docker.io/cooderl/wewe-rss-sqlite:v2.6.1 linux/amd64

docker.io/cooderl/wewe-rss-sqlite:v2.6.1 - Trivy安全扫描结果 扫描时间: 2025-02-12 02:56
全部漏洞信息
低危漏洞:6 中危漏洞:5 高危漏洞:8 严重漏洞:0

系统OS: alpine 3.20.2 扫描引擎: Trivy 扫描时间: 2025-02-12 02:56

docker.io/cooderl/wewe-rss-sqlite:v2.6.1 (alpine 3.20.2) (alpine)
低危漏洞:2 中危漏洞:2 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
libcrypto3 CVE-2024-6119 中危 3.3.1-r3 3.3.2-r0 openssl: Possible denial of service in X.509 name checks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119

镜像层: sha256:78561cef0761903dd2f7d09856150a6d4fb48967a8f113f3e33d79effbf59a07

发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35

libssl3 CVE-2024-6119 中危 3.3.1-r3 3.3.2-r0 openssl: Possible denial of service in X.509 name checks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119

镜像层: sha256:78561cef0761903dd2f7d09856150a6d4fb48967a8f113f3e33d79effbf59a07

发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35

libcrypto3 CVE-2024-9143 低危 3.3.1-r3 3.3.2-r1 openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143

镜像层: sha256:78561cef0761903dd2f7d09856150a6d4fb48967a8f113f3e33d79effbf59a07

发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35

libssl3 CVE-2024-9143 低危 3.3.1-r3 3.3.2-r1 openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143

镜像层: sha256:78561cef0761903dd2f7d09856150a6d4fb48967a8f113f3e33d79effbf59a07

发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35

Node.js (node-pkg)
低危漏洞:4 中危漏洞:3 高危漏洞:8 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
axios CVE-2024-39338 高危 1.6.7 1.7.4 axios: axios: Server-Side Request Forgery

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39338

镜像层: sha256:2aa831e19e6fef2d7bf9daa9e9b08ad7da21e3b6f253c4415cf37c0aab2aa66d

发布日期: 2024-08-12 13:38 修改: 2024-08-23 18:35

body-parser CVE-2024-45590 高危 1.20.1 1.20.3 body-parser: Denial of Service Vulnerability in body-parser

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45590

镜像层: sha256:2aa831e19e6fef2d7bf9daa9e9b08ad7da21e3b6f253c4415cf37c0aab2aa66d

发布日期: 2024-09-10 16:15 修改: 2024-09-20 16:26

body-parser CVE-2024-45590 高危 1.20.2 1.20.3 body-parser: Denial of Service Vulnerability in body-parser

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45590

镜像层: sha256:2aa831e19e6fef2d7bf9daa9e9b08ad7da21e3b6f253c4415cf37c0aab2aa66d

发布日期: 2024-09-10 16:15 修改: 2024-09-20 16:26

cross-spawn CVE-2024-21538 高危 7.0.3 7.0.5, 6.0.6 cross-spawn: regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538

镜像层: sha256:aba337309a792c08ec970f9184f11e38ff21240b0cf3a36fc31ba971e03c722f

发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15

cross-spawn CVE-2024-21538 高危 7.0.3 7.0.5, 6.0.6 cross-spawn: regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538

镜像层: sha256:c815a7557ad44db637eefb40233a7ec3bc6c3a213d176101363754a86278317a

发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15

html-minifier CVE-2022-37620 高危 4.0.0 kangax html-minifier REDoS vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37620

镜像层: sha256:2aa831e19e6fef2d7bf9daa9e9b08ad7da21e3b6f253c4415cf37c0aab2aa66d

发布日期: 2022-10-31 12:15 修改: 2024-11-04 16:52

path-to-regexp CVE-2024-45296 高危 0.1.7 1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0 path-to-regexp: Backtracking regular expressions cause ReDoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45296

镜像层: sha256:2aa831e19e6fef2d7bf9daa9e9b08ad7da21e3b6f253c4415cf37c0aab2aa66d

发布日期: 2024-09-09 19:15 修改: 2024-09-10 12:09

path-to-regexp CVE-2024-45296 高危 3.2.0 1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0 path-to-regexp: Backtracking regular expressions cause ReDoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45296

镜像层: sha256:2aa831e19e6fef2d7bf9daa9e9b08ad7da21e3b6f253c4415cf37c0aab2aa66d

发布日期: 2024-09-09 19:15 修改: 2024-09-10 12:09

follow-redirects CVE-2024-28849 中危 1.15.5 1.15.6 follow-redirects: Possible credential leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28849

镜像层: sha256:2aa831e19e6fef2d7bf9daa9e9b08ad7da21e3b6f253c4415cf37c0aab2aa66d

发布日期: 2024-03-14 17:15 修改: 2024-03-23 03:15

path-to-regexp CVE-2024-52798 中危 0.1.7 0.1.12 path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52798

镜像层: sha256:2aa831e19e6fef2d7bf9daa9e9b08ad7da21e3b6f253c4415cf37c0aab2aa66d

发布日期: 2024-12-05 23:15 修改: 2024-12-05 23:15

express CVE-2024-29041 中危 4.18.2 4.19.2, 5.0.0-beta.3 express: cause malformed URLs to be evaluated

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29041

镜像层: sha256:2aa831e19e6fef2d7bf9daa9e9b08ad7da21e3b6f253c4415cf37c0aab2aa66d

发布日期: 2024-03-25 21:15 修改: 2024-03-26 12:55

express CVE-2024-43796 低危 4.18.2 4.20.0, 5.0.0 express: Improper Input Handling in Express Redirects

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43796

镜像层: sha256:2aa831e19e6fef2d7bf9daa9e9b08ad7da21e3b6f253c4415cf37c0aab2aa66d

发布日期: 2024-09-10 15:15 修改: 2024-09-20 16:07

cookie CVE-2024-47764 低危 0.5.0 0.7.0 cookie: cookie accepts cookie name, path, and domain with out of bounds characters

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47764

镜像层: sha256:2aa831e19e6fef2d7bf9daa9e9b08ad7da21e3b6f253c4415cf37c0aab2aa66d

发布日期: 2024-10-04 20:15 修改: 2024-10-07 17:48

send CVE-2024-43799 低危 0.18.0 0.19.0 send: Code Execution Vulnerability in Send Library

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43799

镜像层: sha256:2aa831e19e6fef2d7bf9daa9e9b08ad7da21e3b6f253c4415cf37c0aab2aa66d

发布日期: 2024-09-10 15:15 修改: 2024-09-20 16:57

serve-static CVE-2024-43800 低危 1.15.0 1.16.0, 2.1.0 serve-static: Improper Sanitization in serve-static

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43800

镜像层: sha256:2aa831e19e6fef2d7bf9daa9e9b08ad7da21e3b6f253c4415cf37c0aab2aa66d

发布日期: 2024-09-10 15:15 修改: 2024-09-20 17:36