2022-05-03 20:49
|
org.owasp.antisamy:antisamy |
CVE-2022-28367 |
中危 |
1.5.8 |
1.6.6 |
OWASP AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28367
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-04-21 23:15 修改: 2022-05-03 20:49
|
org.owasp.antisamy:antisamy |
CVE-2022-29577 |
中危 |
1.5.8 |
1.6.7 |
Cross-site Scripting in OWASP AntiSamy
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29577
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-04-21 23:15 修改: 2023-02-23 18:47
|
org.owasp.antisamy:antisamy |
CVE-2022-29577 |
中危 |
1.5.8 |
1.6.7 |
Cross-site Scripting in OWASP AntiSamy
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29577
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-04-21 23:15 修改: 2023-02-23 18:47
|
org.owasp.antisamy:antisamy |
CVE-2022-29577 |
中危 |
1.5.8 |
1.6.7 |
Cross-site Scripting in OWASP AntiSamy
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29577
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-04-21 23:15 修改: 2023-02-23 18:47
|
org.owasp.antisamy:antisamy |
CVE-2023-43643 |
中危 |
1.5.8 |
1.7.4 |
AntiSamy is a library for performing fast, configurable cleansing of H ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43643
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-10-09 14:15 修改: 2023-10-13 17:35
|
org.owasp.antisamy:antisamy |
CVE-2023-43643 |
中危 |
1.5.8 |
1.7.4 |
AntiSamy is a library for performing fast, configurable cleansing of H ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43643
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-10-09 14:15 修改: 2023-10-13 17:35
|
org.owasp.antisamy:antisamy |
CVE-2023-43643 |
中危 |
1.5.8 |
1.7.4 |
AntiSamy is a library for performing fast, configurable cleansing of H ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43643
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-10-09 14:15 修改: 2023-10-13 17:35
|
org.owasp.antisamy:antisamy |
CVE-2024-23635 |
中危 |
1.5.8 |
1.7.5 |
AntiSamy is a library for performing fast, configurable cleansing of H ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23635
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-02 17:15 修改: 2024-02-10 01:38
|
org.owasp.antisamy:antisamy |
CVE-2024-23635 |
中危 |
1.5.8 |
1.7.5 |
AntiSamy is a library for performing fast, configurable cleansing of H ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23635
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-02 17:15 修改: 2024-02-10 01:38
|
org.owasp.antisamy:antisamy |
CVE-2024-23635 |
中危 |
1.5.8 |
1.7.5 |
AntiSamy is a library for performing fast, configurable cleansing of H ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23635
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-02 17:15 修改: 2024-02-10 01:38
|
commons-httpclient:commons-httpclient |
CVE-2012-5783 |
中危 |
3.1-atlassian-2 |
4.0 |
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-5783
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2012-11-04 22:55 修改: 2021-04-23 17:28
|
commons-httpclient:commons-httpclient |
CVE-2012-5783 |
中危 |
3.1-atlassian-2 |
4.0 |
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-5783
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2012-11-04 22:55 修改: 2021-04-23 17:28
|
com.thoughtworks.xstream:xstream |
CVE-2021-39140 |
中危 |
1.4.17 |
1.4.18 |
xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39140
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-08-23 19:15 修改: 2023-11-07 03:37
|
org.postgresql:postgresql |
CVE-2022-41946 |
中危 |
42.2.18 |
42.2.27, 42.3.8, 42.4.3, 42.5.1 |
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41946
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-11-23 20:15 修改: 2024-03-29 13:15
|
org.postgresql:postgresql |
GHSA-673j-qm5f-xpv8 |
中危 |
42.2.18 |
42.3.3 |
pgjdbc Arbitrary File Write Vulnerability
漏洞详情: https://github.com/advisories/GHSA-673j-qm5f-xpv8
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.apache.tomcat:tomcat-coyote |
CVE-2023-44487 |
中危 |
9.0.54 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-10-10 14:15 修改: 2024-12-20 17:40
|
org.apache.tomcat:tomcat-coyote |
CVE-2024-24549 |
中危 |
9.0.54 |
11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 |
Tomcat: HTTP/2 header handling DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24549
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-13 16:15 修改: 2024-11-04 22:35
|
com.hazelcast:hazelcast |
CVE-2023-33264 |
中危 |
3.12.11 |
5.3.0 |
hazelcast: Improper password mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33264
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-05-22 01:15 修改: 2023-06-02 17:41
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
26.0-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
org.postgresql:postgresql |
CVE-2022-41946 |
中危 |
42.4.0 |
42.2.27, 42.3.8, 42.4.3, 42.5.1 |
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41946
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-11-23 20:15 修改: 2024-03-29 13:15
