com.cronutils:cron-utils |
CVE-2021-41269 |
严重 |
9.1.5 |
9.1.6 |
cron-utils: template Injection leading to unauthenticated Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41269
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-11-15 21:15 修改: 2021-11-19 16:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.1.1 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.1.1 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.1.1 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.1.1 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.1.1 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.1.1 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.1.1 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.1.1 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.1.1 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.1.1 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.1.1 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.1.1 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.1.1 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.1.1 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.1.1 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.1.1 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.1.1 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.1.1 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.1.1 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.1.1 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.1.1 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.1.1 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.1.1 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.1.1 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.1.1 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.1.1 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.1.1 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.1.1 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.1.1 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.1.1 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.1.1 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.1.1 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.1.1 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.1.1 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.1.1 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.1.1 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.1.1 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.1.1 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.1.1 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.1.1 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.1.1 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.1.1 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.1.1 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.1.1 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.1.1 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.1.1 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.1.1 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.1.1 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.1.1 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.1.1 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.1.1 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.1.1 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.1.1 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.1.1 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.1.1 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.1.1 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.1.1 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.1.1 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.1.1 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.1.1 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.1.1 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.1.1 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.1.1 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.1.1 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.1.1 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.1.1 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.1.1 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.1.1 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.1.1 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.1.1 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.1.1 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.1.1 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.1.1 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.1.1 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.1.1 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.1.1 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.4.0 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.4.0 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.4.0 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.4.0 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.4.0 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.4.0 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.4.0 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.4.0 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.4.0 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.4.0 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.4.0 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.4.0 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.4.0 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.4.0 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.4.0 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.4.0 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.4.0 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.4.0 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.4.0 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.4.0 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.4.0 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.4.0 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.4.0 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.4.0 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.4.0 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.4.0 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.4.0 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.4.0 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.4.0 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.4.0 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.4.0 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.4.0 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.4.0 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.4.0 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.4.0 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.4.0 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.4.0 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.4.0 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.4.0 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.4.0 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.4.0 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.4.0 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.4.0 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.4.0 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.4.0 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.4.0 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.4.0 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.4.0 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.4.0 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.4.0 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.6.5 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.6.5 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.6.5 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.6.5 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.6.5 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.6.5 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.6.5 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.6.5 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.6.5 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.6.5 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.6.5 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.6.5 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.6.5 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.6.5 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.6.5 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.6.5 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.6.5 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.6.5 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.6.5 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.6.5 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.6.5 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.6.5 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.6.5 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.6.5 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.6.5 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.6.5 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.6.5 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.6.5 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.6.5 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.6.5 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.6.5 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.6.5 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.6.5 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.6.5 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.6.5 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.6.5 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.6.5 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.6.5 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.6.5 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.6.5 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.6.5 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.6.5 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.6.5 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.6.5 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.6.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.6.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.6.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.6.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.6.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.6.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.6.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.6.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.6.5 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.6.5 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.6.5 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.6.5 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.6.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.6.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.6.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.6.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.6.5 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.6.5 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.6.5 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.6.5 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.6.5 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.6.5 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.6.5 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.6.5 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.6.5 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.6.5 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.6.5 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.6.5 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.6.5 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.6.5 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.6.5 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.6.5 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.7.8 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-15095 |
严重 |
2.7.8 |
2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.7.8 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-17485 |
严重 |
2.7.8 |
2.9.4, 2.8.11, 2.7.9.2 |
jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.7.8 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2017-7525 |
严重 |
2.7.8 |
2.6.7.1, 2.7.9.1, 2.8.9 |
jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.7.8 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.7.8 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.7.8 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.7.8 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.7.8 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.7.8 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 |
严重 |
2.7.8 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: exfiltration/XXE in some JDK classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14720
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 |
严重 |
2.7.8 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: exfiltration/XXE in some JDK classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14720
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 |
严重 |
2.7.8 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14721
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 |
严重 |
2.7.8 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14721
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 |
严重 |
2.7.8 |
2.9.8, 2.8.11.3, 2.7.9.5 |
jackson-databind: improper polymorphic deserialization in axis2-transport-jms class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19360
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 |
严重 |
2.7.8 |
2.9.8, 2.8.11.3, 2.7.9.5 |
jackson-databind: improper polymorphic deserialization in axis2-transport-jms class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19360
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 |
严重 |
2.7.8 |
2.7.9.5, 2.9.8, 2.8.11.3 |
jackson-databind: improper polymorphic deserialization in openjpa class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19361
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 |
严重 |
2.7.8 |
2.7.9.5, 2.9.8, 2.8.11.3 |
jackson-databind: improper polymorphic deserialization in openjpa class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19361
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.7.8 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.7.8 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.7.8 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.7.8 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.7.8 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.7.8 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.7.8 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.7.8 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.7.8 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.7.8 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.7.8 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.7.8 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.7.8 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.7.8 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.7.8 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.7.8 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.7.8 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.7.8 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.7.8 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.7.8 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.7.8 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.7.8 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.7.8 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.7.8 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.7.8 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.7.8 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.9.4 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.9.4 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.9.4 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 |
严重 |
2.9.4 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: exfiltration/XXE in some JDK classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14720
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 |
严重 |
2.9.4 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14721
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 |
严重 |
2.9.4 |
2.9.8, 2.8.11.3, 2.7.9.5 |
jackson-databind: improper polymorphic deserialization in axis2-transport-jms class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19360
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 |
严重 |
2.9.4 |
2.7.9.5, 2.9.8, 2.8.11.3 |
jackson-databind: improper polymorphic deserialization in openjpa class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19361
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.9.4 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-7489 |
严重 |
2.9.4 |
2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 |
jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.9.4 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.9.4 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.9.4 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.9.4 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.9.4 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.9.4 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.9.4 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.9.4 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.9.4 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9546 |
严重 |
2.9.4 |
2.9.10.4 |
jackson-databind: Serialization gadgets in shaded-hikari-config
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9546
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.9.4 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.9.4 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-11307 |
严重 |
2.9.5 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.9.5 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.9.5 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 |
严重 |
2.9.5 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: exfiltration/XXE in some JDK classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14720
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 |
严重 |
2.9.5 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14721
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 |
严重 |
2.9.5 |
2.9.8, 2.8.11.3, 2.7.9.5 |
jackson-databind: improper polymorphic deserialization in axis2-transport-jms class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19360
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 |
严重 |
2.9.5 |
2.7.9.5, 2.9.8, 2.8.11.3 |
jackson-databind: improper polymorphic deserialization in openjpa class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19361
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.9.5 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.9.5 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.9.5 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.9.5 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.9.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.9.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.9.5 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.9.5 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.9.5 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.9.5 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9546 |
严重 |
2.9.5 |
2.9.10.4 |
jackson-databind: Serialization gadgets in shaded-hikari-config
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9546
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.9.5 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.9.5 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: exfiltration/XXE in some JDK classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14720
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: exfiltration/XXE in some JDK classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14720
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: exfiltration/XXE in some JDK classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14720
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: exfiltration/XXE in some JDK classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14720
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: exfiltration/XXE in some JDK classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14720
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: exfiltration/XXE in some JDK classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14720
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14721
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14721
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14721
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14721
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14721
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14721
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5 |
jackson-databind: improper polymorphic deserialization in axis2-transport-jms class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19360
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5 |
jackson-databind: improper polymorphic deserialization in axis2-transport-jms class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19360
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5 |
jackson-databind: improper polymorphic deserialization in axis2-transport-jms class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19360
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5 |
jackson-databind: improper polymorphic deserialization in axis2-transport-jms class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19360
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5 |
jackson-databind: improper polymorphic deserialization in axis2-transport-jms class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19360
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5 |
jackson-databind: improper polymorphic deserialization in axis2-transport-jms class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19360
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 |
严重 |
2.9.6 |
2.7.9.5, 2.9.8, 2.8.11.3 |
jackson-databind: improper polymorphic deserialization in openjpa class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19361
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 |
严重 |
2.9.6 |
2.7.9.5, 2.9.8, 2.8.11.3 |
jackson-databind: improper polymorphic deserialization in openjpa class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19361
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 |
严重 |
2.9.6 |
2.7.9.5, 2.9.8, 2.8.11.3 |
jackson-databind: improper polymorphic deserialization in openjpa class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19361
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 |
严重 |
2.9.6 |
2.7.9.5, 2.9.8, 2.8.11.3 |
jackson-databind: improper polymorphic deserialization in openjpa class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19361
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 |
严重 |
2.9.6 |
2.7.9.5, 2.9.8, 2.8.11.3 |
jackson-databind: improper polymorphic deserialization in openjpa class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19361
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 |
严重 |
2.9.6 |
2.7.9.5, 2.9.8, 2.8.11.3 |
jackson-databind: improper polymorphic deserialization in openjpa class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19361
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9546 |
严重 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in shaded-hikari-config
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9546
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9546 |
严重 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in shaded-hikari-config
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9546
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9546 |
严重 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in shaded-hikari-config
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9546
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9546 |
严重 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in shaded-hikari-config
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9546
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9546 |
严重 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in shaded-hikari-config
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9546
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9546 |
严重 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in shaded-hikari-config
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9546
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.jamesmurty.utils:java-xmlbuilder |
CVE-2014-125087 |
严重 |
0.4 |
1.2 |
java-xmlbuilder: XMLBuilder2 is vulnerable to XML External Entity (XXE) injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-125087
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-02-19 17:15 修改: 2024-05-17 00:58
|
com.jamesmurty.utils:java-xmlbuilder |
CVE-2014-125087 |
严重 |
0.4 |
1.2 |
java-xmlbuilder: XMLBuilder2 is vulnerable to XML External Entity (XXE) injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-125087
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-02-19 17:15 修改: 2024-05-17 00:58
|
com.jamesmurty.utils:java-xmlbuilder |
CVE-2014-125087 |
严重 |
0.4 |
1.2 |
java-xmlbuilder: XMLBuilder2 is vulnerable to XML External Entity (XXE) injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-125087
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-02-19 17:15 修改: 2024-05-17 00:58
|
com.jamesmurty.utils:java-xmlbuilder |
CVE-2014-125087 |
严重 |
0.4 |
1.2 |
java-xmlbuilder: XMLBuilder2 is vulnerable to XML External Entity (XXE) injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-125087
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-02-19 17:15 修改: 2024-05-17 00:58
|
com.jamesmurty.utils:java-xmlbuilder |
CVE-2014-125087 |
严重 |
0.4 |
1.2 |
java-xmlbuilder: XMLBuilder2 is vulnerable to XML External Entity (XXE) injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-125087
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-02-19 17:15 修改: 2024-05-17 00:58
|
com.jamesmurty.utils:java-xmlbuilder |
CVE-2014-125087 |
严重 |
0.4 |
1.2 |
java-xmlbuilder: XMLBuilder2 is vulnerable to XML External Entity (XXE) injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-125087
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-02-19 17:15 修改: 2024-05-17 00:58
|
com.jamesmurty.utils:java-xmlbuilder |
CVE-2014-125087 |
严重 |
0.4 |
1.2 |
java-xmlbuilder: XMLBuilder2 is vulnerable to XML External Entity (XXE) injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-125087
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-02-19 17:15 修改: 2024-05-17 00:58
|
com.jamesmurty.utils:java-xmlbuilder |
CVE-2014-125087 |
严重 |
0.4 |
1.2 |
java-xmlbuilder: XMLBuilder2 is vulnerable to XML External Entity (XXE) injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-125087
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-02-19 17:15 修改: 2024-05-17 00:58
|
com.jamesmurty.utils:java-xmlbuilder |
CVE-2014-125087 |
严重 |
0.4 |
1.2 |
java-xmlbuilder: XMLBuilder2 is vulnerable to XML External Entity (XXE) injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-125087
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-02-19 17:15 修改: 2024-05-17 00:58
|
com.nimbusds:nimbus-jose-jwt |
CVE-2019-17195 |
严重 |
4.41.1 |
7.9 |
