| Flask | CVE-2023-30861 | 高危 | 1.1.2 | 2.3.2, 2.2.5 | flask: Possible disclosure of permanent session cookie due to missing Vary: Cookie header 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30861 镜像层: sha256:99ce9c49314a8ba567f8e5a0d2a7c389937edc1af36a7c286ac1d4d683589b74 发布日期: 2023-05-02 18:15 修改: 2023-08-20 21:15 | 
                            
                            
                                | Pygments | CVE-2021-20270 | 高危 | 2.6.1 | 2.7.4 | python-pygments: Infinite loop in SML lexer may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20270 镜像层: sha256:99ce9c49314a8ba567f8e5a0d2a7c389937edc1af36a7c286ac1d4d683589b74 发布日期: 2021-03-23 17:15 修改: 2021-12-10 17:04 | 
                            
                            
                                | Pygments | CVE-2021-27291 | 高危 | 2.6.1 | 2.7.4 | python-pygments: ReDoS in multiple lexers 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27291 镜像层: sha256:99ce9c49314a8ba567f8e5a0d2a7c389937edc1af36a7c286ac1d4d683589b74 发布日期: 2021-03-17 13:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | Werkzeug | CVE-2023-25577 | 高危 | 1.0.1 | 2.2.3 | python-werkzeug: high resource usage when parsing multipart form data with many fields 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25577 镜像层: sha256:99ce9c49314a8ba567f8e5a0d2a7c389937edc1af36a7c286ac1d4d683589b74 发布日期: 2023-02-14 20:15 修改: 2023-08-18 14:15 | 
                            
                            
                                | Werkzeug | CVE-2024-34069 | 高危 | 1.0.1 | 3.0.3 | python-werkzeug: user may execute code on a developer's machine 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34069 镜像层: sha256:99ce9c49314a8ba567f8e5a0d2a7c389937edc1af36a7c286ac1d4d683589b74 发布日期: 2024-05-06 15:15 修改: 2024-06-14 13:15 | 
                            
                            
                                | pip | CVE-2019-20916 | 高危 | 19.0.1 | 19.2 | python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20916 镜像层: sha256:5fa31f02caa84921b7b728c6b2d3b709f5f2af697cd9fc543bc1c272db5ddbcc 发布日期: 2020-09-04 20:15 修改: 2024-02-08 02:04 | 
                            
                            
                                | pip | CVE-2021-3572 | 高危 | 19.0.1 | 21.1 | python-pip: Incorrect handling of unicode separators in git references 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3572 镜像层: sha256:5fa31f02caa84921b7b728c6b2d3b709f5f2af697cd9fc543bc1c272db5ddbcc 发布日期: 2021-11-10 18:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | setuptools | CVE-2022-40897 | 高危 | 40.7.1 | 65.5.1 | pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40897 镜像层: sha256:5fa31f02caa84921b7b728c6b2d3b709f5f2af697cd9fc543bc1c272db5ddbcc 发布日期: 2022-12-23 00:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | setuptools | CVE-2024-6345 | 高危 | 40.7.1 | 70.0.0 | pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345 镜像层: sha256:5fa31f02caa84921b7b728c6b2d3b709f5f2af697cd9fc543bc1c272db5ddbcc 发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00 | 
                            
                            
                                | sqlite-web | CVE-2021-23404 | 高危 | 0.3.7 |  | Cross-Site Request Forgery in sqlite-web 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23404 镜像层: sha256:99ce9c49314a8ba567f8e5a0d2a7c389937edc1af36a7c286ac1d4d683589b74 发布日期: 2021-09-08 11:15 修改: 2021-09-14 13:43 | 
                            
                            
                                | wheel | CVE-2022-40898 | 高危 | 0.32.3 | 0.38.1 | python-wheel: remote attackers can cause denial of service via attacker controlled input to wheel cli 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40898 镜像层: sha256:5fa31f02caa84921b7b728c6b2d3b709f5f2af697cd9fc543bc1c272db5ddbcc 发布日期: 2022-12-23 00:15 修改: 2022-12-30 22:15 | 
                            