|
org.postgresql:postgresql |
CVE-2022-41946 |
中危 |
42.4.0 |
42.2.27, 42.3.8, 42.4.3, 42.5.1 |
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41946
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-11-23 20:15 修改: 2024-03-29 13:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
26.0-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
ognl:ognl |
CVE-2016-3093 |
中危 |
2.6.5-atlassian-3 |
3.0.12 |
struts: OGNL cache poisoning can lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3093
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2016-06-07 18:59 修改: 2023-02-12 23:18
|
org.springframework.ldap:spring-ldap-core |
CVE-2024-38829 |
中危 |
2.3.3.RELEASE |
3.2.8, 2.4.4 |
spring-ldap: Spring LDAP sensitive data exposure for case-sensitive comparisons
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38829
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-12-04 21:15 修改: 2024-12-10 15:15
|
opensymphony:xwork |
CVE-2007-4556 |
中危 |
1.0.3-atlassian-10 |
1.2.3, 2.0.4 |
OpenSymphony XWork vulnerable to improper input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2007-4556
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2007-08-28 01:17 修改: 2018-10-26 14:00
|
opensymphony:xwork |
CVE-2007-4556 |
中危 |
1.0.3-atlassian-11 |
1.2.3, 2.0.4 |
OpenSymphony XWork vulnerable to improper input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2007-4556
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2007-08-28 01:17 修改: 2018-10-26 14:00
|
org.apache.tomcat:tomcat-coyote |
CVE-2023-44487 |
中危 |
9.0.63 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-10-10 14:15 修改: 2024-12-20 17:40
|
org.apache.tomcat:tomcat-coyote |
CVE-2023-44487 |
中危 |
9.0.63 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-10-10 14:15 修改: 2024-12-20 17:40
|
org.springframework.security:spring-security-core |
CVE-2024-38827 |
中危 |
4.2.16.RELEASE |
5.7.14, 5.8.16, 6.0.14, 6.1.12, 6.2.8, 6.3.5 |
spring-security: authorization bypass for case sensitive comparisons
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38827
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-12-02 15:15 修改: 2024-12-02 15:15
|
org.springframework.security:spring-security-core |
CVE-2024-38827 |
中危 |
4.2.16.RELEASE |
5.7.14, 5.8.16, 6.0.14, 6.1.12, 6.2.8, 6.3.5 |
spring-security: authorization bypass for case sensitive comparisons
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38827
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-12-02 15:15 修改: 2024-12-02 15:15
|
org.apache.tomcat:tomcat-coyote |
CVE-2024-24549 |
中危 |
9.0.63 |
11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 |
Tomcat: HTTP/2 header handling DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24549
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-13 16:15 修改: 2024-11-04 22:35
|
org.apache.tomcat:tomcat-coyote |
CVE-2024-24549 |
中危 |
9.0.63 |
11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 |
Tomcat: HTTP/2 header handling DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24549
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-03-13 16:15 修改: 2024-11-04 22:35
|
opensymphony:xwork |
CVE-2007-4556 |
中危 |
1.0.3-atlassian-11 |
1.2.3, 2.0.4 |
OpenSymphony XWork vulnerable to improper input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2007-4556
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2007-08-28 01:17 修改: 2018-10-26 14:00
|
opensymphony:xwork |
CVE-2007-4556 |
中危 |
1.0.3-atlassian-8 |
1.2.3, 2.0.4 |
OpenSymphony XWork vulnerable to improper input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2007-4556
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2007-08-28 01:17 修改: 2018-10-26 14:00
|
org.apache.ant:ant |
CVE-2021-36373 |
中危 |
1.10.9 |
1.9.16, 1.10.11 |
ant: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36373
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-07-14 07:15 修改: 2023-11-07 03:36
|
org.apache.ant:ant |
CVE-2021-36373 |
中危 |
1.10.9 |
1.9.16, 1.10.11 |
ant: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36373
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-07-14 07:15 修改: 2023-11-07 03:36
|
org.apache.ant:ant |
CVE-2021-36374 |
中危 |
1.10.9 |
1.9.16, 1.10.11 |
ant: excessive memory allocation when reading a specially crafted ZIP archive or a derived formats
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36374
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-07-14 07:15 修改: 2023-11-07 03:36
|
org.springframework:spring-context |
CVE-2024-38820 |
中危 |
5.1.18.RELEASE |
6.1.14 |
The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-10-18 06:15 修改: 2024-11-29 12:15
|
org.apache.ant:ant |
CVE-2021-36374 |
中危 |
1.10.9 |
1.9.16, 1.10.11 |
ant: excessive memory allocation when reading a specially crafted ZIP archive or a derived formats
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36374
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-07-14 07:15 修改: 2023-11-07 03:36