nimbus-jose-jwt: Uncaught exceptions while parsing a JWT
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17195
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-15 14:15 修改: 2023-11-07 03:06
|
com.nimbusds:nimbus-jose-jwt |
CVE-2019-17195 |
严重 |
4.41.1 |
7.9 |
nimbus-jose-jwt: Uncaught exceptions while parsing a JWT
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17195
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-15 14:15 修改: 2023-11-07 03:06
|
com.nimbusds:nimbus-jose-jwt |
CVE-2019-17195 |
严重 |
4.41.1 |
7.9 |
nimbus-jose-jwt: Uncaught exceptions while parsing a JWT
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17195
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-15 14:15 修改: 2023-11-07 03:06
|
com.nimbusds:nimbus-jose-jwt |
CVE-2019-17195 |
严重 |
4.41.1 |
7.9 |
nimbus-jose-jwt: Uncaught exceptions while parsing a JWT
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17195
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-10-15 14:15 修改: 2023-11-07 03:06
|
com.nimbusds:nimbus-jose-jwt |
CVE-2019-17195 |
严重 |
4.41.1 |
7.9 |
nimbus-jose-jwt: Uncaught exceptions while parsing a JWT
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17195
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-15 14:15 修改: 2023-11-07 03:06
|
com.nimbusds:nimbus-jose-jwt |
CVE-2019-17195 |
严重 |
4.41.1 |
7.9 |
nimbus-jose-jwt: Uncaught exceptions while parsing a JWT
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17195
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-15 14:15 修改: 2023-11-07 03:06
|
com.nimbusds:nimbus-jose-jwt |
CVE-2019-17195 |
严重 |
4.41.1 |
7.9 |
nimbus-jose-jwt: Uncaught exceptions while parsing a JWT
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17195
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-15 14:15 修改: 2023-11-07 03:06
|
com.nimbusds:nimbus-jose-jwt |
CVE-2019-17195 |
严重 |
4.41.1 |
7.9 |
nimbus-jose-jwt: Uncaught exceptions while parsing a JWT
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17195
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-10-15 14:15 修改: 2023-11-07 03:06
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.10.5.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.10.5.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.10.5.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.10.5.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.6.2.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.6.2.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.6.2.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.6.2.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.6.2.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.6.2.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.6.2.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.7.0.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.7.0.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.7.0.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.7.0.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.7.0.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.7.0.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.7.0.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.7.0.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.7.0.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.8.0.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20444 |
严重 |
3.8.0.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.16 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.16 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.16 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.16 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.16 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.16 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.16 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.16 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.16 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.17 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.17 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.17 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.10.0 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.10.0 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.10.0 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.10.1 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.4 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.4 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.4 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.4 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.4 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.4 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.4 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.4 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.5 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.7 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.7 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.7 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.7 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.7 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.7 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.7 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.7 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.7 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.7 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.7 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.7.7 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.apache.calcite:calcite-core |
CVE-2022-39135 |
严重 |
1.0.0-incubating |
1.32.0 |
calcite: XXE via SQL operators
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39135
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-11 12:15 修改: 2023-11-06 19:38
|
org.apache.calcite:calcite-core |
CVE-2022-39135 |
严重 |
1.16.0 |
1.32.0 |
calcite: XXE via SQL operators
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39135
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-11 12:15 修改: 2023-11-06 19:38
|
org.apache.calcite:calcite-core |
CVE-2022-39135 |
严重 |
1.16.0 |
1.32.0 |
calcite: XXE via SQL operators
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39135
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-11 12:15 修改: 2023-11-06 19:38
|
org.apache.calcite:calcite-core |
CVE-2022-39135 |
严重 |
1.19.0 |
1.32.0 |
calcite: XXE via SQL operators
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39135
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-09-11 12:15 修改: 2023-11-06 19:38
|
org.apache.calcite:calcite-core |
CVE-2022-39135 |
严重 |
1.2.0-incubating |
1.32.0 |
calcite: XXE via SQL operators
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39135
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-11 12:15 修改: 2023-11-06 19:38
|
org.apache.calcite:calcite-core |
CVE-2022-39135 |
严重 |
1.2.0-incubating |
1.32.0 |
calcite: XXE via SQL operators
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39135
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-11 12:15 修改: 2023-11-06 19:38
|
org.apache.calcite:calcite-core |
CVE-2022-39135 |
严重 |
1.2.0-incubating |
1.32.0 |
calcite: XXE via SQL operators
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39135
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-11 12:15 修改: 2023-11-06 19:38
|
org.apache.calcite:calcite-core |
CVE-2022-39135 |
严重 |
1.6.0 |
1.32.0 |
calcite: XXE via SQL operators
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39135
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-11 12:15 修改: 2023-11-06 19:38
|
org.apache.calcite:calcite-core |
CVE-2022-39135 |
严重 |
1.6.0 |
1.32.0 |
calcite: XXE via SQL operators
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39135
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-11 12:15 修改: 2023-11-06 19:38
|
org.apache.calcite:calcite-core |
CVE-2022-39135 |
严重 |
1.6.0 |
1.32.0 |
calcite: XXE via SQL operators
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39135
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-11 12:15 修改: 2023-11-06 19:38
|
org.apache.calcite:calcite-core |
CVE-2022-39135 |
严重 |
1.6.0 |
1.32.0 |
calcite: XXE via SQL operators
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39135
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-11 12:15 修改: 2023-11-06 19:38
|
org.apache.calcite:calcite-core |
CVE-2022-39135 |
严重 |
1.6.0 |
1.32.0 |
calcite: XXE via SQL operators
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39135
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-11 12:15 修改: 2023-11-06 19:38
|
org.apache.calcite:calcite-core |
CVE-2022-39135 |
严重 |
1.6.0 |
1.32.0 |
calcite: XXE via SQL operators
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39135
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-11 12:15 修改: 2023-11-06 19:38
|
org.apache.calcite:calcite-core |
CVE-2022-39135 |
严重 |
1.6.0 |
1.32.0 |
calcite: XXE via SQL operators
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-39135
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-11 12:15 修改: 2023-11-06 19:38
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.7.3 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.7.3 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.7.3 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
2.8.5 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
2.8.5 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
2.8.5 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
3.0.0 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
3.0.0 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
3.0.0 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
3.0.0 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
3.0.0 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
3.0.0 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
3.0.0 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
3.0.0 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
3.0.0 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
3.0.0 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
3.0.0 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
3.0.0 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
3.0.0 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
3.0.0 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
3.0.0 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
3.1.2 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2021-37404 |
严重 |
3.1.2 |
3.3.2, 3.2.3, 2.10.2 |
hadoop-hdfs: Heap buffer overflow in Apache Hadoop libhdfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37404
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-13 07:15 修改: 2023-06-27 15:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
3.1.2 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-25168 |
严重 |
3.1.2 |
2.10.2, 3.2.4, 3.3.3 |
hadoop: Command injection in org.apache.hadoop.fs.FileUtil.unTarUsingTar
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25168
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-04 15:15 修改: 2023-06-26 11:15
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
3.1.2 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hadoop:hadoop-common |
CVE-2022-26612 |
严重 |
3.1.2 |
3.2.3 |
hadoop: Arbitrary file write in FileUtil#unpackEntries on Windows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-04-07 19:15 修改: 2023-08-08 14:21
|
org.apache.hive:hive-jdbc |
CVE-2018-1282 |
严重 |
1.1.1 |
2.3.3 |
hive: Improper input validation in jdbc/HivePreparedStatement.java allows for SQL injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1282
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-jdbc |
CVE-2018-1282 |
严重 |
2.1.0 |
2.3.3 |
hive: Improper input validation in jdbc/HivePreparedStatement.java allows for SQL injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1282
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-jdbc |
CVE-2018-1282 |
严重 |
2.1.0 |
2.3.3 |
hive: Improper input validation in jdbc/HivePreparedStatement.java allows for SQL injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1282
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.logging.log4j:log4j-core |
CVE-2021-44228 |
严重 |
2.11.1 |
2.15.0, 2.3.1, 2.12.2 |
log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44228
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-10 10:15 修改: 2024-07-24 17:08
|
org.apache.logging.log4j:log4j-core |
CVE-2021-45046 |
严重 |
2.11.1 |
2.16.0, 2.12.2 |
log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228)
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45046
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 19:15 修改: 2024-10-31 12:17
|
org.apache.sling:org.apache.sling.commons.json |
CVE-2022-47937 |
严重 |
2.0.6 |
|
Apache Sling Commons JSON bundle vulnerable to Improper Input Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47937
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2023-05-15 10:15 修改: 2024-10-11 21:35
|
org.apache.spark:spark-core_2.11 |
CVE-2018-17190 |
严重 |
2.1.3 |
|
Remote Code Execution in spark-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-11-19 14:29 修改: 2023-11-07 02:54
|
org.apache.spark:spark-core_2.11 |
CVE-2018-17190 |
严重 |
2.1.3 |
|
Remote Code Execution in spark-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-11-19 14:29 修改: 2023-11-07 02:54
|
org.apache.zookeeper:zookeeper |
CVE-2023-44981 |
严重 |
3.5.7 |
3.7.2, 3.8.3, 3.9.1 |
zookeeper: Authorization Bypass in Apache ZooKeeper
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44981
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-10-11 12:15 修改: 2024-06-21 19:15
|
org.apache.zookeeper:zookeeper |
CVE-2023-44981 |
严重 |
3.5.7 |
3.7.2, 3.8.3, 3.9.1 |
zookeeper: Authorization Bypass in Apache ZooKeeper
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44981
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-10-11 12:15 修改: 2024-06-21 19:15
|
org.eclipse.jetty:jetty-server |
CVE-2017-7657 |
严重 |
7.6.0.v20120127 |
9.2.25.v20180606, 9.3.24.v20180605 |
jetty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7657
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 16:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7657 |
严重 |
7.6.0.v20120127 |
9.2.25.v20180606, 9.3.24.v20180605 |
jetty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7657
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 16:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7658 |
严重 |
7.6.0.v20120127 |
9.2.25.v20180606, 9.3.24.v20180605, 9.4.11.v20180605 |
jetty: Incorrect header handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7658
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 17:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7658 |
严重 |
7.6.0.v20120127 |
9.2.25.v20180606, 9.3.24.v20180605, 9.4.11.v20180605 |
jetty: Incorrect header handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7658
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 17:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7657 |
严重 |
9.2.16.v20160414 |
9.2.25.v20180606, 9.3.24.v20180605 |
jetty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7657
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 16:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7657 |
严重 |
9.2.16.v20160414 |
9.2.25.v20180606, 9.3.24.v20180605 |
jetty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7657
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 16:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7658 |
严重 |
9.2.16.v20160414 |
9.2.25.v20180606, 9.3.24.v20180605, 9.4.11.v20180605 |
jetty: Incorrect header handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7658
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 17:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7658 |
严重 |
9.2.16.v20160414 |
9.2.25.v20180606, 9.3.24.v20180605, 9.4.11.v20180605 |
jetty: Incorrect header handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7658
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 17:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7657 |
严重 |
9.3.19.v20170502 |
9.2.25.v20180606, 9.3.24.v20180605 |
jetty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7657
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-06-26 16:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7657 |
严重 |
9.3.19.v20170502 |
9.2.25.v20180606, 9.3.24.v20180605 |
jetty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7657
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 16:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7657 |
严重 |
9.3.19.v20170502 |
9.2.25.v20180606, 9.3.24.v20180605 |
jetty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7657
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 16:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7657 |
严重 |
9.3.19.v20170502 |
9.2.25.v20180606, 9.3.24.v20180605 |
jetty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7657
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 16:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7658 |
严重 |
9.3.19.v20170502 |
9.2.25.v20180606, 9.3.24.v20180605, 9.4.11.v20180605 |
jetty: Incorrect header handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7658
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-06-26 17:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7658 |
严重 |
9.3.19.v20170502 |
9.2.25.v20180606, 9.3.24.v20180605, 9.4.11.v20180605 |
jetty: Incorrect header handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7658
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 17:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7658 |
严重 |
9.3.19.v20170502 |
9.2.25.v20180606, 9.3.24.v20180605, 9.4.11.v20180605 |
jetty: Incorrect header handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7658
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 17:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7658 |
严重 |
9.3.19.v20170502 |
9.2.25.v20180606, 9.3.24.v20180605, 9.4.11.v20180605 |
jetty: Incorrect header handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7658
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 17:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7657 |
严重 |
9.3.20.v20170531 |
9.2.25.v20180606, 9.3.24.v20180605 |
jetty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7657
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-06-26 16:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7658 |
严重 |
9.3.20.v20170531 |
9.2.25.v20180606, 9.3.24.v20180605, 9.4.11.v20180605 |
jetty: Incorrect header handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7658
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-06-26 17:29 修改: 2023-11-07 02:50
|
org.jboss.netty:netty |
CVE-2019-20444 |
严重 |
3.2.8.Final |
4.0.0 |
netty: HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
org.postgresql:postgresql |
CVE-2024-1597 |
严重 |
42.2.2 |
42.2.28, 42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2 |
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1597
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 13:15 修改: 2024-06-10 17:16
|
org.postgresql:postgresql |
CVE-2024-1597 |
严重 |
42.2.2 |
42.2.28, 42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2 |
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1597
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 13:15 修改: 2024-06-10 17:16
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.6.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.6.5 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.6.5 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.6.5 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.6.5 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.6.5 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.6.5 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.6.5 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.6.5 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.6.5 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.6.5 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.6.5 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.6.5 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.6.5 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.6.5 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.6.5 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.6.5 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.1.1 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.1.1 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.1.1 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.1.1 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.1.1 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.1.1 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.1.1 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.1.1 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.1.1 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.1.1 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.1.1 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.1.1 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.10.2 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.10.2 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.10.2 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.10.2 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.10.2 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.10.5.1 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.10.5.1 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.10.5.1 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.10.5.1 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.11.2 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.11.2 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.11.2 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.11.2 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.11.2 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.11.2 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.11.2 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.11.2 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.11.2 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.11.2 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.11.2 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.11.2 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.11.2 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.11.2 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.11.2 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.11.2 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.7.8 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.7.8 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12023 |
高危 |
2.7.8 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12023
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12023 |
高危 |
2.7.8 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12023
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.7.8 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.7.8 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.7.8 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.7.8 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.7.8 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.7.8 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.7.8 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.7.8 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.7.8 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.7.8 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.7.8 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.7.8 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.7.8 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.7.8 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.7.8 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.7.8 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.7.8 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.7.8 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.7.8 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.7.8 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.7.8 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.7.8 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.7.8 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.7.8 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.7.8 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.7.8 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.7.8 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.7.8 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.7.8 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.7.8 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.7.8 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.7.8 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.7.8 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.7.8 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.7.8 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.7.8 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.7.8 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.7.8 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.7.8 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.7.8 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.7.8 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.7.8 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.7.8 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.7.8 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.7.8 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.7.8 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.7.8 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.7.8 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.7.8 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.7.8 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.7.8 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.7.8 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.7.8 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.7.8 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.11.2 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.13.2.1 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.13.2.1 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.alibaba:fastjson |
CVE-2022-25845 |
高危 |
1.2.76 |
1.2.83 |
fastjson: autoType shutdown restriction bypass leads to deserialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25845
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-10 20:15 修改: 2023-02-23 17:51
|
com.cedarsoftware:json-io |
CVE-2023-34610 |
高危 |
2.5.1 |
4.14.1 |
json-io: cyclic dependencies in a crafted object could result in Dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34610
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 14:15 修改: 2023-06-26 17:11
|
com.cedarsoftware:json-io |
CVE-2023-34610 |
高危 |
2.5.1 |
4.14.1 |
json-io: cyclic dependencies in a crafted object could result in Dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34610
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 14:15 修改: 2023-06-26 17:11
|
ch.qos.logback:logback-classic |
CVE-2023-6378 |
高危 |
1.2.3 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
ch.qos.logback:logback-core |
CVE-2023-6378 |
高危 |
1.2.3 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.1.1 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.1.1 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.1.1 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.1.1 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.1.1 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.9.4 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12023 |