                            
                                | Werkzeug | CVE-2024-49767 | 中危 | 1.0.1 | 3.0.6 | werkzeug: python-werkzeug: Werkzeug possible resource exhaustion when parsing file data in forms 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49767 镜像层: sha256:99ce9c49314a8ba567f8e5a0d2a7c389937edc1af36a7c286ac1d4d683589b74 发布日期: 2024-10-25 20:15 修改: 2024-10-25 20:15 | 
                            
                            
                                | Jinja2 | CVE-2024-22195 | 中危 | 2.11.2 | 3.1.3 | jinja2: HTML attribute injection when passing user input as keys to xmlattr filter 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22195 镜像层: sha256:99ce9c49314a8ba567f8e5a0d2a7c389937edc1af36a7c286ac1d4d683589b74 发布日期: 2024-01-11 03:15 修改: 2024-01-27 03:15 | 
                            
                            
                                | Pygments | CVE-2022-40896 | 中危 | 2.6.1 | 2.15.0 | pygments: ReDoS in pygments 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40896 镜像层: sha256:99ce9c49314a8ba567f8e5a0d2a7c389937edc1af36a7c286ac1d4d683589b74 发布日期: 2023-07-19 15:15 修改: 2024-03-28 03:15 | 
                            
                            
                                | pip | CVE-2023-5752 | 中危 | 19.0.1 | 23.3 | pip: Mercurial configuration injectable in repo revision when installing via pip 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5752 镜像层: sha256:5fa31f02caa84921b7b728c6b2d3b709f5f2af697cd9fc543bc1c272db5ddbcc 发布日期: 2023-10-25 18:17 修改: 2024-06-10 18:15 | 
                            
                            
                                | Jinja2 | CVE-2024-34064 | 中危 | 2.11.2 | 3.1.4 | jinja2: accepts keys containing non-attribute characters 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34064 镜像层: sha256:99ce9c49314a8ba567f8e5a0d2a7c389937edc1af36a7c286ac1d4d683589b74 发布日期: 2024-05-06 15:15 修改: 2024-06-10 18:15 | 
                            
                            
                                | Jinja2 | CVE-2020-28493 | 中危 | 2.11.2 | 2.11.3 | python-jinja2: ReDoS vulnerability in the urlize filter 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28493 镜像层: sha256:99ce9c49314a8ba567f8e5a0d2a7c389937edc1af36a7c286ac1d4d683589b74 发布日期: 2021-02-01 20:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | Werkzeug | CVE-2023-46136 | 中危 | 1.0.1 | 3.0.1, 2.3.8 | python-werkzeug: high resource consumption leading to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46136 镜像层: sha256:99ce9c49314a8ba567f8e5a0d2a7c389937edc1af36a7c286ac1d4d683589b74 发布日期: 2023-10-25 18:17 修改: 2024-01-10 18:58 | 
                            
                            
                                | Werkzeug | CVE-2024-49766 | 中危 | 1.0.1 | 3.0.6 | werkzeug: python-werkzeug: Werkzeug safe_join not safe on Windows 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49766 镜像层: sha256:99ce9c49314a8ba567f8e5a0d2a7c389937edc1af36a7c286ac1d4d683589b74 发布日期: 2024-10-25 20:15 修改: 2024-10-25 20:15 | 
                            
                            
                                | Werkzeug | CVE-2023-23934 | 低危 | 1.0.1 | 2.2.3 | python-werkzeug: cookie prefixed with = can shadow unprefixed cookie 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23934 镜像层: sha256:99ce9c49314a8ba567f8e5a0d2a7c389937edc1af36a7c286ac1d4d683589b74 发布日期: 2023-02-14 20:15 修改: 2023-08-18 14:15 |