|
org.springframework:spring-context |
CVE-2024-38820 |
中危 |
5.3.11 |
6.1.14 |
The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-10-18 06:15 修改: 2024-11-29 12:15
|
org.springframework:spring-context |
CVE-2024-38820 |
中危 |
5.3.19 |
6.1.14 |
The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-10-18 06:15 修改: 2024-11-29 12:15
|
org.springframework:spring-context |
CVE-2024-38820 |
中危 |
5.3.19 |
6.1.14 |
The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-10-18 06:15 修改: 2024-11-29 12:15
|
org.springframework:spring-context |
CVE-2024-38820 |
中危 |
5.3.21 |
6.1.14 |
The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-10-18 06:15 修改: 2024-11-29 12:15
|
org.springframework:spring-context |
CVE-2024-38820 |
中危 |
5.3.21 |
6.1.14 |
The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-10-18 06:15 修改: 2024-11-29 12:15
|
org.springframework:spring-core |
CVE-2021-22060 |
中危 |
5.3.11 |
5.3.14, 5.2.19 |
springframework: Additional Log Injection in Spring Framework (follow-up to CVE-2021-22096)
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22060
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-01-10 14:10 修改: 2022-05-13 15:52
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
30.1.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
org.springframework:spring-expression |
CVE-2022-22950 |
中危 |
5.1.18.RELEASE |
5.3.17, 5.2.20.RELEASE |
spring-expression: Denial of service via specially crafted SpEL expression
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22950
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-04-01 23:15 修改: 2022-06-22 13:53
|
org.springframework:spring-expression |
CVE-2023-20861 |
中危 |
5.1.18.RELEASE |
6.0.7, 5.3.26, 5.2.23.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20861
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-23 21:15 修改: 2023-04-20 09:15
|
org.springframework:spring-expression |
CVE-2024-38808 |
中危 |
5.1.18.RELEASE |
5.3.39 |
spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38808
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-08-20 08:15 修改: 2024-10-30 19:35
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
30.1.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
org.springframework:spring-expression |
CVE-2022-22950 |
中危 |
5.3.11 |
5.3.17, 5.2.20.RELEASE |
spring-expression: Denial of service via specially crafted SpEL expression
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22950
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-04-01 23:15 修改: 2022-06-22 13:53
|
org.springframework:spring-expression |
CVE-2023-20861 |
中危 |
5.3.11 |
6.0.7, 5.3.26, 5.2.23.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20861
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-23 21:15 修改: 2023-04-20 09:15
|
org.springframework:spring-expression |
CVE-2024-38808 |
中危 |
5.3.11 |
5.3.39 |
spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38808
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-08-20 08:15 修改: 2024-10-30 19:35
|
org.apache.tomcat:tomcat-websocket |
CVE-2024-23672 |
中危 |
9.0.45 |
11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 |
Tomcat: WebSocket DoS with incomplete closing handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23672
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-13 16:15 修改: 2024-11-18 22:35
|
org.apache.tomcat:tomcat-websocket |
CVE-2024-23672 |
中危 |
9.0.54 |
11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 |
Tomcat: WebSocket DoS with incomplete closing handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23672
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-13 16:15 修改: 2024-11-18 22:35
|
org.springframework:spring-expression |
CVE-2023-20861 |
中危 |
5.3.19 |
6.0.7, 5.3.26, 5.2.23.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20861
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-23 21:15 修改: 2023-04-20 09:15
|
org.springframework:spring-expression |
CVE-2023-20861 |
中危 |
5.3.19 |
6.0.7, 5.3.26, 5.2.23.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20861
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-23 21:15 修改: 2023-04-20 09:15
|
org.springframework:spring-expression |
CVE-2024-38808 |
中危 |
5.3.19 |
5.3.39 |
spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38808
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-08-20 08:15 修改: 2024-10-30 19:35
|
org.springframework:spring-expression |
CVE-2024-38808 |
中危 |
5.3.19 |
5.3.39 |
spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38808
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-08-20 08:15 修改: 2024-10-30 19:35
|
org.apache.tomcat:tomcat-websocket |
CVE-2024-23672 |
中危 |
9.0.63 |
11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 |
Tomcat: WebSocket DoS with incomplete closing handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23672
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-13 16:15 修改: 2024-11-18 22:35
|
org.apache.tomcat:tomcat-websocket |