高危 |
2.9.4 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12023
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.9.4 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.9.4 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.9.4 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14893 |
高危 |
2.9.4 |
2.9.10 |
jackson-databind: Serialization gadgets in classes of the xalan package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14893
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 21:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.9.4 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10672 |
高危 |
2.9.4 |
2.9.10.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10672
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.9.4 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10968 |
高危 |
2.9.4 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10968
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10969 |
高危 |
2.9.4 |
2.9.10.4 |
jackson-databind: Serialization gadgets in javax.swing.JEditorPane
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10969
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11111 |
高危 |
2.9.4 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11111
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11112 |
高危 |
2.9.4 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11112
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11113 |
高危 |
2.9.4 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11113
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11619 |
高危 |
2.9.4 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.springframework:spring-aop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11619
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11620 |
高危 |
2.9.4 |
2.9.10.4 |
jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11620
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14060 |
高危 |
2.9.4 |
2.9.10.5 |
jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14060
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-06-14 21:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14061 |
高危 |
2.9.4 |
2.9.10.5 |
jackson-databind: serialization in weblogic/oracle-aqjms
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14061
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14062 |
高危 |
2.9.4 |
2.9.10.5 |
jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14062
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14195 |
高危 |
2.9.4 |
2.9.10.5 |
jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14195
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-06-16 16:15 修改: 2021-11-17 20:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.9.4 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.9.4 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.9.4 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.9.4 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.9.4 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.9.4 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.9.4 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.9.4 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.9.4 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.9.4 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.9.4 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.9.4 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.9.4 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.9.4 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.9.4 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.9.4 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.9.4 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.9.4 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.9.4 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.9.4 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.9.4 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.1.1 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.1.1 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.1.1 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.1.1 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.1.1 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.1.1 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.1.1 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.1.1 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.1.1 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.4.0 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.4.0 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.4.0 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.9.5 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12023 |
高危 |
2.9.5 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12023
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.9.5 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.9.5 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.9.5 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14893 |
高危 |
2.9.5 |
2.9.10 |
jackson-databind: Serialization gadgets in classes of the xalan package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14893
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 21:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.9.5 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10672 |
高危 |
2.9.5 |
2.9.10.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10672
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.9.5 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10968 |
高危 |
2.9.5 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10968
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10969 |
高危 |
2.9.5 |
2.9.10.4 |
jackson-databind: Serialization gadgets in javax.swing.JEditorPane
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10969
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11111 |
高危 |
2.9.5 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11111
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11112 |
高危 |
2.9.5 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11112
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11113 |
高危 |
2.9.5 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11113
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11619 |
高危 |
2.9.5 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.springframework:spring-aop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11619
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11620 |
高危 |
2.9.5 |
2.9.10.4 |
jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11620
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14060 |
高危 |
2.9.5 |
2.9.10.5 |
jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14060
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-06-14 21:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14061 |
高危 |
2.9.5 |
2.9.10.5 |
jackson-databind: serialization in weblogic/oracle-aqjms
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14061
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14062 |
高危 |
2.9.5 |
2.9.10.5 |
jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14062
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14195 |
高危 |
2.9.5 |
2.9.10.5 |
jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14195
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-06-16 16:15 修改: 2021-11-17 20:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.9.5 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.9.5 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.9.5 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.9.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.9.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.9.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.9.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.9.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.9.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.9.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.9.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.9.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.9.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.9.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.9.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.9.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.9.5 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.9.5 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.9.5 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.9.5 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.9.5 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.4.0 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.4.0 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.4.0 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.4.0 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.4.0 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.4.0 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.4.0 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.4.0 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.4.0 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.4.0 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.4.0 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.4.0 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.4.0 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.4.0 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.4.0 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.4.0 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.4.0 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.4.0 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.4.0 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.4.0 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.4.0 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.4.0 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.4.0 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.4.0 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.4.0 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.4.0 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.4.0 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.4.0 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.4.0 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.4.0 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.4.0 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.4.0 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.4.0 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.4.0 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.4.0 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.4.0 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.4.0 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.4.0 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.4.0 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.4.0 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.4.0 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.4.0 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.4.0 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.4.0 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.4.0 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.4.0 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.4.0 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.4.0 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.4.0 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.4.0 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.4.0 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.4.0 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.4.0 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.4.0 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.4.0 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.4.0 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.4.0 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.4.0 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.4.0 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.4.0 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.4.0 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.4.0 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.9.6 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.9.6 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.9.6 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.9.6 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.9.6 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.9.6 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.9.6 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.9.6 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.9.6 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.9.6 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.9.6 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.9.6 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14893 |
高危 |
2.9.6 |
2.9.10 |
jackson-databind: Serialization gadgets in classes of the xalan package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14893
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 21:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14893 |
高危 |
2.9.6 |
2.9.10 |
jackson-databind: Serialization gadgets in classes of the xalan package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14893
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 21:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14893 |
高危 |
2.9.6 |
2.9.10 |
jackson-databind: Serialization gadgets in classes of the xalan package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14893
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 21:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14893 |
高危 |
2.9.6 |
2.9.10 |
jackson-databind: Serialization gadgets in classes of the xalan package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14893
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 21:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14893 |
高危 |
2.9.6 |
2.9.10 |
jackson-databind: Serialization gadgets in classes of the xalan package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14893
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 21:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14893 |
高危 |
2.9.6 |
2.9.10 |
jackson-databind: Serialization gadgets in classes of the xalan package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14893
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 21:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.9.6 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.9.6 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.9.6 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.9.6 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.9.6 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.9.6 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10672 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10672
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10672 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10672
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10672 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10672
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10672 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10672
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10672 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10672
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10672 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10672
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.9.6 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.9.6 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.9.6 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.9.6 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.9.6 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.9.6 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10968 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10968
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10968 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10968
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10968 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10968
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10968 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10968
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10968 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10968
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10968 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10968
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10969 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in javax.swing.JEditorPane
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10969
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10969 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in javax.swing.JEditorPane
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10969
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10969 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in javax.swing.JEditorPane
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10969
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10969 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in javax.swing.JEditorPane
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10969
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10969 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in javax.swing.JEditorPane
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10969
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10969 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in javax.swing.JEditorPane
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10969
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11111 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11111
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11111 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11111
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11111 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11111
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11111 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11111
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11111 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11111
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11111 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11111
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11112 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11112
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11112 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11112
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11112 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11112
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11112 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11112
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11112 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11112
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11112 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11112
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11113 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11113
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11113 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11113
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11113 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11113
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11113 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11113
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11113 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11113
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11113 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11113
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11619 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.springframework:spring-aop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11619
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11619 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.springframework:spring-aop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11619
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11619 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.springframework:spring-aop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11619
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11619 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.springframework:spring-aop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11619
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11619 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.springframework:spring-aop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11619
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11619 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.springframework:spring-aop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11619
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11620 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11620
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11620 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11620
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11620 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11620
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11620 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11620
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11620 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11620
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11620 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11620
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14060 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14060
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 21:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14060 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14060
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 21:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14060 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14060
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 21:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14060 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14060
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 21:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14060 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14060
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 21:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14060 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14060
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 21:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14061 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in weblogic/oracle-aqjms
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14061
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14061 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in weblogic/oracle-aqjms
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14061
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14061 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in weblogic/oracle-aqjms
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14061
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14061 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in weblogic/oracle-aqjms
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14061
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14061 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in weblogic/oracle-aqjms
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14061
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14061 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in weblogic/oracle-aqjms
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14061
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14062 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14062
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14062 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14062
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14062 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14062
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14062 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14062
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14062 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14062
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14062 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14062
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14195 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14195
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-16 16:15 修改: 2021-11-17 20:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14195 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14195
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-16 16:15 修改: 2021-11-17 20:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14195 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14195
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-16 16:15 修改: 2021-11-17 20:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14195 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14195
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-16 16:15 修改: 2021-11-17 20:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14195 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14195
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-16 16:15 修改: 2021-11-17 20:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14195 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14195
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-06-16 16:15 修改: 2021-11-17 20:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.9.6 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.9.6 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.9.6 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.9.6 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.9.6 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.9.6 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.9.6 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.9.6 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.9.6 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.9.6 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.9.6 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.9.6 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.9.6 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.9.6 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.9.6 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.9.6 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.9.6 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.9.6 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.9.6 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.9.6 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.9.6 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.9.6 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.9.6 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.9.6 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.9.6 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.9.6 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.9.6 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.9.6 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.9.6 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.9.6 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.dataformat:jackson-dataformat-cbor |