CVE-2024-23672 |
中危 |
9.0.63 |
11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 |
Tomcat: WebSocket DoS with incomplete closing handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23672
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-03-13 16:15 修改: 2024-11-18 22:35
|
org.springframework:spring-expression |
CVE-2023-20861 |
中危 |
5.3.21 |
6.0.7, 5.3.26, 5.2.23.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20861
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-03-23 21:15 修改: 2023-04-20 09:15
|
org.springframework:spring-expression |
CVE-2023-20861 |
中危 |
5.3.21 |
6.0.7, 5.3.26, 5.2.23.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20861
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-03-23 21:15 修改: 2023-04-20 09:15
|
org.springframework:spring-expression |
CVE-2024-38808 |
中危 |
5.3.21 |
5.3.39 |
spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38808
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-08-20 08:15 修改: 2024-10-30 19:35
|
org.springframework:spring-expression |
CVE-2024-38808 |
中危 |
5.3.21 |
5.3.39 |
spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38808
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-08-20 08:15 修改: 2024-10-30 19:35
|
io.netty:netty-codec-http |
CVE-2021-43797 |
中危 |
4.1.65.Final |
4.1.71.Final |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty-codec-http |
CVE-2022-24823 |
中危 |
4.1.65.Final |
4.1.77.Final |
netty: world readable temporary file containing sensitive data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24823
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-05-06 12:15 修改: 2022-12-03 14:25
|
org.apache.velocity:velocity-tools |
CVE-2020-13959 |
中危 |
1.4 |
|
velocity: XSS in the default error page for VelocityView
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13959
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-03-10 08:15 修改: 2023-11-07 03:17
|
io.netty:netty-codec-http |
CVE-2024-29025 |
中危 |
4.1.65.Final |
4.1.108.Final |
netty-codec-http: Allocation of Resources Without Limits or Throttling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29025
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-25 20:15 修改: 2024-06-21 22:15
|
org.springframework:spring-web |
CVE-2024-38809 |
中危 |
5.1.18.RELEASE |
5.3.38, 6.0.23, 6.1.12 |
org.springframework:spring-web: Spring Framework DoS via conditional HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45
|
io.netty:netty-codec-http |
CVE-2024-29025 |
中危 |
4.1.77.Final |
4.1.108.Final |
netty-codec-http: Allocation of Resources Without Limits or Throttling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29025
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-25 20:15 修改: 2024-06-21 22:15
|
org.apache.xmlgraphics:batik-script |
CVE-2022-44730 |
中危 |
1.14 |
1.17 |
batik: Server-Side Request Forgery vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44730
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15
|
org.apache.xmlgraphics:batik-script |
CVE-2022-44730 |
中危 |
1.14 |
1.17 |
batik: Server-Side Request Forgery vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44730
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15
|
io.netty:netty-codec-http |
CVE-2024-29025 |
中危 |
4.1.77.Final |
4.1.108.Final |
netty-codec-http: Allocation of Resources Without Limits or Throttling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29025
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-03-25 20:15 修改: 2024-06-21 22:15
|
org.springframework:spring-web |
CVE-2024-38809 |
中危 |
5.3.11 |
5.3.38, 6.0.23, 6.1.12 |
org.springframework:spring-web: Spring Framework DoS via conditional HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45
|
io.netty:netty-common |
CVE-2024-47535 |
中危 |
4.1.65.Final |
4.1.115 |
netty: Denial of Service attack on windows app using Netty
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01
|
io.netty:netty-common |
CVE-2024-47535 |
中危 |
4.1.77.Final |
4.1.115 |
netty: Denial of Service attack on windows app using Netty
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01
|
io.netty:netty-common |
CVE-2024-47535 |
中危 |
4.1.77.Final |
4.1.115 |
netty: Denial of Service attack on windows app using Netty
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01
|
org.bitbucket.b_c:jose4j |
CVE-2023-51775 |
中危 |
0.6.3 |
0.9.4 |
jose4j: denial of service via specially crafted JWE
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51775
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-29 01:42 修改: 2024-08-14 19:35
|
org.bitbucket.b_c:jose4j |
CVE-2023-51775 |
中危 |
0.6.3 |
0.9.4 |
jose4j: denial of service via specially crafted JWE
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51775
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-29 01:42 修改: 2024-08-14 19:35
|
org.bitbucket.b_c:jose4j |
GHSA-jgvc-jfgh-rjvv |
中危 |
0.6.3 |
0.9.3 |
Chosen Ciphertext Attack in Jose4j
漏洞详情: https://github.com/advisories/GHSA-jgvc-jfgh-rjvv
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.bitbucket.b_c:jose4j |
GHSA-jgvc-jfgh-rjvv |
中危 |
0.6.3 |
0.9.3 |
Chosen Ciphertext Attack in Jose4j
漏洞详情: https://github.com/advisories/GHSA-jgvc-jfgh-rjvv
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.bouncycastle:bcprov-jdk15on |
CVE-2023-33201 |
中危 |
1.68 |
|
bouncycastle: potential blind LDAP injection attack using a self-signed certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33201
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-07-05 03:15 修改: 2023-08-24 19:15
|
org.springframework:spring-web |
CVE-2024-38809 |
中危 |
5.3.19 |
5.3.38, 6.0.23, 6.1.12 |
org.springframework:spring-web: Spring Framework DoS via conditional HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45
|
org.springframework:spring-web |
CVE-2024-38809 |
中危 |
5.3.19 |
5.3.38, 6.0.23, 6.1.12 |
org.springframework:spring-web: Spring Framework DoS via conditional HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45
|
org.bouncycastle:bcprov-jdk15on |
CVE-2023-33201 |
中危 |
1.68 |
|
bouncycastle: potential blind LDAP injection attack using a self-signed certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33201
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-07-05 03:15 修改: 2023-08-24 19:15
|
org.bouncycastle:bcprov-jdk15on |
CVE-2023-33202 |
中危 |
1.68 |
1.70 |
bc-java: Out of memory while parsing ASN.1 crafted data in org.bouncycastle.openssl.PEMParser class
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33202
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-11-23 16:15 修改: 2024-09-09 13:53
|
org.bouncycastle:bcprov-jdk15on |
CVE-2023-33202 |
中危 |
1.68 |
1.70 |
bc-java: Out of memory while parsing ASN.1 crafted data in org.bouncycastle.openssl.PEMParser class
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33202
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-11-23 16:15 修改: 2024-09-09 13:53
|
org.bouncycastle:bcprov-jdk15on |
CVE-2024-29857 |
中危 |
1.68 |
1.78 |
org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29857
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-05-14 15:17 修改: 2024-12-06 14:15
|
org.bouncycastle:bcprov-jdk15on |
CVE-2024-29857 |
中危 |
1.68 |
1.78 |
org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29857
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-05-14 15:17 修改: 2024-12-06 14:15
|
org.bouncycastle:bcprov-jdk15on |
CVE-2024-30171 |
中危 |
1.68 |
1.78 |
bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-30171
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-05-14 15:21 修改: 2024-08-19 18:35
|
org.bouncycastle:bcprov-jdk15on |
CVE-2024-30171 |
中危 |
1.68 |
1.78 |
bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-30171
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-05-14 15:21 修改: 2024-08-19 18:35
|
io.netty:netty-handler |
CVE-2023-34462 |
中危 |
4.1.65.Final |
4.1.94.Final |
netty: SniHandler 16MB allocation leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34462
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-06-22 23:15 修改: 2024-06-21 19:15
|
org.springframework:spring-web |
CVE-2024-38809 |
中危 |
5.3.21 |
5.3.38, 6.0.23, 6.1.12 |
org.springframework:spring-web: Spring Framework DoS via conditional HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45
|
org.springframework:spring-web |
CVE-2024-38809 |
中危 |
5.3.21 |
5.3.38, 6.0.23, 6.1.12 |
org.springframework:spring-web: Spring Framework DoS via conditional HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45
|
io.netty:netty-handler |
CVE-2023-34462 |
中危 |
4.1.77.Final |
4.1.94.Final |
netty: SniHandler 16MB allocation leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34462
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-06-22 23:15 修改: 2024-06-21 19:15
|
org.apache.commons:commons-compress |
CVE-2024-26308 |
中危 |
1.21 |
1.26.0 |
commons-compress: OutOfMemoryError unpacking broken Pack200 file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26308
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-02-19 09:15 修改: 2024-03-21 19:54
|
org.apache.commons:commons-compress |
CVE-2024-26308 |
中危 |
1.21 |
1.26.0 |
commons-compress: OutOfMemoryError unpacking broken Pack200 file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26308
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-19 09:15 修改: 2024-03-21 19:54
|
org.apache.commons:commons-compress |
CVE-2024-26308 |
中危 |
1.21 |
1.26.0 |
commons-compress: OutOfMemoryError unpacking broken Pack200 file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26308
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-02-19 09:15 修改: 2024-03-21 19:54
|
io.netty:netty-handler |
CVE-2023-34462 |
中危 |
4.1.77.Final |
4.1.94.Final |
netty: SniHandler 16MB allocation leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34462
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-06-22 23:15 修改: 2024-06-21 19:15
|