CVE-2020-28491 |
高危 |
2.10.4 |
2.11.4, 2.12.1 |
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-18 16:15 修改: 2022-12-06 21:44
|
com.fasterxml.jackson.dataformat:jackson-dataformat-cbor |
CVE-2020-28491 |
高危 |
2.8.11 |
2.11.4, 2.12.1 |
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-18 16:15 修改: 2022-12-06 21:44
|
com.fasterxml.jackson.dataformat:jackson-dataformat-cbor |
CVE-2020-28491 |
高危 |
2.8.6 |
2.11.4, 2.12.1 |
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-18 16:15 修改: 2022-12-06 21:44
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.8.1 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.8.1 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.4.1 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.4.1 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.4.1 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.4.1 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.4.1 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.5.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.5.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.5.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.5.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
3.14.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
3.14.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
3.14.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
3.14.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
3.14.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
3.3.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
3.3.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
3.3.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
3.3.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
3.3.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
3.6.1 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
3.6.1 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
3.6.1 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
3.6.1 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
3.6.1 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
4.41.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
4.41.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
4.41.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
4.41.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
4.41.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
4.41.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
4.41.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
4.41.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
commons-beanutils:commons-beanutils |
CVE-2014-0114 |
高危 |
1.9.3 |
1.9.4 |
1: Class Loader manipulation via request parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0114
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-04-30 10:49 修改: 2023-02-13 00:32
|
commons-beanutils:commons-beanutils |
CVE-2014-0114 |
高危 |
1.9.3 |
1.9.4 |
1: Class Loader manipulation via request parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0114
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-04-30 10:49 修改: 2023-02-13 00:32
|
commons-beanutils:commons-beanutils |
CVE-2014-0114 |
高危 |
1.9.3 |
1.9.4 |
1: Class Loader manipulation via request parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0114
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-04-30 10:49 修改: 2023-02-13 00:32
|
commons-beanutils:commons-beanutils |
CVE-2014-0114 |
高危 |
1.9.3 |
1.9.4 |
1: Class Loader manipulation via request parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0114
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2014-04-30 10:49 修改: 2023-02-13 00:32
|
commons-beanutils:commons-beanutils |
CVE-2014-0114 |
高危 |
1.9.3 |
1.9.4 |
1: Class Loader manipulation via request parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0114
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2014-04-30 10:49 修改: 2023-02-13 00:32
|
commons-beanutils:commons-beanutils |
CVE-2014-0114 |
高危 |
1.9.3 |
1.9.4 |
1: Class Loader manipulation via request parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0114
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2014-04-30 10:49 修改: 2023-02-13 00:32
|
commons-beanutils:commons-beanutils |
CVE-2014-0114 |
高危 |
1.9.3 |
1.9.4 |
1: Class Loader manipulation via request parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0114
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2014-04-30 10:49 修改: 2023-02-13 00:32
|
commons-beanutils:commons-beanutils |
CVE-2019-10086 |
高危 |
1.9.3 |
1.9.4 |
apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-08-20 21:15 修改: 2023-11-07 03:02
|
commons-beanutils:commons-beanutils |
CVE-2019-10086 |
高危 |
1.9.3 |
1.9.4 |
apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-08-20 21:15 修改: 2023-11-07 03:02
|
commons-beanutils:commons-beanutils |
CVE-2019-10086 |
高危 |
1.9.3 |
1.9.4 |
apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10086
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-08-20 21:15 修改: 2023-11-07 03:02
|
commons-beanutils:commons-beanutils |
CVE-2019-10086 |
高危 |
1.9.3 |
1.9.4 |
apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-08-20 21:15 修改: 2023-11-07 03:02
|
commons-beanutils:commons-beanutils |
CVE-2019-10086 |
高危 |
1.9.3 |
1.9.4 |
apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-08-20 21:15 修改: 2023-11-07 03:02
|
commons-beanutils:commons-beanutils |
CVE-2019-10086 |
高危 |
1.9.3 |
1.9.4 |
apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-08-20 21:15 修改: 2023-11-07 03:02
|
commons-beanutils:commons-beanutils |
CVE-2019-10086 |
高危 |
1.9.3 |
1.9.4 |
apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-08-20 21:15 修改: 2023-11-07 03:02
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.5 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.5 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.8.0 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
dnsjava:dnsjava |
CVE-2024-25638 |
高危 |
2.1.7 |
3.6.0 |
dnsjava: Improper response validation allowing DNSSEC bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25638
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-07-22 14:15 修改: 2024-09-04 15:15
|
dnsjava:dnsjava |
CVE-2024-25638 |
高危 |
2.1.7 |
3.6.0 |
dnsjava: Improper response validation allowing DNSSEC bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25638
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-07-22 14:15 修改: 2024-09-04 15:15
|
io.airlift:aircompressor |
CVE-2024-36114 |
高危 |
0.10 |
0.27 |
Decompressors can crash the JVM and leak memory content in Aircompressor
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36114
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-05-29 21:15 修改: 2024-05-30 13:15
|
io.airlift:aircompressor |
CVE-2024-36114 |
高危 |
0.10 |
0.27 |
Decompressors can crash the JVM and leak memory content in Aircompressor
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36114
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-05-29 21:15 修改: 2024-05-30 13:15
|
io.airlift:aircompressor |
CVE-2024-36114 |
高危 |
0.15 |
0.27 |
Decompressors can crash the JVM and leak memory content in Aircompressor
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36114
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-05-29 21:15 修改: 2024-05-30 13:15
|
io.airlift:aircompressor |
CVE-2024-36114 |
高危 |
0.19 |
0.27 |
Decompressors can crash the JVM and leak memory content in Aircompressor
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36114
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-05-29 21:15 修改: 2024-05-30 13:15
|
io.airlift:aircompressor |
CVE-2024-36114 |
高危 |
0.19 |
0.27 |
Decompressors can crash the JVM and leak memory content in Aircompressor
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36114
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-05-29 21:15 修改: 2024-05-30 13:15
|
io.airlift:aircompressor |
CVE-2024-36114 |
高危 |
0.19 |
0.27 |
Decompressors can crash the JVM and leak memory content in Aircompressor
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36114
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-05-29 21:15 修改: 2024-05-30 13:15
|
io.fabric8:kubernetes-client |
CVE-2021-20218 |
高危 |
4.9.0 |
4.7.2, 4.11.2, 4.13.2, 5.0.2 |
fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20218
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-16 21:15 修改: 2021-03-25 18:43
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.10.5.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.10.5.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.10.5.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.10.5.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.10.5.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.10.5.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.10.5.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.10.5.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.6.2.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.6.2.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.6.2.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.6.2.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.6.2.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.6.2.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.6.2.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.6.2.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.6.2.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.6.2.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.6.2.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.6.2.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.6.2.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.6.2.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.6.2.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.6.2.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.6.2.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.6.2.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.6.2.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.6.2.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.6.2.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.7.0.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.7.0.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.7.0.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.7.0.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.7.0.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.7.0.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.7.0.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.7.0.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.7.0.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.7.0.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.8.0.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2015-2156 |
高危 |
3.8.0.Final |
3.10.3.Final, 3.9.8.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.8.0.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37136 |
高危 |
3.8.0.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.8.0.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty |
CVE-2021-37137 |
高危 |
3.8.0.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.0.23.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.0.23.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.0.23.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.0.23.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.0.23.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.0.23.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.0.23.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.0.23.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.0.23.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.0.23.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.0.23.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.0.23.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.0.43.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.0.43.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.1.17.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-all |
CVE-2019-16869 |
高危 |
4.1.17.Final |
4.1.42.Final |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
io.netty:netty-codec |
CVE-2021-37136 |
高危 |
4.1.45.Final |
4.1.68.Final |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty-codec |
CVE-2021-37136 |
高危 |
4.1.45.Final |
4.1.68.Final |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty-codec |
CVE-2021-37137 |
高危 |
4.1.45.Final |
4.1.68.Final |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty-codec |
CVE-2021-37137 |
高危 |
4.1.45.Final |
4.1.68.Final |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty-codec |
CVE-2021-37136 |
高危 |
4.1.49.Final |
4.1.68.Final |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty-codec |
CVE-2021-37137 |
高危 |
4.1.49.Final |
4.1.68.Final |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty-handler |
CVE-2020-11612 |
高危 |
4.1.45.Final |
4.1.46 |
netty: compression/decompression codecs don't enforce limits on buffer allocation sizes
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-04-07 18:15 修改: 2023-11-07 03:14
|
io.netty:netty-handler |
CVE-2020-11612 |
高危 |
4.1.45.Final |
4.1.46 |
netty: compression/decompression codecs don't enforce limits on buffer allocation sizes
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11612
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-04-07 18:15 修改: 2023-11-07 03:14
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.16 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.16 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.16 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.16 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.16 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.16 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.4.0 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.4.0 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.4.0 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.4.0 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.4.0 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.4.0 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.4.0 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.4.0 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.4.0 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.4.0 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.4.0 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.4.0 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.4.0 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.4.0 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.4.0 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.4.0 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.4.0 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.4.0 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.4.0 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.17 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.2.1 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.3 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.3 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.3 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.3 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.3 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.3 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.3 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.3.1 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.4.0 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.10.0 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.10.0 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.10.0 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.10.1 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.4 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.4 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.4 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.4 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.4 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.4 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.4 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.4 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.5 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.4.0 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.1.1 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.1.1 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.1.1 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.1.1 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.1.1 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.1.1 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.7 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.7 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.7 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.7 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.7 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.7 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.7 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.7 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.7 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.7 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.7 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.avro:avro |
CVE-2023-39410 |
高危 |
1.7.7 |
1.11.3 |
apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15
|
org.apache.calcite.avatica:avatica-core |
CVE-2022-36364 |
高危 |
1.11.0 |
1.22.0 |
Apache Calcite Avatica JDBC driver arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36364
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-07-28 09:15 修改: 2022-08-03 19:36
|
org.apache.calcite.avatica:avatica-core |
CVE-2022-36364 |
高危 |
1.11.0 |
1.22.0 |
Apache Calcite Avatica JDBC driver arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36364
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-07-28 09:15 修改: 2022-08-03 19:36
|
org.apache.calcite.avatica:avatica-core |
CVE-2022-36364 |
高危 |
1.12.0 |
1.22.0 |
Apache Calcite Avatica JDBC driver arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36364
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-07-28 09:15 修改: 2022-08-03 19:36
|
org.apache.calcite.avatica:avatica-core |
CVE-2022-36364 |
高危 |
1.13.0 |
1.22.0 |
Apache Calcite Avatica JDBC driver arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36364
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-07-28 09:15 修改: 2022-08-03 19:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.1.1 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.1.1 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.1.1 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.1.1 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.1.1 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.1.1 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.1.1 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.1.1 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.1.1 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.1.1 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.1.1 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.1.1 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.1.1 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.1.1 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.20 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.20 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.20 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.20 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.20 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.20 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.20 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.20 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.4.1 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.4.1 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.9 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.9 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.9 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.9 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.9 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.9 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.9 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.9 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.9 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.9 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.9 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.1.1 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.1.1 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2016-6811 |
高危 |
2.7.3 |
2.7.4 |
hadoop: privilege escalation to root
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-6811
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-04-11 14:59 修改: 2023-11-07 02:34
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2017-7669 |
高危 |
2.7.3 |
2.8.1, 3.0.0-alpha3 |
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7669
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-06-05 01:29 修改: 2017-06-09 16:21
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.7.3 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.1.1 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
2.8.5 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.1.1 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.6.5 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.6.5 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.6.5 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-12022 |
高危 |
2.6.5 |
2.7.9.4, 2.8.11.2, 2.9.6 |
jackson-databind: improper polymorphic deserialization of types from Jodd-db library
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.6.5 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.6.5 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.6.5 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-5968 |
高危 |
2.6.5 |
2.8.11.1, 2.9.4, 2.7.9.5 |
jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.6.5 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.6.5 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
3.0.0 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
3.0.0 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
3.0.0 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
3.0.0 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
3.0.0 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.6.5 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.6.5 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.6.5 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.6.5 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.6.5 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.6.5 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
3.1.2 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-common |
CVE-2020-9492 |
高危 |
3.1.2 |
3.2.2, 3.1.4, 2.10.1 |
hadoop: WebHDFS client might send SPNEGO authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9492
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-01-26 18:16 修改: 2023-11-07 03:26
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.2.0 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.2.0 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.6.0 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.6.0 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.6.0 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.7.3 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.7.3 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.7.3 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.7.3 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.7.3 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.7.3 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.7.3 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.7.3 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.7.3 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
2.8.5 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
3.0.0 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
3.1.0 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hadoop:hadoop-yarn-server-common |
CVE-2021-33036 |
高危 |
3.1.0 |
2.10.2, 3.2.3, 3.3.2 |
hadoop: privilege escalation via yarn user
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33036
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-06-15 15:15 修改: 2022-10-27 16:30
|
org.apache.hive:hive-exec |
CVE-2015-7521 |
高危 |
1.1.1 |
1.2.2 |
High severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7521
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2016-01-29 20:59 修改: 2018-10-09 19:58
|
org.apache.hive:hive-exec |
CVE-2016-3083 |
高危 |
1.1.1 |
1.2.2, 2.0.1 |
org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service vulnerable to Improper Certificate Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3083
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-05-30 14:29 修改: 2023-11-07 02:32
|
org.apache.hive:hive-exec |
CVE-2018-11777 |
高危 |
1.1.1 |
3.1.1, 2.3.4 |
Improper Authentication in hive:hive-exec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11777
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-11-08 14:29 修改: 2023-11-07 02:51
|
org.apache.hive:hive-exec |
CVE-2018-11777 |
高危 |
1.2.2 |
3.1.1, 2.3.4 |
Improper Authentication in hive:hive-exec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11777
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-11-08 14:29 修改: 2023-11-07 02:51
|
org.apache.hive:hive-exec |
CVE-2018-11777 |
高危 |
2.1.0 |
3.1.1, 2.3.4 |
Improper Authentication in hive:hive-exec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11777
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-11-08 14:29 修改: 2023-11-07 02:51
|
org.apache.hive:hive-exec |
CVE-2018-11777 |
高危 |
2.1.0 |
3.1.1, 2.3.4 |
Improper Authentication in hive:hive-exec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11777
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-11-08 14:29 修改: 2023-11-07 02:51
|
org.apache.hive:hive-exec |
CVE-2018-11777 |
高危 |
2.1.0 |
3.1.1, 2.3.4 |
Improper Authentication in hive:hive-exec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11777
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-11-08 14:29 修改: 2023-11-07 02:51
|
org.apache.hive:hive-exec |
CVE-2018-11777 |
高危 |
2.1.0 |
3.1.1, 2.3.4 |
Improper Authentication in hive:hive-exec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11777
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2018-11-08 14:29 修改: 2023-11-07 02:51
|
org.apache.hive:hive-exec |
CVE-2018-11777 |
高危 |
2.1.0 |
3.1.1, 2.3.4 |
Improper Authentication in hive:hive-exec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11777
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-11-08 14:29 修改: 2023-11-07 02:51
|
org.apache.hive:hive-exec |
CVE-2018-11777 |
高危 |
2.1.0 |
3.1.1, 2.3.4 |
Improper Authentication in hive:hive-exec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11777
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-11-08 14:29 修改: 2023-11-07 02:51
|
org.apache.hive:hive-exec |
CVE-2018-11777 |
高危 |
2.1.0 |
3.1.1, 2.3.4 |
Improper Authentication in hive:hive-exec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11777
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-11-08 14:29 修改: 2023-11-07 02:51
|
org.apache.hive:hive-exec |
CVE-2018-11777 |
高危 |
2.1.1 |
3.1.1, 2.3.4 |
Improper Authentication in hive:hive-exec
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11777
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-11-08 14:29 修改: 2023-11-07 02:51
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.6.5 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.6.5 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.6.5 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
org.apache.hive:hive-service |
CVE-2015-7521 |
高危 |
1.1.1 |
1.2.2 |
High severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7521
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2016-01-29 20:59 修改: 2018-10-09 19:58
|
org.apache.hive:hive-service |
CVE-2016-3083 |
高危 |
1.1.1 |
1.2.2, 2.0.1 |
org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service vulnerable to Improper Certificate Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3083
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-05-30 14:29 修改: 2023-11-07 02:32
|
org.apache.httpcomponents:httpclient |
CVE-2012-6153 |
高危 |
4.0.1 |
4.2.3 |
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-6153
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-09-04 17:55 修改: 2018-01-05 02:29
|
org.apache.httpcomponents:httpclient |
CVE-2012-6153 |
高危 |
4.0.1 |
4.2.3 |
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-6153
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-09-04 17:55 修改: 2018-01-05 02:29
|
org.apache.httpcomponents:httpclient |
CVE-2012-6153 |
高危 |
4.1.2 |
4.2.3 |
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-6153
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-09-04 17:55 修改: 2018-01-05 02:29
|
org.apache.httpcomponents:httpclient |
CVE-2012-6153 |
高危 |
4.1.2 |
4.2.3 |
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-6153
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-09-04 17:55 修改: 2018-01-05 02:29
|
org.apache.httpcomponents:httpclient |
CVE-2012-6153 |
高危 |
4.1.2 |
4.2.3 |
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-6153
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-09-04 17:55 修改: 2018-01-05 02:29
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.6.5 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.6.5 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
org.apache.logging.log4j:log4j-core |
CVE-2021-45105 |
高危 |
2.11.1 |
2.12.3, 2.17.0, 2.3.1 |
log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45105
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-18 12:15 修改: 2022-10-06 17:31
|
org.apache.santuario:xmlsec |
CVE-2021-40690 |
高危 |
2.2.1 |
2.2.3, 2.1.7 |
xml-security: XPath Transform abuse allows for information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40690
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-09-19 18:15 修改: 2023-11-07 03:38
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.6.5 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.6.5 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.6.5 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
org.apache.spark:spark-core_2.11 |
CVE-2019-10099 |
高危 |
2.1.3 |
2.3.3 |
Sensitive data written to disk unencrypted in Spark
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10099
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-08-07 17:15 修改: 2023-11-07 03:02
|
org.apache.spark:spark-core_2.11 |
CVE-2019-10099 |
高危 |
2.1.3 |
2.3.3 |
Sensitive data written to disk unencrypted in Spark
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10099
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-08-07 17:15 修改: 2023-11-07 03:02
|
org.apache.xmlgraphics:batik-bridge |
CVE-2022-44729 |
高危 |
1.13 |
1.17 |
batik: Server-Side Request Forgery vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44729
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15
|
org.apache.xmlgraphics:batik-svgbrowser |
CVE-2020-11987 |
高危 |
1.13 |
1.14 |
batik: SSRF due to improper input validation by the NodePickerPanel
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11987
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-02-24 18:15 修改: 2024-02-01 01:24
|
org.apache.xmlgraphics:batik-svgrasterizer |
CVE-2022-44729 |
高危 |
1.13 |
1.17 |
batik: Server-Side Request Forgery vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44729
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15
|
org.apache.xmlgraphics:batik-transcoder |
CVE-2022-44729 |
高危 |
1.13 |
1.17 |
batik: Server-Side Request Forgery vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44729
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.6.5 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.6.5 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.1 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.1 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.1 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.1 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
org.codehaus.jettison:jettison |
CVE-2022-40150 |
高危 |
1.3.8 |
1.5.2 |
jettison: memory exhaustion via user-supplied XML or JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24
|
org.codehaus.jettison:jettison |
CVE-2022-45685 |
高危 |
1.3.8 |
1.5.2 |
jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57
|
org.codehaus.jettison:jettison |
CVE-2022-45693 |
高危 |
1.3.8 |
1.5.2 |
jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35
|
org.codehaus.jettison:jettison |
CVE-2023-1436 |
高危 |
1.3.8 |
1.5.4 |
jettison: Uncontrolled Recursion in JSONArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.6.5 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.6.5 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.6.5 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.6.5 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
org.eclipse.jetty:jetty-server |
CVE-2015-2080 |
高危 |
7.6.0.v20120127 |
9.2.9.v20150224 |
jetty: remote unauthenticated credential exposure
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2080
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2016-10-07 14:59 修改: 2019-03-08 11:29
|
org.eclipse.jetty:jetty-server |
CVE-2015-2080 |
高危 |
7.6.0.v20120127 |
9.2.9.v20150224 |
jetty: remote unauthenticated credential exposure
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2080
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2016-10-07 14:59 修改: 2019-03-08 11:29
|
org.eclipse.jetty:jetty-server |
CVE-2017-7656 |
高危 |
7.6.0.v20120127 |
9.3.24.v20180605, 9.4.11.v20180605 |
jetty: HTTP request smuggling using the range header
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7656
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 15:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7656 |
高危 |
7.6.0.v20120127 |
9.3.24.v20180605, 9.4.11.v20180605 |
jetty: HTTP request smuggling using the range header
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7656
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 15:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-9735 |
高危 |
7.6.0.v20120127 |
9.4.6.v20170531, 9.3.20.v20170531, 9.2.22.v20170606 |
jetty: Timing channel attack in util/security/Password.java
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9735
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-06-16 21:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-9735 |
高危 |
7.6.0.v20120127 |
9.4.6.v20170531, 9.3.20.v20170531, 9.2.22.v20170606 |
jetty: Timing channel attack in util/security/Password.java
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9735
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-06-16 21:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2021-28165 |
高危 |
7.6.0.v20120127 |
9.4.39, 10.0.2, 11.0.2 |
jetty: Resource exhaustion when receiving an invalid large TLS frame
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28165
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-01 15:15 修改: 2023-11-07 03:32
|
org.eclipse.jetty:jetty-server |
CVE-2021-28165 |
高危 |
7.6.0.v20120127 |
9.4.39, 10.0.2, 11.0.2 |
jetty: Resource exhaustion when receiving an invalid large TLS frame
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28165
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-01 15:15 修改: 2023-11-07 03:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.6.5 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.6.5 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.6.5 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.6.5 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
org.eclipse.jetty:jetty-server |
CVE-2017-7656 |
高危 |
9.2.16.v20160414 |
9.3.24.v20180605, 9.4.11.v20180605 |
jetty: HTTP request smuggling using the range header
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7656
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 15:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7656 |
高危 |
9.2.16.v20160414 |
9.3.24.v20180605, 9.4.11.v20180605 |
jetty: HTTP request smuggling using the range header
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7656
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 15:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-9735 |
高危 |
9.2.16.v20160414 |
9.4.6.v20170531, 9.3.20.v20170531, 9.2.22.v20170606 |
jetty: Timing channel attack in util/security/Password.java
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9735
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-06-16 21:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-9735 |
高危 |
9.2.16.v20160414 |
9.4.6.v20170531, 9.3.20.v20170531, 9.2.22.v20170606 |
jetty: Timing channel attack in util/security/Password.java
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9735
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-06-16 21:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2021-28165 |
高危 |
9.2.16.v20160414 |
9.4.39, 10.0.2, 11.0.2 |
jetty: Resource exhaustion when receiving an invalid large TLS frame
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28165
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-01 15:15 修改: 2023-11-07 03:32
|
org.eclipse.jetty:jetty-server |
CVE-2021-28165 |
高危 |
9.2.16.v20160414 |
9.4.39, 10.0.2, 11.0.2 |
jetty: Resource exhaustion when receiving an invalid large TLS frame
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28165
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-01 15:15 修改: 2023-11-07 03:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.6.5 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.6.5 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.6.5 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.6.5 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.6.5 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.6.5 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
org.eclipse.jetty:jetty-server |
CVE-2017-7656 |
高危 |
9.3.19.v20170502 |
9.3.24.v20180605, 9.4.11.v20180605 |
jetty: HTTP request smuggling using the range header
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7656
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-06-26 15:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7656 |
高危 |
9.3.19.v20170502 |
9.3.24.v20180605, 9.4.11.v20180605 |
jetty: HTTP request smuggling using the range header
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7656
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 15:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7656 |
高危 |
9.3.19.v20170502 |
9.3.24.v20180605, 9.4.11.v20180605 |
jetty: HTTP request smuggling using the range header
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7656
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 15:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7656 |
高危 |
9.3.19.v20170502 |
9.3.24.v20180605, 9.4.11.v20180605 |
jetty: HTTP request smuggling using the range header
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7656
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-26 15:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-9735 |
高危 |
9.3.19.v20170502 |
9.4.6.v20170531, 9.3.20.v20170531, 9.2.22.v20170606 |
jetty: Timing channel attack in util/security/Password.java
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9735
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-06-16 21:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-9735 |
高危 |
9.3.19.v20170502 |
9.4.6.v20170531, 9.3.20.v20170531, 9.2.22.v20170606 |
jetty: Timing channel attack in util/security/Password.java
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9735
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-06-16 21:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-9735 |
高危 |
9.3.19.v20170502 |
9.4.6.v20170531, 9.3.20.v20170531, 9.2.22.v20170606 |
jetty: Timing channel attack in util/security/Password.java
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9735
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-06-16 21:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-9735 |
高危 |
9.3.19.v20170502 |
9.4.6.v20170531, 9.3.20.v20170531, 9.2.22.v20170606 |
jetty: Timing channel attack in util/security/Password.java
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9735
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-06-16 21:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2018-12545 |
高危 |
9.3.19.v20170502 |
9.4.12.v20180830, 9.3.25.v20180904 |
jetty: large settings frames causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12545
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-27 20:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2018-12545 |
高危 |
9.3.19.v20170502 |
9.4.12.v20180830, 9.3.25.v20180904 |
jetty: large settings frames causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12545
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-03-27 20:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2018-12545 |
高危 |
9.3.19.v20170502 |
9.4.12.v20180830, 9.3.25.v20180904 |
jetty: large settings frames causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12545
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-03-27 20:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2018-12545 |
高危 |
9.3.19.v20170502 |
9.4.12.v20180830, 9.3.25.v20180904 |
jetty: large settings frames causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12545
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-03-27 20:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2021-28165 |
高危 |
9.3.19.v20170502 |
9.4.39, 10.0.2, 11.0.2 |
jetty: Resource exhaustion when receiving an invalid large TLS frame
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28165
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-01 15:15 修改: 2023-11-07 03:32
|
org.eclipse.jetty:jetty-server |
CVE-2021-28165 |
高危 |
9.3.19.v20170502 |
9.4.39, 10.0.2, 11.0.2 |
jetty: Resource exhaustion when receiving an invalid large TLS frame
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28165
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-01 15:15 修改: 2023-11-07 03:32
|
org.eclipse.jetty:jetty-server |
CVE-2021-28165 |
高危 |
9.3.19.v20170502 |
9.4.39, 10.0.2, 11.0.2 |
jetty: Resource exhaustion when receiving an invalid large TLS frame
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28165
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-01 15:15 修改: 2023-11-07 03:32
|
org.eclipse.jetty:jetty-server |
CVE-2021-28165 |
高危 |
9.3.19.v20170502 |
9.4.39, 10.0.2, 11.0.2 |
jetty: Resource exhaustion when receiving an invalid large TLS frame
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28165
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-01 15:15 修改: 2023-11-07 03:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
org.eclipse.jetty:jetty-server |
CVE-2017-7656 |
高危 |
9.3.20.v20170531 |
9.3.24.v20180605, 9.4.11.v20180605 |
jetty: HTTP request smuggling using the range header
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7656
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-06-26 15:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2018-12545 |
高危 |
9.3.20.v20170531 |
9.4.12.v20180830, 9.3.25.v20180904 |
jetty: large settings frames causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12545
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-03-27 20:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2021-28165 |
高危 |
9.3.20.v20170531 |
9.4.39, 10.0.2, 11.0.2 |
jetty: Resource exhaustion when receiving an invalid large TLS frame
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28165
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-01 15:15 修改: 2023-11-07 03:32
|
org.eclipse.jetty:jetty-webapp |
CVE-2020-27216 |
高危 |
7.6.0.v20120127 |
9.4.33.v20201020, 10.0.0.beta3, 11.0.0.beta3 |
jetty: local temporary directory hijacking vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27216
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-10-23 13:15 修改: 2023-11-07 03:20
|
org.eclipse.jetty:jetty-webapp |
CVE-2020-27216 |
高危 |
7.6.0.v20120127 |
9.4.33.v20201020, 10.0.0.beta3, 11.0.0.beta3 |
jetty: local temporary directory hijacking vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27216
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-10-23 13:15 修改: 2023-11-07 03:20
|
org.eclipse.jetty:jetty-webapp |
CVE-2020-27216 |
高危 |
9.3.19.v20170502 |
9.4.33.v20201020, 10.0.0.beta3, 11.0.0.beta3 |
jetty: local temporary directory hijacking vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27216
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-10-23 13:15 修改: 2023-11-07 03:20
|
org.eclipse.jetty:jetty-webapp |
CVE-2020-27216 |
高危 |
9.3.19.v20170502 |
9.4.33.v20201020, 10.0.0.beta3, 11.0.0.beta3 |
jetty: local temporary directory hijacking vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27216
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-10-23 13:15 修改: 2023-11-07 03:20
|
org.eclipse.jetty:jetty-webapp |
CVE-2020-27216 |
高危 |
9.3.19.v20170502 |
9.4.33.v20201020, 10.0.0.beta3, 11.0.0.beta3 |
jetty: local temporary directory hijacking vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27216
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-10-23 13:15 修改: 2023-11-07 03:20
|
org.eclipse.jetty:jetty-webapp |
CVE-2020-27216 |
高危 |
9.3.19.v20170502 |
9.4.33.v20201020, 10.0.0.beta3, 11.0.0.beta3 |
jetty: local temporary directory hijacking vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27216
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-10-23 13:15 修改: 2023-11-07 03:20
|
org.eclipse.jetty:jetty-webapp |
CVE-2020-27216 |
高危 |
9.3.19.v20170502 |
9.4.33.v20201020, 10.0.0.beta3, 11.0.0.beta3 |
jetty: local temporary directory hijacking vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27216
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-10-23 13:15 修改: 2023-11-07 03:20
|
org.eclipse.jetty:jetty-webapp |
CVE-2020-27216 |
高危 |
9.3.20.v20170531 |
9.4.33.v20201020, 10.0.0.beta3, 11.0.0.beta3 |
jetty: local temporary directory hijacking vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27216
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-10-23 13:15 修改: 2023-11-07 03:20
|
org.eclipse.jetty:jetty-webapp |
CVE-2020-27216 |
高危 |
9.3.20.v20170531 |
9.4.33.v20201020, 10.0.0.beta3, 11.0.0.beta3 |
jetty: local temporary directory hijacking vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27216
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-10-23 13:15 修改: 2023-11-07 03:20
|
org.java-websocket:Java-WebSocket |
CVE-2020-11050 |
高危 |
1.3.8 |
1.5.0 |
java-websocket: WebSocketClient does not perform SSL hostname validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11050
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-05-07 21:15 修改: 2021-10-07 17:19
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
org.jboss.netty:netty |
CVE-2015-2156 |
高危 |
3.2.8.Final |
3.9.8.Final, 3.10.3.Final |
netty: HttpOnly cookie bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-2156
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-10-18 15:29 修改: 2023-11-07 02:25
|
org.jboss.netty:netty |
CVE-2019-16869 |
高危 |
3.2.8.Final |
4.0.0 |
netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06
|
org.jboss.netty:netty |
CVE-2021-37136 |
高危 |
3.2.8.Final |
4.0.0 |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
org.jboss.netty:netty |
CVE-2021-37137 |
高危 |
3.2.8.Final |
4.0.0 |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
org.json:json |
CVE-2022-45688 |
高危 |
20140107 |
20230227 |
json stack overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16
|
org.json:json |
CVE-2022-45688 |
高危 |
20140107 |
20230227 |
json stack overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16
|
org.json:json |
CVE-2022-45688 |
高危 |
20140107 |
20230227 |
json stack overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16
|
org.json:json |
CVE-2022-45688 |
高危 |
20140107 |
20230227 |
json stack overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16
|
org.json:json |
CVE-2023-5072 |
高危 |
20140107 |
20231013 |
JSON-java: parser confusion leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5072
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-10-12 17:15 修改: 2024-06-21 19:15
|
org.json:json |
CVE-2023-5072 |
高危 |
20140107 |
20231013 |
JSON-java: parser confusion leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5072
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-10-12 17:15 修改: 2024-06-21 19:15
|
org.json:json |
CVE-2023-5072 |
高危 |
20140107 |
20231013 |
JSON-java: parser confusion leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5072
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-10-12 17:15 修改: 2024-06-21 19:15
|
org.json:json |
CVE-2023-5072 |
高危 |
20140107 |
20231013 |
JSON-java: parser confusion leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5072
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-10-12 17:15 修改: 2024-06-21 19:15
|
org.jsoup:jsoup |
CVE-2021-37714 |
高危 |
1.10.3 |
1.14.2 |
jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37714
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-08-18 15:15 修改: 2023-11-07 03:37
|
org.jsoup:jsoup |
CVE-2021-37714 |
高危 |
1.10.3 |
1.14.2 |
jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37714
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-08-18 15:15 修改: 2023-11-07 03:37
|
org.jsoup:jsoup |
CVE-2021-37714 |
高危 |
1.11.2 |
1.14.2 |
jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37714
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-08-18 15:15 修改: 2023-11-07 03:37
|
org.mybatis:mybatis |
CVE-2020-26945 |
高危 |
3.5.5 |
3.5.6 |
mybatis: mishandles deserialization of object streams which could result in remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26945
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2020-10-10 20:15 修改: 2020-10-26 15:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.6.5 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
org.postgresql:postgresql |
CVE-2020-13692 |
高危 |
42.2.2 |
42.2.13 |
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13692
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-06-04 16:15 修改: 2023-11-07 03:16
|
org.postgresql:postgresql |
CVE-2020-13692 |
高危 |
42.2.2 |
42.2.13 |
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13692
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-06-04 16:15 修改: 2023-11-07 03:16
|
org.postgresql:postgresql |
CVE-2022-21724 |
高危 |
42.2.2 |
42.2.25, 42.3.2 |
jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21724
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-02-02 12:15 修改: 2023-11-07 03:43
|
org.postgresql:postgresql |
CVE-2022-21724 |
高危 |
42.2.2 |
42.2.25, 42.3.2 |
jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-21724
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-02-02 12:15 修改: 2023-11-07 03:43
|
org.postgresql:postgresql |
CVE-2022-31197 |
高危 |
42.2.2 |
42.2.26, 42.4.1, 42.3.7 |
postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31197
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-03 19:15 修改: 2023-11-07 03:47
|
org.postgresql:postgresql |
CVE-2022-31197 |
高危 |
42.2.2 |
42.2.26, 42.4.1, 42.3.7 |
postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31197
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-03 19:15 修改: 2023-11-07 03:47
|
org.xerial.snappy:snappy-java |
CVE-2023-34455 |
高危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Unchecked chunk length leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17
|
org.xerial.snappy:snappy-java |
CVE-2023-34455 |
高危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Unchecked chunk length leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17
|
org.xerial.snappy:snappy-java |
CVE-2023-34455 |
高危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Unchecked chunk length leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17
|
org.xerial.snappy:snappy-java |
CVE-2023-34455 |
高危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Unchecked chunk length leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17
|
org.xerial.snappy:snappy-java |
CVE-2023-34455 |
高危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Unchecked chunk length leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17
|
org.xerial.snappy:snappy-java |
CVE-2023-34455 |
高危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Unchecked chunk length leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17
|
org.xerial.snappy:snappy-java |
CVE-2023-34455 |
高危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Unchecked chunk length leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17
|
org.xerial.snappy:snappy-java |
CVE-2023-34455 |
高危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Unchecked chunk length leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17
|
org.xerial.snappy:snappy-java |
CVE-2023-34455 |
高危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Unchecked chunk length leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17
|
org.xerial.snappy:snappy-java |
CVE-2023-43642 |
高危 |
1.0.4.1 |
1.1.10.4 |
snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46
|
org.xerial.snappy:snappy-java |
CVE-2023-43642 |
高危 |
1.0.4.1 |
1.1.10.4 |
snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46
|
org.xerial.snappy:snappy-java |
CVE-2023-43642 |
高危 |
1.0.4.1 |
1.1.10.4 |
snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46
|
org.xerial.snappy:snappy-java |
CVE-2023-43642 |
高危 |
1.0.4.1 |
1.1.10.4 |
snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46
|
org.xerial.snappy:snappy-java |
CVE-2023-43642 |
高危 |
1.0.4.1 |
1.1.10.4 |
snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46
|
org.xerial.snappy:snappy-java |
CVE-2023-43642 |
高危 |
1.0.4.1 |
1.1.10.4 |
snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46
|
org.xerial.snappy:snappy-java |
CVE-2023-43642 |
高危 |
1.0.4.1 |
1.1.10.4 |
snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46
|
org.xerial.snappy:snappy-java |
CVE-2023-43642 |
高危 |
1.0.4.1 |
1.1.10.4 |
snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46
|
org.xerial.snappy:snappy-java |
CVE-2023-43642 |
高危 |
1.0.4.1 |
1.1.10.4 |
snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46
|
org.xerial.snappy:snappy-java |
CVE-2023-34455 |
高危 |
1.0.5 |
1.1.10.1 |
snappy-java: Unchecked chunk length leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17
|
org.xerial.snappy:snappy-java |
CVE-2023-34455 |
高危 |
1.0.5 |
1.1.10.1 |
snappy-java: Unchecked chunk length leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17
|
org.xerial.snappy:snappy-java |
CVE-2023-34455 |
高危 |
1.0.5 |
1.1.10.1 |
snappy-java: Unchecked chunk length leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17
|
org.xerial.snappy:snappy-java |
CVE-2023-43642 |
高危 |
1.0.5 |
1.1.10.4 |
snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46
|
org.xerial.snappy:snappy-java |
CVE-2023-43642 |