org.springframework:spring-webmvc |
CVE-2024-38828 |
中危 |
5.3.11 |
5.3.42 |
org.springframework:spring-webmvc: DoS via Spring MVC controller method with byte[] parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38828
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-11-18 04:15 修改: 2024-11-18 17:11
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.2.1 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
org.apache.commons:commons-configuration2 |
CVE-2024-29131 |
中危 |
2.7 |
2.10.1 |
commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29131
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-21 09:15 修改: 2024-12-13 14:15
|
org.apache.commons:commons-configuration2 |
CVE-2024-29131 |
中危 |
2.7 |
2.10.1 |
commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29131
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-03-21 09:15 修改: 2024-12-13 14:15
|
org.apache.commons:commons-configuration2 |
CVE-2024-29133 |
中危 |
2.7 |
2.10.1 |
commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29133
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-03-21 09:15 修改: 2024-11-04 17:35
|
org.springframework:spring-webmvc |
CVE-2024-38828 |
中危 |
5.3.19 |
5.3.42 |
org.springframework:spring-webmvc: DoS via Spring MVC controller method with byte[] parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38828
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-11-18 04:15 修改: 2024-11-18 17:11
|
org.springframework:spring-webmvc |
CVE-2024-38828 |
中危 |
5.3.19 |
5.3.42 |
org.springframework:spring-webmvc: DoS via Spring MVC controller method with byte[] parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38828
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-11-18 04:15 修改: 2024-11-18 17:11
|
org.apache.commons:commons-configuration2 |
CVE-2024-29133 |
中危 |
2.7 |
2.10.1 |
commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29133
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-03-21 09:15 修改: 2024-11-04 17:35
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.2.1 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
ch.qos.logback:logback-core |
CVE-2024-12798 |
中危 |
1.2.3 |
1.5.13, 1.3.15 |
logback-core: arbitrary code execution via JaninoEventEvaluator
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12798
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-12-19 16:15 修改: 2025-01-03 14:15
|
ch.qos.logback:logback-core |
CVE-2021-42550 |
中危 |
1.2.3 |
1.2.9 |
logback: remote code execution through JNDI call from within its configuration file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42550
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-12-16 19:15 修改: 2022-12-12 21:13
|
org.springframework:spring-webmvc |
CVE-2024-38828 |
中危 |
5.3.21 |
5.3.42 |
org.springframework:spring-webmvc: DoS via Spring MVC controller method with byte[] parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38828
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-11-18 04:15 修改: 2024-11-18 17:11
|
org.springframework:spring-webmvc |
CVE-2024-38828 |
中危 |
5.3.21 |
5.3.42 |
org.springframework:spring-webmvc: DoS via Spring MVC controller method with byte[] parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38828
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-11-18 04:15 修改: 2024-11-18 17:11
|
ch.qos.logback:logback-core |
CVE-2021-42550 |
中危 |
1.2.3 |
1.2.9 |
logback: remote code execution through JNDI call from within its configuration file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42550
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2021-12-16 19:15 修改: 2022-12-12 21:13
|
net.lingala.zip4j:zip4j |
CVE-2022-24615 |
中危 |
2.2.3 |
2.10.0 |
zip4j: Uncaught exceptions while parsing a specially crafted ZIP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24615
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-02-24 15:15 修改: 2022-04-19 04:03
|
org.xerial.snappy:snappy-java |
CVE-2023-34453 |
中危 |
1.1.1.7 |
1.1.10.1 |
snappy-java: Integer overflow in shuffle leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59
|
org.xerial.snappy:snappy-java |
CVE-2023-34454 |
中危 |
1.1.1.7 |
1.1.10.1 |
snappy-java: Integer overflow in compress leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-06-15 17:15 修改: 2024-12-12 17:15
|
net.lingala.zip4j:zip4j |
CVE-2022-24615 |
中危 |
2.2.3 |
2.10.0 |
zip4j: Uncaught exceptions while parsing a specially crafted ZIP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24615
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-02-24 15:15 修改: 2022-04-19 04:03
|
net.lingala.zip4j:zip4j |
CVE-2023-22899 |
中危 |
2.2.3 |
2.11.3 |
zip4j: does not always check the MAC when decrypting a ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22899
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-01-10 02:15 修改: 2023-01-30 16:24
|
org.xerial.snappy:snappy-java |
CVE-2023-34453 |
中危 |
1.1.7.3 |
1.1.10.1 |
snappy-java: Integer overflow in shuffle leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59