高危 |
1.0.5 |
1.1.10.4 |
snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46
|
org.xerial.snappy:snappy-java |
CVE-2023-43642 |
高危 |
1.0.5 |
1.1.10.4 |
snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46
|
org.yaml:snakeyaml |
CVE-2017-18640 |
高危 |
1.15 |
1.26 |
snakeyaml: Billion laughs attack via alias feature
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18640
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-12 03:15 修改: 2023-11-07 02:41
|
org.yaml:snakeyaml |
CVE-2022-1471 |
高危 |
1.15 |
2.0 |
SnakeYaml: Constructor Deserialization Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15
|
org.yaml:snakeyaml |
CVE-2022-25857 |
高危 |
1.15 |
1.31 |
snakeyaml: Denial of Service due to missing nested depth limitation for collections
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25857
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-30 05:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2017-18640 |
高危 |
1.17 |
1.26 |
snakeyaml: Billion laughs attack via alias feature
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18640
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-12 03:15 修改: 2023-11-07 02:41
|
org.yaml:snakeyaml |
CVE-2022-1471 |
高危 |
1.17 |
2.0 |
SnakeYaml: Constructor Deserialization Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15
|
org.yaml:snakeyaml |
CVE-2022-25857 |
高危 |
1.17 |
1.31 |
snakeyaml: Denial of Service due to missing nested depth limitation for collections
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25857
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-30 05:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2017-18640 |
高危 |
1.24 |
1.26 |
snakeyaml: Billion laughs attack via alias feature
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18640
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-12-12 03:15 修改: 2023-11-07 02:41
|
org.yaml:snakeyaml |
CVE-2022-1471 |
高危 |
1.24 |
2.0 |
SnakeYaml: Constructor Deserialization Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15
|
org.yaml:snakeyaml |
CVE-2022-25857 |
高危 |
1.24 |
1.31 |
snakeyaml: Denial of Service due to missing nested depth limitation for collections
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25857
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-30 05:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2017-18640 |
高危 |
1.25 |
1.26 |
snakeyaml: Billion laughs attack via alias feature
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18640
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2019-12-12 03:15 修改: 2023-11-07 02:41
|
org.yaml:snakeyaml |
CVE-2022-1471 |
高危 |
1.25 |
2.0 |
SnakeYaml: Constructor Deserialization Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15
|
org.yaml:snakeyaml |
CVE-2022-25857 |
高危 |
1.25 |
1.31 |
snakeyaml: Denial of Service due to missing nested depth limitation for collections
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25857
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-08-30 05:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-1471 |
高危 |
1.26 |
2.0 |
SnakeYaml: Constructor Deserialization Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15
|
org.yaml:snakeyaml |
CVE-2022-25857 |
高危 |
1.26 |
1.31 |
snakeyaml: Denial of Service due to missing nested depth limitation for collections
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25857
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-08-30 05:15 修改: 2024-03-15 11:15
|
software.amazon.ion:ion-java |
CVE-2024-21634 |
高危 |
1.0.2 |
1.10.5 |
ion-java: ion-java: Ion Java StackOverflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21634
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-01-03 23:15 修改: 2024-01-10 16:38
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.7.0.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.7.0.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.7.0.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.7.0.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.7.0.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.7.0.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.7.0.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.7.0.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.7.0.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.7.0.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.7.0.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.7.0.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.7.0.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
org.apache.commons:commons-compress |
CVE-2018-11771 |
中危 |
1.9 |
1.18 |
apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11771
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-08-16 15:29 修改: 2023-11-07 02:51
|
org.apache.commons:commons-compress |
CVE-2018-11771 |
中危 |
1.9 |
1.18 |
apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11771
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-08-16 15:29 修改: 2023-11-07 02:51
|
org.apache.commons:commons-compress |
CVE-2018-11771 |
中危 |
1.9 |
1.18 |
apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11771
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-08-16 15:29 修改: 2023-11-07 02:51
|
org.apache.commons:commons-compress |
CVE-2018-11771 |
中危 |
1.9 |
1.18 |
apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11771
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-08-16 15:29 修改: 2023-11-07 02:51
|
org.apache.commons:commons-compress |
CVE-2018-11771 |
中危 |
1.9 |
1.18 |
apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11771
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-08-16 15:29 修改: 2023-11-07 02:51
|
org.apache.commons:commons-configuration2 |
CVE-2024-29131 |
中危 |
2.1.1 |
2.10.1 |
commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29131
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-03-21 09:15 修改: 2024-12-13 14:15
|
org.apache.commons:commons-configuration2 |
CVE-2024-29131 |
中危 |
2.1.1 |
2.10.1 |
commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29131
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-03-21 09:15 修改: 2024-12-13 14:15
|
org.apache.commons:commons-configuration2 |
CVE-2024-29131 |
中危 |
2.1.1 |
2.10.1 |
commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29131
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-03-21 09:15 修改: 2024-12-13 14:15
|
org.apache.commons:commons-configuration2 |
CVE-2024-29131 |
中危 |
2.1.1 |
2.10.1 |
commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29131
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-03-21 09:15 修改: 2024-12-13 14:15
|
org.apache.commons:commons-configuration2 |
CVE-2024-29131 |
中危 |
2.1.1 |
2.10.1 |
commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29131
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-03-21 09:15 修改: 2024-12-13 14:15
|
org.apache.commons:commons-configuration2 |
CVE-2024-29131 |
中危 |
2.1.1 |
2.10.1 |
commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29131
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-03-21 09:15 修改: 2024-12-13 14:15
|
org.apache.commons:commons-configuration2 |
CVE-2024-29131 |
中危 |
2.1.1 |
2.10.1 |
commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29131
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-03-21 09:15 修改: 2024-12-13 14:15
|
org.apache.commons:commons-configuration2 |
CVE-2024-29133 |
中危 |
2.1.1 |
2.10.1 |
commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29133
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-03-21 09:15 修改: 2024-11-04 17:35
|
org.apache.commons:commons-configuration2 |
CVE-2024-29133 |
中危 |
2.1.1 |
2.10.1 |
commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29133
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-03-21 09:15 修改: 2024-11-04 17:35
|
org.apache.commons:commons-configuration2 |
CVE-2024-29133 |
中危 |
2.1.1 |
2.10.1 |
commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29133
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-03-21 09:15 修改: 2024-11-04 17:35
|
org.apache.commons:commons-configuration2 |
CVE-2024-29133 |
中危 |
2.1.1 |
2.10.1 |
commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29133
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-03-21 09:15 修改: 2024-11-04 17:35
|
org.apache.commons:commons-configuration2 |
CVE-2024-29133 |
中危 |
2.1.1 |
2.10.1 |
commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29133
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-03-21 09:15 修改: 2024-11-04 17:35
|
org.apache.commons:commons-configuration2 |
CVE-2024-29133 |
中危 |
2.1.1 |
2.10.1 |
commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29133
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-03-21 09:15 修改: 2024-11-04 17:35
|
org.apache.commons:commons-configuration2 |
CVE-2024-29133 |
中危 |
2.1.1 |
2.10.1 |
commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29133
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-03-21 09:15 修改: 2024-11-04 17:35
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.7.0.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.7.0.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.7.0.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.7.0.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.7.0.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.7.0.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.7.0.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.7.0.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.7.0.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.7.0.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.7.0.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.7.0.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.7.0.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.7.0.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.7.0.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.7.0.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.7.0.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.7.0.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.7.0.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.6.5 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.8.0.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.8.0.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.8.0.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.8.0.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.8.0.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.8.0.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.8.0.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.8.0.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.8.0.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.8.0.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.8.0.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.8.0.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.6.5 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.6.5 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.6.5 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.7.8 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.7.8 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.7.8 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.12.0 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.15.0 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.17.2 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.4.0 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.4.0 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.4.0 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.4.0 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.4.0 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.4.0 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.6.0 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.6.0 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
io.netty:netty-codec-http |
CVE-2021-21290 |
中危 |
4.1.49.Final |
4.1.59.Final |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty-codec-http |
CVE-2021-43797 |
中危 |
4.1.49.Final |
4.1.71.Final |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty-codec-http |
CVE-2022-24823 |
中危 |
4.1.49.Final |
4.1.77.Final |
netty: world readable temporary file containing sensitive data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24823
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-05-06 12:15 修改: 2022-12-03 14:25
|
io.netty:netty-codec-http |
CVE-2024-29025 |
中危 |
4.1.49.Final |
4.1.108.Final |
netty-codec-http: Allocation of Resources Without Limits or Throttling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29025
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-03-25 20:15 修改: 2024-06-21 22:15
|
io.netty:netty-common |
CVE-2024-47535 |
中危 |
4.1.17.Final |
4.1.115 |
netty: Denial of Service attack on windows app using Netty
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01
|
io.netty:netty-common |
CVE-2024-47535 |
中危 |
4.1.17.Final |
4.1.115 |
netty: Denial of Service attack on windows app using Netty
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01
|
io.netty:netty-common |
CVE-2024-47535 |
中危 |
4.1.45.Final |
4.1.115 |
netty: Denial of Service attack on windows app using Netty
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01
|
io.netty:netty-common |
CVE-2024-47535 |
中危 |
4.1.45.Final |
4.1.115 |
netty: Denial of Service attack on windows app using Netty
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01
|
io.netty:netty-common |
CVE-2024-47535 |
中危 |
4.1.49.Final |
4.1.115 |
netty: Denial of Service attack on windows app using Netty
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
io.netty:netty-handler |
CVE-2023-34462 |
中危 |
4.1.45.Final |
4.1.94.Final |
netty: SniHandler 16MB allocation leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34462
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-22 23:15 修改: 2024-06-21 19:15
|
io.netty:netty-handler |
CVE-2023-34462 |
中危 |
4.1.45.Final |
4.1.94.Final |
netty: SniHandler 16MB allocation leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34462
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-22 23:15 修改: 2024-06-21 19:15
|
io.netty:netty-handler |
CVE-2023-34462 |
中危 |
4.1.49.Final |
4.1.94.Final |
netty: SniHandler 16MB allocation leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34462
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-22 23:15 修改: 2024-06-21 19:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.7.8 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.6.5 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.9.5 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.0.3 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.0.3 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.0.3 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.0.3 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.0.3 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.0.3 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.0.3 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.2.1 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.9.5 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.6.5 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
11.0.2 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
11.0.2 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
11.0.2 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
11.0.2 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
11.0.2 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
11.0.2 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
11.0.2 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
11.0.2 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
11.0.2 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
11.0.2 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
11.0.2 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
11.0.2 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
11.0.2 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
11.0.2 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
12.0.1 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
12.0.1 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
12.0.1 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
12.0.1 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.5 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.5 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
12.0.1 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
2.2 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
2.2 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.1 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.1 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.1 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.1 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.1 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.1 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.1 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
org.apache.hive:hive-exec |
CVE-2017-12625 |
中危 |
2.1.0 |
2.1.2, 2.2.1, 2.3.1 |
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12625
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-11-01 13:29 修改: 2017-11-21 19:41
|
org.apache.hive:hive-exec |
CVE-2017-12625 |
中危 |
2.1.0 |
2.1.2, 2.2.1, 2.3.1 |
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12625
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-11-01 13:29 修改: 2017-11-21 19:41
|
org.apache.hive:hive-exec |
CVE-2017-12625 |
中危 |
2.1.0 |
2.1.2, 2.2.1, 2.3.1 |
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12625
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-11-01 13:29 修改: 2017-11-21 19:41
|
org.apache.hive:hive-exec |
CVE-2017-12625 |
中危 |
2.1.0 |
2.1.2, 2.2.1, 2.3.1 |
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12625
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2017-11-01 13:29 修改: 2017-11-21 19:41
|
org.apache.hive:hive-exec |
CVE-2017-12625 |
中危 |
2.1.0 |
2.1.2, 2.2.1, 2.3.1 |
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12625
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-11-01 13:29 修改: 2017-11-21 19:41
|
org.apache.hive:hive-exec |
CVE-2017-12625 |
中危 |
2.1.0 |
2.1.2, 2.2.1, 2.3.1 |
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12625
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-11-01 13:29 修改: 2017-11-21 19:41
|
org.apache.hive:hive-exec |
CVE-2017-12625 |
中危 |
2.1.0 |
2.1.2, 2.2.1, 2.3.1 |
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12625
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-11-01 13:29 修改: 2017-11-21 19:41
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
org.apache.hive:hive-exec |
CVE-2017-12625 |
中危 |
2.1.1 |
2.1.2, 2.2.1, 2.3.1 |
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12625
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-11-01 13:29 修改: 2017-11-21 19:41
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
org.apache.hive:hive-jdbc |
CVE-2018-1314 |
中危 |
1.1.1 |
2.3.4, 3.1.1 |
Moderate severity vulnerability that affects org.apache.hive:hive-jdbc
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1314
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-11-08 14:29 修改: 2023-11-07 02:55
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
org.apache.hive:hive-jdbc |
CVE-2018-1314 |
中危 |
2.1.0 |
2.3.4, 3.1.1 |
Moderate severity vulnerability that affects org.apache.hive:hive-jdbc
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1314
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-11-08 14:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-jdbc |
CVE-2018-1314 |
中危 |
2.1.0 |
2.3.4, 3.1.1 |
Moderate severity vulnerability that affects org.apache.hive:hive-jdbc
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1314
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-11-08 14:29 修改: 2023-11-07 02:55
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
org.apache.hive:hive-service |
CVE-2017-12625 |
中危 |
2.1.0 |
2.1.2, 2.2.1, 2.3.1 |
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12625
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-11-01 13:29 修改: 2017-11-21 19:41
|
org.apache.hive:hive-service |
CVE-2017-12625 |
中危 |
2.1.0 |
2.1.2, 2.2.1, 2.3.1 |
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-12625
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2017-11-01 13:29 修改: 2017-11-21 19:41
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
org.apache.httpcomponents:httpclient |
CVE-2011-1498 |
中危 |
4.0.1 |
4.1.1 |
Apache HttpClient 4.x before 4.1.1 in Apache HttpComponents, when used ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2011-1498
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2011-07-07 21:55 修改: 2011-09-22 03:30
|
org.apache.httpcomponents:httpclient |
CVE-2011-1498 |
中危 |
4.0.1 |
4.1.1 |
Apache HttpClient 4.x before 4.1.1 in Apache HttpComponents, when used ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2011-1498
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2011-07-07 21:55 修改: 2011-09-22 03:30
|
org.apache.httpcomponents:httpclient |
CVE-2014-3577 |
中危 |
4.0.1 |
4.3.5 |
CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-3577
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-08-21 14:55 修改: 2023-11-07 02:20
|
org.apache.httpcomponents:httpclient |
CVE-2014-3577 |
中危 |
4.0.1 |
4.3.5 |
CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-3577
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-08-21 14:55 修改: 2023-11-07 02:20
|
org.apache.httpcomponents:httpclient |
CVE-2015-5262 |
中危 |
4.0.1 |
4.3.6 |
httpcomponents-core: missing HTTPS connection timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5262
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2015-10-27 16:59 修改: 2023-02-13 00:52
|
org.apache.httpcomponents:httpclient |
CVE-2015-5262 |
中危 |
4.0.1 |
4.3.6 |
httpcomponents-core: missing HTTPS connection timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5262
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2015-10-27 16:59 修改: 2023-02-13 00:52
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.0.1 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.0.1 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
org.apache.httpcomponents:httpclient |
CVE-2014-3577 |
中危 |
4.1.2 |
4.3.5 |
CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-3577
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-08-21 14:55 修改: 2023-11-07 02:20
|
org.apache.httpcomponents:httpclient |
CVE-2014-3577 |
中危 |
4.1.2 |
4.3.5 |
CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-3577
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-08-21 14:55 修改: 2023-11-07 02:20
|
org.apache.httpcomponents:httpclient |
CVE-2014-3577 |
中危 |
4.1.2 |
4.3.5 |
CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-3577
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-08-21 14:55 修改: 2023-11-07 02:20
|
org.apache.httpcomponents:httpclient |
CVE-2015-5262 |
中危 |
4.1.2 |
4.3.6 |
httpcomponents-core: missing HTTPS connection timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5262
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2015-10-27 16:59 修改: 2023-02-13 00:52
|
org.apache.httpcomponents:httpclient |
CVE-2015-5262 |
中危 |
4.1.2 |
4.3.6 |
httpcomponents-core: missing HTTPS connection timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5262
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2015-10-27 16:59 修改: 2023-02-13 00:52
|
org.apache.httpcomponents:httpclient |
CVE-2015-5262 |
中危 |
4.1.2 |
4.3.6 |
httpcomponents-core: missing HTTPS connection timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5262
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2015-10-27 16:59 修改: 2023-02-13 00:52
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.1.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.1.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.1.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2014-3577 |
中危 |
4.2.5 |
4.3.5 |
CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-3577
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-08-21 14:55 修改: 2023-11-07 02:20
|
org.apache.httpcomponents:httpclient |
CVE-2014-3577 |
中危 |
4.2.5 |
4.3.5 |
CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-3577
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-08-21 14:55 修改: 2023-11-07 02:20
|
org.apache.httpcomponents:httpclient |
CVE-2014-3577 |
中危 |
4.2.5 |
4.3.5 |
CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-3577
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-08-21 14:55 修改: 2023-11-07 02:20
|
org.apache.httpcomponents:httpclient |
CVE-2015-5262 |
中危 |
4.2.5 |
4.3.6 |
httpcomponents-core: missing HTTPS connection timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5262
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2015-10-27 16:59 修改: 2023-02-13 00:52
|
org.apache.httpcomponents:httpclient |
CVE-2015-5262 |
中危 |
4.2.5 |
4.3.6 |
httpcomponents-core: missing HTTPS connection timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5262
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2015-10-27 16:59 修改: 2023-02-13 00:52
|
org.apache.httpcomponents:httpclient |
CVE-2015-5262 |
中危 |
4.2.5 |
4.3.6 |
httpcomponents-core: missing HTTPS connection timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-5262
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2015-10-27 16:59 修改: 2023-02-13 00:52
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.2.5 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.2.5 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.2.5 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.4 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.4 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.10 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.10 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.2 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.3 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.3 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.3 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.3 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.3 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.3 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.3 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.8 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
org.apache.logging.log4j:log4j-core |
CVE-2021-44832 |
中危 |
2.11.1 |
2.3.2, 2.12.4, 2.17.1 |
log4j-core: remote code execution via JDBC Appender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44832
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-28 20:15 修改: 2023-11-07 03:39
|
org.apache.pdfbox:pdfbox |
CVE-2021-27807 |
中危 |
2.0.22 |
2.0.23 |
pdfbox: infinite loop while loading a crafted PDF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27807
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-03-19 16:15 修改: 2023-11-07 03:32
|
org.apache.pdfbox:pdfbox |
CVE-2021-27906 |
中危 |
2.0.22 |
2.0.23 |
pdfbox: OutOfMemory-Exception while loading a crafted PDF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27906
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-03-19 16:15 修改: 2023-11-07 03:32
|
org.apache.pdfbox:pdfbox |
CVE-2021-31811 |
中危 |
2.0.22 |
2.0.24 |
pdfbox: OutOfMemory-Exception while loading a crafted PDF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31811
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-06-12 10:15 修改: 2023-11-07 03:35
|
org.apache.pdfbox:pdfbox |
CVE-2021-31812 |
中危 |
2.0.22 |
2.0.24 |
pdfbox: infinite loop while loading a crafted PDF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31812
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-06-12 10:15 修改: 2023-11-07 03:35
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
org.apache.santuario:xmlsec |
CVE-2023-44483 |
中危 |
2.2.1 |
2.3.4, 2.2.6, 3.0.3 |
santuario: Private Key disclosure in debug-log output
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44483
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2023-10-20 10:15 修改: 2023-10-27 18:49
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
org.apache.spark:spark-core_2.11 |
CVE-2017-7678 |
中危 |
2.1.3 |
2.2.0 |
Moderate severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7678
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-07-12 13:29 修改: 2017-07-26 18:06
|
org.apache.spark:spark-core_2.11 |
CVE-2017-7678 |
中危 |
2.1.3 |
2.2.0 |
Moderate severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7678
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2017-07-12 13:29 修改: 2017-07-26 18:06
|
org.apache.spark:spark-core_2.11 |
CVE-2018-11770 |
中危 |
2.1.3 |
|
spark: Missing authentication allows users to run driver programs via the REST API
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11770
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-08-13 16:29 修改: 2024-06-10 19:15
|
org.apache.spark:spark-core_2.11 |
CVE-2018-11770 |
中危 |
2.1.3 |
|
spark: Missing authentication allows users to run driver programs via the REST API
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11770
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-08-13 16:29 修改: 2024-06-10 19:15
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
org.apache.xmlgraphics:batik-script |
CVE-2022-44730 |
中危 |
1.13 |
1.17 |
batik: Server-Side Request Forgery vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44730
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
net.minidev:json-smart |
CVE-2021-27568 |
中危 |
2.2.1 |
1.3.2, 2.4.1, 2.3.1 |
json-smart: uncaught exception may lead to crash or information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27568
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-02-23 02:15 修改: 2023-11-07 03:31
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
net.minidev:json-smart |
CVE-2021-27568 |
中危 |
2.3 |
1.3.2, 2.4.1, 2.3.1 |
json-smart: uncaught exception may lead to crash or information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27568
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-23 02:15 修改: 2023-11-07 03:31
|
net.minidev:json-smart |
CVE-2021-27568 |
中危 |
2.3 |
1.3.2, 2.4.1, 2.3.1 |
json-smart: uncaught exception may lead to crash or information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27568
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-23 02:15 修改: 2023-11-07 03:31
|
net.minidev:json-smart |
CVE-2021-27568 |
中危 |
2.3 |
1.3.2, 2.4.1, 2.3.1 |
json-smart: uncaught exception may lead to crash or information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27568
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-23 02:15 修改: 2023-11-07 03:31
|
net.minidev:json-smart |
CVE-2021-27568 |
中危 |
2.3 |
1.3.2, 2.4.1, 2.3.1 |
json-smart: uncaught exception may lead to crash or information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27568
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-02-23 02:15 修改: 2023-11-07 03:31
|
net.minidev:json-smart |
CVE-2021-27568 |
中危 |
2.3 |
1.3.2, 2.4.1, 2.3.1 |
json-smart: uncaught exception may lead to crash or information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27568
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-02-23 02:15 修改: 2023-11-07 03:31
|
net.minidev:json-smart |
CVE-2021-27568 |
中危 |
2.3 |
1.3.2, 2.4.1, 2.3.1 |
json-smart: uncaught exception may lead to crash or information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27568
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-02-23 02:15 修改: 2023-11-07 03:31
|
net.minidev:json-smart |
CVE-2021-27568 |
中危 |
2.3 |
1.3.2, 2.4.1, 2.3.1 |
json-smart: uncaught exception may lead to crash or information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27568
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-02-23 02:15 修改: 2023-11-07 03:31
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
12.0.1 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
14.0 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
14.0 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
14.0.1 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
14.0.1 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
14.0.1 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
14.0.1 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
14.0.1 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
14.0.1 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
14.0.1 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
14.0.1 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
14.0.1 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
14.0.1 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
14.0.1 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
14.0.1 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
14.0.1 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
14.0.1 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
18.0 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
18.0 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
19.0 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
19.0 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.10.5.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.10.5.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.10.5.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.10.5.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.10.5.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.10.5.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.10.5.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.10.5.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.10.5.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.10.5.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.10.5.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.10.5.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.10.5.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.10.5.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.10.5.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.10.5.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.10.5.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.10.5.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.1 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.10.5.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
org.apache.calcite:calcite-core |
CVE-2020-13955 |
中危 |
1.0.0-incubating |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.10.5.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
19.0 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
org.codehaus.jettison:jettison |
CVE-2022-40149 |
中危 |
1.3.8 |
1.5.1 |
jettison: parser crash by stackoverflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
7.6.0.v20120127 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
7.6.0.v20120127 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.2.16.v20160414 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.2.16.v20160414 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.2.16.v20160414 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.2.16.v20160414 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.3.19.v20170502 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.3.19.v20170502 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.3.19.v20170502 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.3.19.v20170502 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.3.19.v20170502 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.3.19.v20170502 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.3.19.v20170502 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.3.19.v20170502 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.3.20.v20170531 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.3.20.v20170531 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.3.20.v20170531 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.3.20.v20170531 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.apache.calcite:calcite-core |
CVE-2020-13955 |
中危 |
1.16.0 |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
org.apache.calcite:calcite-core |
CVE-2020-13955 |
中危 |
1.16.0 |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
19.0 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
org.apache.calcite:calcite-core |
CVE-2020-13955 |
中危 |
1.19.0 |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
26.0-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
27.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
27.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
org.apache.calcite:calcite-core |
CVE-2020-13955 |
中危 |
1.2.0-incubating |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
org.apache.calcite:calcite-core |
CVE-2020-13955 |
中危 |
1.2.0-incubating |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
org.apache.calcite:calcite-core |
CVE-2020-13955 |
中危 |
1.2.0-incubating |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
27.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
27.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
org.eclipse.jetty:jetty-server |
CVE-2011-4461 |
中危 |
7.6.0.v20120127 |
8.1.0.RC4 |
jetty: hash table collisions CPU usage DoS (oCERT-2011-003)
漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4461
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2011-12-30 01:55 修改: 2019-03-08 11:29
|
org.eclipse.jetty:jetty-server |
CVE-2011-4461 |
中危 |
7.6.0.v20120127 |
8.1.0.RC4 |
jetty: hash table collisions CPU usage DoS (oCERT-2011-003)
漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4461
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2011-12-30 01:55 修改: 2019-03-08 11:29
|
org.eclipse.jetty:jetty-server |
CVE-2019-10241 |
中危 |
7.6.0.v20120127 |
9.2.27.v20190403, 9.3.26.v20190403, 9.4.16.v20190411 |
jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10241
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10241 |
中危 |
7.6.0.v20120127 |
9.2.27.v20190403, 9.3.26.v20190403, 9.4.16.v20190411 |
jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10241
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10247 |
中危 |
7.6.0.v20120127 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: error path information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10247
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10247 |
中危 |
7.6.0.v20120127 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: error path information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10247
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
7.6.0.v20120127 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
7.6.0.v20120127 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
27.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
27.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
27.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
28.0-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
30.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
org.apache.calcite:calcite-core |
CVE-2020-13955 |
中危 |
1.6.0 |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
org.apache.calcite:calcite-core |
CVE-2020-13955 |
中危 |
1.6.0 |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
org.apache.calcite:calcite-core |
CVE-2020-13955 |
中危 |
1.6.0 |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
org.apache.calcite:calcite-core |
CVE-2020-13955 |
中危 |
1.6.0 |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
org.apache.calcite:calcite-core |
CVE-2020-13955 |
中危 |
1.6.0 |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
org.eclipse.jetty:jetty-server |
CVE-2018-12536 |
中危 |
9.2.16.v20160414 |
9.4.11.v20180605, 9.3.24.v20180605 |
jetty: full server path revealed when using the default Error Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12536
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-27 17:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2018-12536 |
中危 |
9.2.16.v20160414 |
9.4.11.v20180605, 9.3.24.v20180605 |
jetty: full server path revealed when using the default Error Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12536
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-27 17:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2019-10241 |
中危 |
9.2.16.v20160414 |
9.2.27.v20190403, 9.3.26.v20190403, 9.4.16.v20190411 |
jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10241
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10241 |
中危 |
9.2.16.v20160414 |
9.2.27.v20190403, 9.3.26.v20190403, 9.4.16.v20190411 |
jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10241
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10246 |
中危 |
9.2.16.v20160414 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: Directory Listing on Windows reveals Resource Base path
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10246
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10246 |
中危 |
9.2.16.v20160414 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: Directory Listing on Windows reveals Resource Base path
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10246
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10247 |
中危 |
9.2.16.v20160414 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: error path information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10247
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10247 |
中危 |
9.2.16.v20160414 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: error path information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10247
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.2.16.v20160414 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.2.16.v20160414 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.apache.calcite:calcite-core |
CVE-2020-13955 |
中危 |
1.6.0 |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
org.apache.calcite:calcite-core |
CVE-2020-13955 |
中危 |
1.6.0 |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
org.apache.calcite:calcite-druid |
CVE-2020-13955 |
中危 |
1.16.0 |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
org.apache.calcite:calcite-druid |
CVE-2020-13955 |
中危 |
1.16.0 |
1.26.0 |
Missing Authentication for Critical Function in Apache Calcite
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13955
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-10-09 13:15 修改: 2021-07-21 11:39
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.6.5 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.6.5 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.6.2.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.6.2.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.6.2.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.6.2.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
org.eclipse.jetty:jetty-server |
CVE-2018-12536 |
中危 |
9.3.19.v20170502 |
9.4.11.v20180605, 9.3.24.v20180605 |
jetty: full server path revealed when using the default Error Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12536
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-06-27 17:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2018-12536 |
中危 |
9.3.19.v20170502 |
9.4.11.v20180605, 9.3.24.v20180605 |
jetty: full server path revealed when using the default Error Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12536
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-27 17:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2018-12536 |
中危 |
9.3.19.v20170502 |
9.4.11.v20180605, 9.3.24.v20180605 |
jetty: full server path revealed when using the default Error Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12536
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-27 17:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2018-12536 |
中危 |
9.3.19.v20170502 |
9.4.11.v20180605, 9.3.24.v20180605 |
jetty: full server path revealed when using the default Error Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12536
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-06-27 17:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2019-10241 |
中危 |
9.3.19.v20170502 |
9.2.27.v20190403, 9.3.26.v20190403, 9.4.16.v20190411 |
jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10241
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10241 |
中危 |
9.3.19.v20170502 |
9.2.27.v20190403, 9.3.26.v20190403, 9.4.16.v20190411 |
jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10241
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10241 |
中危 |
9.3.19.v20170502 |
9.2.27.v20190403, 9.3.26.v20190403, 9.4.16.v20190411 |
jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10241
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10241 |
中危 |
9.3.19.v20170502 |
9.2.27.v20190403, 9.3.26.v20190403, 9.4.16.v20190411 |
jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10241
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10246 |
中危 |
9.3.19.v20170502 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: Directory Listing on Windows reveals Resource Base path
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10246
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10246 |
中危 |
9.3.19.v20170502 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: Directory Listing on Windows reveals Resource Base path
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10246
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10246 |
中危 |
9.3.19.v20170502 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: Directory Listing on Windows reveals Resource Base path
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10246
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10246 |
中危 |
9.3.19.v20170502 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: Directory Listing on Windows reveals Resource Base path
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10246
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10247 |
中危 |
9.3.19.v20170502 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: error path information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10247
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10247 |
中危 |
9.3.19.v20170502 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: error path information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10247
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10247 |
中危 |
9.3.19.v20170502 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: error path information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10247
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10247 |
中危 |
9.3.19.v20170502 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: error path information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10247
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.3.19.v20170502 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.3.19.v20170502 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.3.19.v20170502 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.3.19.v20170502 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2024-8184 |
中危 |
9.3.19.v20170502 |
12.0.9, 10.0.24, 11.0.24, 9.4.56 |
org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:00
|
org.eclipse.jetty:jetty-server |
CVE-2024-8184 |
中危 |
9.3.19.v20170502 |
12.0.9, 10.0.24, 11.0.24, 9.4.56 |
org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:00
|
org.eclipse.jetty:jetty-server |
CVE-2024-8184 |
中危 |
9.3.19.v20170502 |
12.0.9, 10.0.24, 11.0.24, 9.4.56 |
org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:00
|
org.eclipse.jetty:jetty-server |
CVE-2024-8184 |
中危 |
9.3.19.v20170502 |
12.0.9, 10.0.24, 11.0.24, 9.4.56 |
org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8184
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:00
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.6.2.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.6.2.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.6.2.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.6.2.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.6.2.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
org.eclipse.jetty:jetty-server |
CVE-2018-12536 |
中危 |
9.3.20.v20170531 |
9.4.11.v20180605, 9.3.24.v20180605 |
jetty: full server path revealed when using the default Error Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12536
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-06-27 17:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2019-10241 |
中危 |
9.3.20.v20170531 |
9.2.27.v20190403, 9.3.26.v20190403, 9.4.16.v20190411 |
jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10241
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10246 |
中危 |
9.3.20.v20170531 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: Directory Listing on Windows reveals Resource Base path
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10246
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10247 |
中危 |
9.3.20.v20170531 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: error path information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10247
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.3.20.v20170531 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2024-8184 |
中危 |
9.3.20.v20170531 |
12.0.9, 10.0.24, 11.0.24, 9.4.56 |
org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8184
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:00
|
org.eclipse.jetty:jetty-servlets |
CVE-2021-28169 |
中危 |
7.6.0.v20120127 |
9.4.41, 10.0.3, 11.0.3 |
jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28169
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-06-09 02:15 修改: 2023-11-07 03:32
|
org.eclipse.jetty:jetty-servlets |
CVE-2021-28169 |
中危 |
7.6.0.v20120127 |
9.4.41, 10.0.3, 11.0.3 |
jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28169
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-06-09 02:15 修改: 2023-11-07 03:32
|
org.eclipse.jetty:jetty-servlets |
CVE-2021-28169 |
中危 |
7.6.0.v20120127 |
9.4.41, 10.0.3, 11.0.3 |
jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28169
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-06-09 02:15 修改: 2023-11-07 03:32
|
org.eclipse.jetty:jetty-servlets |
CVE-2021-28169 |
中危 |
9.2.16.v20160414 |
9.4.41, 10.0.3, 11.0.3 |
jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28169
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-06-09 02:15 修改: 2023-11-07 03:32
|
org.eclipse.jetty:jetty-servlets |
CVE-2021-28169 |
中危 |
9.2.16.v20160414 |
9.4.41, 10.0.3, 11.0.3 |
jetty: requests to the ConcatServlet and WelcomeFilter are able to access protected resources within the WEB-INF directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28169
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-06-09 02:15 修改: 2023-11-07 03:32
|
org.eclipse.jetty:jetty-servlets |
CVE-2024-9823 |
中危 |
9.2.16.v20160414 |
9.4.54, 10.0.18, 11.0.18 |
org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9823
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-14 15:15 修改: 2024-10-15 12:57
|
org.eclipse.jetty:jetty-servlets |
CVE-2024-9823 |
中危 |
9.2.16.v20160414 |
9.4.54, 10.0.18, 11.0.18 |
org.eclipse.jetty:jetty-servlets: jetty: Jetty DOS vulnerability on DosFilter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9823
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-10-14 15:15 修改: 2024-10-15 12:57
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.6.2.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.6.2.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.6.2.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.6.2.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2019-20445 |
中危 |
3.6.2.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.6.2.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.6.2.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.6.2.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.6.2.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
org.hibernate.validator:hibernate-validator |
CVE-2020-10693 |
中危 |
6.0.18.Final |
6.1.5.Final, 6.0.20.Final |
hibernate-validator: Improper input validation in the interpolation of constraint error messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10693
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2020-05-06 14:15 修改: 2023-11-07 03:14
|
org.hibernate.validator:hibernate-validator |
CVE-2023-1932 |
中危 |
6.0.18.Final |
6.2.0.Final |
hibernate-validator: rendering of invalid html with SafeHTML leads to HTML injection and XSS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1932
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2024-11-07 10:15 修改: 2024-11-08 19:01
|
org.iq80.snappy:snappy |
CVE-2024-36124 |
中危 |
0.2 |
0.5 |
snappy: tries to read outside the bounds of the given byte arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36124
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-06-03 15:15 修改: 2024-06-03 19:23
|
org.iq80.snappy:snappy |
CVE-2024-36124 |
中危 |
0.2 |
0.5 |
snappy: tries to read outside the bounds of the given byte arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36124
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-06-03 15:15 修改: 2024-06-03 19:23
|
org.iq80.snappy:snappy |
CVE-2024-36124 |
中危 |
0.2 |
0.5 |
snappy: tries to read outside the bounds of the given byte arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36124
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-06-03 15:15 修改: 2024-06-03 19:23
|
org.iq80.snappy:snappy |
CVE-2024-36124 |
中危 |
0.2 |
0.5 |
snappy: tries to read outside the bounds of the given byte arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36124
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-06-03 15:15 修改: 2024-06-03 19:23
|
org.iq80.snappy:snappy |
CVE-2024-36124 |
中危 |
0.2 |
0.5 |
snappy: tries to read outside the bounds of the given byte arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36124
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-06-03 15:15 修改: 2024-06-03 19:23
|
org.iq80.snappy:snappy |
CVE-2024-36124 |
中危 |
0.2 |
0.5 |
snappy: tries to read outside the bounds of the given byte arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36124
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-06-03 15:15 修改: 2024-06-03 19:23
|
org.iq80.snappy:snappy |
CVE-2024-36124 |
中危 |
0.2 |
0.5 |
snappy: tries to read outside the bounds of the given byte arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36124
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2024-06-03 15:15 修改: 2024-06-03 19:23
|
org.iq80.snappy:snappy |
CVE-2024-36124 |
中危 |
0.2 |
0.5 |
snappy: tries to read outside the bounds of the given byte arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36124
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-06-03 15:15 修改: 2024-06-03 19:23
|
org.iq80.snappy:snappy |
CVE-2024-36124 |
中危 |
0.2 |
0.5 |
snappy: tries to read outside the bounds of the given byte arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36124
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-06-03 15:15 修改: 2024-06-03 19:23
|
org.iq80.snappy:snappy |
CVE-2024-36124 |
中危 |
0.2 |
0.5 |
snappy: tries to read outside the bounds of the given byte arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36124
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-06-03 15:15 修改: 2024-06-03 19:23
|
org.iq80.snappy:snappy |
CVE-2024-36124 |
中危 |
0.2 |
0.5 |