|
org.xerial.snappy:snappy-java |
CVE-2023-34454 |
中危 |
1.1.7.3 |
1.1.10.1 |
snappy-java: Integer overflow in compress leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-06-15 17:15 修改: 2024-12-12 17:15
|
net.lingala.zip4j:zip4j |
CVE-2023-22899 |
中危 |
2.2.3 |
2.11.3 |
zip4j: does not always check the MAC when decrypting a ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22899
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-01-10 02:15 修改: 2023-01-30 16:24
|
ch.qos.logback:logback-core |
CVE-2024-12798 |
中危 |
1.2.3 |
1.5.13, 1.3.15 |
logback-core: arbitrary code execution via JaninoEventEvaluator
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12798
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-12-19 16:15 修改: 2025-01-03 14:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
26.0-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.4.1 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.yaml:snakeyaml |
CVE-2022-38749 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38749
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38749 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38749
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38750 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38750
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38750 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38750
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38751 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38751
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38751 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38751
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38752 |
中危 |
1.26 |
1.32 |
snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38752 |
中危 |
1.26 |
1.32 |
snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-41854 |
中危 |
1.26 |
1.32 |
dev-java/snakeyaml: DoS via stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15
|
org.yaml:snakeyaml |
CVE-2022-41854 |
中危 |
1.26 |
1.32 |
dev-java/snakeyaml: DoS via stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.3 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.5 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
com.hazelcast:hazelcast |
CVE-2023-33264 |
中危 |
3.11.4 |
5.3.0 |
hazelcast: Improper password mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33264
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-05-22 01:15 修改: 2023-06-02 17:41
|
com.hazelcast:hazelcast |
CVE-2023-33264 |
中危 |
3.12.11 |
5.3.0 |
hazelcast: Improper password mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33264
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-05-22 01:15 修改: 2023-06-02 17:41
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.4.41.v20210516 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.4.43.v20210629 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.4.43.v20210629 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
ch.qos.logback:logback-core |
CVE-2024-12801 |
低危 |
1.2.3 |
1.5.13, 1.3.15 |
logback-core: SaxEventRecorder vulnerable to Server-Side Request Forgery (SSRF) attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12801
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2024-12-19 17:15 修改: 2025-01-03 14:15
|
ch.qos.logback:logback-core |
CVE-2024-12801 |
低危 |
1.2.3 |
1.5.13, 1.3.15 |
logback-core: SaxEventRecorder vulnerable to Server-Side Request Forgery (SSRF) attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12801
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2024-12-19 17:15 修改: 2025-01-03 14:15
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
30.1.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.4.39.v20210325 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.4.43.v20210629 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.4.43.v20210629 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
30.1.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
26.0-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
org.postgresql:postgresql |
CVE-2022-26520 |
低危 |
42.2.18 |
42.3.3 |
postgresql-jdbc: Arbitrary File Write Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26520
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-03-10 17:47 修改: 2024-08-03 05:16
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
9.4.39.v20210325 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.4.39.v20210325 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
26.0-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
26.0-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:11c33f7e8be115416588045d5837d076171f2b0be0c262cffb7b7aaf9c7b19f9
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.4.41.v20210516 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:1e763e863bfe00cae3c5ffc43aee43dc6fef4ef3ab10ecdbc936eb08cc225237
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|