snappy: tries to read outside the bounds of the given byte arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36124
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-06-03 15:15 修改: 2024-06-03 19:23
|
org.iq80.snappy:snappy |
CVE-2024-36124 |
中危 |
0.2 |
0.5 |
snappy: tries to read outside the bounds of the given byte arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36124
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-06-03 15:15 修改: 2024-06-03 19:23
|
org.iq80.snappy:snappy |
CVE-2024-36124 |
中危 |
0.3 |
0.5 |
snappy: tries to read outside the bounds of the given byte arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36124
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-06-03 15:15 修改: 2024-06-03 19:23
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.6.2.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.6.2.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21290 |
中危 |
3.6.2.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.6.2.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.6.2.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.6.2.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
org.jboss.netty:netty |
CVE-2019-20445 |
中危 |
3.2.8.Final |
4.0.0 |
netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09
|
org.jboss.netty:netty |
CVE-2021-21290 |
中危 |
3.2.8.Final |
4.0.0 |
netty: Information disclosure via the local system temporary directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29
|
org.jboss.netty:netty |
CVE-2021-21295 |
中危 |
3.2.8.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
org.jboss.netty:netty |
CVE-2021-21409 |
中危 |
3.2.8.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
org.jboss.netty:netty |
CVE-2021-43797 |
中危 |
3.2.8.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.6.2.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.6.2.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.6.2.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21295 |
中危 |
3.6.2.Final |
4.0.0 |
netty: possible request smuggling in HTTP/2 due missing validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.6.2.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.6.2.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.6.2.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.6.2.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.6.2.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.6.2.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
org.jsoup:jsoup |
CVE-2022-36033 |
中危 |
1.10.3 |
1.15.3 |
jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36033
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-08-29 17:15 修改: 2022-12-08 03:48
|
org.jsoup:jsoup |
CVE-2022-36033 |
中危 |
1.10.3 |
1.15.3 |
jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36033
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-08-29 17:15 修改: 2022-12-08 03:48
|
io.netty:netty |
CVE-2021-21409 |
中危 |
3.6.2.Final |
4.0.0 |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
org.jsoup:jsoup |
CVE-2022-36033 |
中危 |
1.11.2 |
1.15.3 |
jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36033
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-08-29 17:15 修改: 2022-12-08 03:48
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.6.2.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.6.2.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.6.2.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.6.2.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.6.2.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.6.2.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty |
CVE-2021-43797 |
中危 |
3.6.2.Final |
4.0.0 |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
org.postgresql:postgresql |
CVE-2022-41946 |
中危 |
42.2.2 |
42.2.27, 42.3.8, 42.4.3, 42.5.1 |
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41946
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-11-23 20:15 修改: 2024-03-29 13:15
|
org.postgresql:postgresql |
CVE-2022-41946 |
中危 |
42.2.2 |
42.2.27, 42.3.8, 42.4.3, 42.5.1 |
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41946
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-11-23 20:15 修改: 2024-03-29 13:15
|
org.postgresql:postgresql |
GHSA-673j-qm5f-xpv8 |
中危 |
42.2.2 |
42.3.3 |
pgjdbc Arbitrary File Write Vulnerability
漏洞详情: https://github.com/advisories/GHSA-673j-qm5f-xpv8
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.postgresql:postgresql |
GHSA-673j-qm5f-xpv8 |
中危 |
42.2.2 |
42.3.3 |
pgjdbc Arbitrary File Write Vulnerability
漏洞详情: https://github.com/advisories/GHSA-673j-qm5f-xpv8
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.5.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.4.1 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
3.14.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.1.1 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
org.xerial.snappy:snappy-java |
CVE-2023-34453 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in shuffle leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59
|
org.xerial.snappy:snappy-java |
CVE-2023-34453 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in shuffle leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59
|
org.xerial.snappy:snappy-java |
CVE-2023-34453 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in shuffle leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59
|
org.xerial.snappy:snappy-java |
CVE-2023-34453 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in shuffle leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59
|
org.xerial.snappy:snappy-java |
CVE-2023-34453 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in shuffle leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59
|
org.xerial.snappy:snappy-java |
CVE-2023-34453 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in shuffle leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59
|
org.xerial.snappy:snappy-java |
CVE-2023-34453 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in shuffle leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59
|
org.xerial.snappy:snappy-java |
CVE-2023-34453 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in shuffle leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59
|
org.xerial.snappy:snappy-java |
CVE-2023-34453 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in shuffle leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59
|
org.xerial.snappy:snappy-java |
CVE-2023-34454 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in compress leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2024-12-12 17:15
|
org.xerial.snappy:snappy-java |
CVE-2023-34454 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in compress leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2024-12-12 17:15
|
org.xerial.snappy:snappy-java |
CVE-2023-34454 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in compress leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2024-12-12 17:15
|
org.xerial.snappy:snappy-java |
CVE-2023-34454 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in compress leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2024-12-12 17:15
|
org.xerial.snappy:snappy-java |
CVE-2023-34454 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in compress leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2024-12-12 17:15
|
org.xerial.snappy:snappy-java |
CVE-2023-34454 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in compress leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2024-12-12 17:15
|
org.xerial.snappy:snappy-java |
CVE-2023-34454 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in compress leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2024-12-12 17:15
|
org.xerial.snappy:snappy-java |
CVE-2023-34454 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in compress leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-15 17:15 修改: 2024-12-12 17:15
|
org.xerial.snappy:snappy-java |
CVE-2023-34454 |
中危 |
1.0.4.1 |
1.1.10.1 |
snappy-java: Integer overflow in compress leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-15 17:15 修改: 2024-12-12 17:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.1.1 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.1.1 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
3.3.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
ch.qos.logback:logback-core |
CVE-2021-42550 |
中危 |
1.2.3 |
1.2.9 |
logback: remote code execution through JNDI call from within its configuration file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42550
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2021-12-16 19:15 修改: 2022-12-12 21:13
|
ch.qos.logback:logback-core |
CVE-2024-12798 |
中危 |
1.2.3 |
1.5.13 |
logback-core: arbitrary code execution via JaninoEventEvaluator
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12798
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2024-12-19 16:15 修改: 2024-12-19 16:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.1.1 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
org.xerial.snappy:snappy-java |
CVE-2023-34453 |
中危 |
1.0.5 |
1.1.10.1 |
snappy-java: Integer overflow in shuffle leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59
|
org.xerial.snappy:snappy-java |
CVE-2023-34453 |
中危 |
1.0.5 |
1.1.10.1 |
snappy-java: Integer overflow in shuffle leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59
|
org.xerial.snappy:snappy-java |
CVE-2023-34453 |
中危 |
1.0.5 |
1.1.10.1 |
snappy-java: Integer overflow in shuffle leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59
|
org.xerial.snappy:snappy-java |
CVE-2023-34454 |
中危 |
1.0.5 |
1.1.10.1 |
snappy-java: Integer overflow in compress leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-06-15 17:15 修改: 2024-12-12 17:15
|
org.xerial.snappy:snappy-java |
CVE-2023-34454 |
中危 |
1.0.5 |
1.1.10.1 |
snappy-java: Integer overflow in compress leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-15 17:15 修改: 2024-12-12 17:15
|
org.xerial.snappy:snappy-java |
CVE-2023-34454 |
中危 |
1.0.5 |
1.1.10.1 |
snappy-java: Integer overflow in compress leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-06-15 17:15 修改: 2024-12-12 17:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.1.1 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.1.1 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
3.6.1 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
org.yaml:snakeyaml |
CVE-2022-38749 |
中危 |
1.15 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38749
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38750 |
中危 |
1.15 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38751 |
中危 |
1.15 |
1.31 |
snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38751
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38752 |
中危 |
1.15 |
1.32 |
snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-41854 |
中危 |
1.15 |
1.32 |
dev-java/snakeyaml: DoS via stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.1.1 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.1.1 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.9.4 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
org.yaml:snakeyaml |
CVE-2022-38749 |
中危 |
1.17 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38749
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38750 |
中危 |
1.17 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38751 |
中危 |
1.17 |
1.31 |
snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38751
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38752 |
中危 |
1.17 |
1.32 |
snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-41854 |
中危 |
1.17 |
1.32 |
dev-java/snakeyaml: DoS via stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.9.4 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
org.yaml:snakeyaml |
CVE-2022-38749 |
中危 |
1.24 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38749
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38750 |
中危 |
1.24 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38751 |
中危 |
1.24 |
1.31 |
snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38751
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38752 |
中危 |
1.24 |
1.32 |
snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-41854 |
中危 |
1.24 |
1.32 |
dev-java/snakeyaml: DoS via stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.4.0 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.7.0.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.7.0.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
org.yaml:snakeyaml |
CVE-2022-38749 |
中危 |
1.25 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38749
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38750 |
中危 |
1.25 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38750
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38751 |
中危 |
1.25 |
1.31 |
snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38751
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38752 |
中危 |
1.25 |
1.32 |
snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-41854 |
中危 |
1.25 |
1.32 |
dev-java/snakeyaml: DoS via stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.7.0.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.7.0.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
org.yaml:snakeyaml |
CVE-2022-38749 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38749
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38750 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38750
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38751 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38751
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38752 |
中危 |
1.26 |
1.32 |
snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-41854 |
中危 |
1.26 |
1.32 |
dev-java/snakeyaml: DoS via stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15
|
io.netty:netty |
CVE-2014-0193 |
中危 |
3.7.0.Final |
3.6.9.Final, 3.7.1.Final, 3.8.2.Final, 3.9.1.Final, 4.0.19.Final |
netty: DoS via memory exhaustion during data aggregation
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0193
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2014-05-06 14:55 修改: 2023-02-13 00:36
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.2.16.v20160414 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
14.0.1 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
org.apache.hive:hive-service |
CVE-2018-1284 |
低危 |
2.1.0 |
2.3.3 |
hive: Mishandled input in UDFXPathUtil.java allows users to access arbitrary files via crafted XML
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1284
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-service |
CVE-2018-1284 |
低危 |
2.1.0 |
2.3.3 |
hive: Mishandled input in UDFXPathUtil.java allows users to access arbitrary files via crafted XML
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1284
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-service |
CVE-2018-1315 |
低危 |
2.1.0 |
2.3.3 |
hive: 'COPY FROM FTP' feature allows malicious FTP server to write arbitrary files to the cluster
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1315
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-service |
CVE-2018-1315 |
低危 |
2.1.0 |
2.3.3 |
hive: 'COPY FROM FTP' feature allows malicious FTP server to write arbitrary files to the cluster
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1315
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
14.0.1 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
27.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
27.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
27.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
27.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
27.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
3.1.2 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
3.1.2 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
7.6.0.v20120127 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
7.6.0.v20120127 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.postgresql:postgresql |
CVE-2022-26520 |
低危 |
42.2.2 |
42.3.3 |
postgresql-jdbc: Arbitrary File Write Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26520
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-10 17:47 修改: 2024-08-03 05:16
|
org.postgresql:postgresql |
CVE-2022-26520 |
低危 |
42.2.2 |
42.3.3 |
postgresql-jdbc: Arbitrary File Write Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26520
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-03-10 17:47 修改: 2024-08-03 05:16
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.2.16.v20160414 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.2.16.v20160414 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.7.3 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
27.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
27.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
14.0.1 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
28.0-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
2.8.5 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hive:hive-exec |
CVE-2018-1284 |
低危 |
1.1.1 |
2.3.3 |
hive: Mishandled input in UDFXPathUtil.java allows users to access arbitrary files via crafted XML
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1284
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
14.0.1 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.3.19.v20170502 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.3.19.v20170502 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.3.19.v20170502 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.3.19.v20170502 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.apache.hive:hive-exec |
CVE-2018-1284 |
低危 |
1.2.2 |
2.3.3 |
hive: Mishandled input in UDFXPathUtil.java allows users to access arbitrary files via crafted XML
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1284
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
30.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
14.0.1 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
14.0.1 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
9.3.19.v20170502 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
9.3.19.v20170502 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
9.3.19.v20170502 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
9.3.19.v20170502 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.3.19.v20170502 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.3.19.v20170502 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.3.19.v20170502 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.3.19.v20170502 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.3.20.v20170531 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.3.20.v20170531 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
14.0.1 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
11.0.2 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
11.0.2 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
18.0 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
11.0.2 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
11.0.2 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
12.0.1 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
12.0.1 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
19.0 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
9.3.20.v20170531 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.3.20.v20170531 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
19.0 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
12.0.1 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
org.apache.hive:hive-exec |
CVE-2018-1284 |
低危 |
2.1.0 |
2.3.3 |
hive: Mishandled input in UDFXPathUtil.java allows users to access arbitrary files via crafted XML
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1284
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-exec |
CVE-2018-1284 |
低危 |
2.1.0 |
2.3.3 |
hive: Mishandled input in UDFXPathUtil.java allows users to access arbitrary files via crafted XML
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1284
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-exec |
CVE-2018-1284 |
低危 |
2.1.0 |
2.3.3 |
hive: Mishandled input in UDFXPathUtil.java allows users to access arbitrary files via crafted XML
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1284
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-exec |
CVE-2018-1284 |
低危 |
2.1.0 |
2.3.3 |
hive: Mishandled input in UDFXPathUtil.java allows users to access arbitrary files via crafted XML
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1284
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-exec |
CVE-2018-1284 |
低危 |
2.1.0 |
2.3.3 |
hive: Mishandled input in UDFXPathUtil.java allows users to access arbitrary files via crafted XML
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1284
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.eclipse.jetty:jetty-servlets |
CVE-2023-36479 |
低危 |
9.2.16.v20160414 |
9.4.52, 10.0.16, 11.0.16 |
jetty: Improper addition of quotation marks to user inputs in CgiServlet
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36479
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-15 19:15 修改: 2023-10-16 19:20
|
org.eclipse.jetty:jetty-servlets |
CVE-2023-36479 |
低危 |
9.2.16.v20160414 |
9.4.52, 10.0.16, 11.0.16 |
jetty: Improper addition of quotation marks to user inputs in CgiServlet
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36479
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-09-15 19:15 修改: 2023-10-16 19:20
|
org.apache.hive:hive-exec |
CVE-2018-1284 |
低危 |
2.1.0 |
2.3.3 |
hive: Mishandled input in UDFXPathUtil.java allows users to access arbitrary files via crafted XML
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1284
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-exec |
CVE-2018-1284 |
低危 |
2.1.0 |
2.3.3 |
hive: Mishandled input in UDFXPathUtil.java allows users to access arbitrary files via crafted XML
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1284
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-exec |
CVE-2018-1315 |
低危 |
2.1.0 |
2.3.3 |
hive: 'COPY FROM FTP' feature allows malicious FTP server to write arbitrary files to the cluster
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1315
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-exec |
CVE-2018-1315 |
低危 |
2.1.0 |
2.3.3 |
hive: 'COPY FROM FTP' feature allows malicious FTP server to write arbitrary files to the cluster
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1315
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
7.6.0.v20120127 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
7.6.0.v20120127 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
7.6.0.v20120127 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
7.6.0.v20120127 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
org.apache.hive:hive-exec |
CVE-2018-1315 |
低危 |
2.1.0 |
2.3.3 |
hive: 'COPY FROM FTP' feature allows malicious FTP server to write arbitrary files to the cluster
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1315
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh |
低危 |
7.6.0.v20120127 |
10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
Eclipse Jetty XmlParser allows arbitrary DOCTYPE declarations
漏洞详情: https://github.com/advisories/GHSA-58qw-p7qm-5rvh
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh |
低危 |
7.6.0.v20120127 |
10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
Eclipse Jetty XmlParser allows arbitrary DOCTYPE declarations
漏洞详情: https://github.com/advisories/GHSA-58qw-p7qm-5rvh
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh |
低危 |
9.3.19.v20170502 |
10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
Eclipse Jetty XmlParser allows arbitrary DOCTYPE declarations
漏洞详情: https://github.com/advisories/GHSA-58qw-p7qm-5rvh
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh |
低危 |
9.3.19.v20170502 |
10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
Eclipse Jetty XmlParser allows arbitrary DOCTYPE declarations
漏洞详情: https://github.com/advisories/GHSA-58qw-p7qm-5rvh
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh |
低危 |
9.3.19.v20170502 |
10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
Eclipse Jetty XmlParser allows arbitrary DOCTYPE declarations
漏洞详情: https://github.com/advisories/GHSA-58qw-p7qm-5rvh
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh |
低危 |
9.3.19.v20170502 |
10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
Eclipse Jetty XmlParser allows arbitrary DOCTYPE declarations
漏洞详情: https://github.com/advisories/GHSA-58qw-p7qm-5rvh
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh |
低危 |
9.3.19.v20170502 |
10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
Eclipse Jetty XmlParser allows arbitrary DOCTYPE declarations
漏洞详情: https://github.com/advisories/GHSA-58qw-p7qm-5rvh
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh |
低危 |
9.3.20.v20170531 |
10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
Eclipse Jetty XmlParser allows arbitrary DOCTYPE declarations
漏洞详情: https://github.com/advisories/GHSA-58qw-p7qm-5rvh
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh |
低危 |
9.3.20.v20170531 |
10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
Eclipse Jetty XmlParser allows arbitrary DOCTYPE declarations
漏洞详情: https://github.com/advisories/GHSA-58qw-p7qm-5rvh
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.apache.hive:hive-exec |
CVE-2018-1315 |
低危 |
2.1.0 |
2.3.3 |
hive: 'COPY FROM FTP' feature allows malicious FTP server to write arbitrary files to the cluster
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1315
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-exec |
CVE-2018-1315 |
低危 |
2.1.0 |
2.3.3 |
hive: 'COPY FROM FTP' feature allows malicious FTP server to write arbitrary files to the cluster
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1315
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-exec |
CVE-2018-1315 |
低危 |
2.1.0 |
2.3.3 |
hive: 'COPY FROM FTP' feature allows malicious FTP server to write arbitrary files to the cluster
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1315
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.logging.log4j:log4j-core |
CVE-2020-9488 |
低危 |
2.11.1 |
2.13.2, 2.12.3, 2.3.2 |
log4j: improper validation of certificate with host mismatch in SMTP appender
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9488
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-04-27 16:15 修改: 2023-11-07 03:26
|
org.apache.hive:hive-exec |
CVE-2018-1315 |
低危 |
2.1.0 |
2.3.3 |
hive: 'COPY FROM FTP' feature allows malicious FTP server to write arbitrary files to the cluster
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1315
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
26.0-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
11.0.2 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
org.apache.hive:hive-exec |
CVE-2018-1284 |
低危 |
2.1.1 |
2.3.3 |
hive: Mishandled input in UDFXPathUtil.java allows users to access arbitrary files via crafted XML
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1284
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.apache.hive:hive-exec |
CVE-2018-1315 |
低危 |
2.1.1 |
2.3.3 |
hive: 'COPY FROM FTP' feature allows malicious FTP server to write arbitrary files to the cluster
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1315
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
11.0.2 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
14.0 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
ch.qos.logback:logback-core |
CVE-2024-12801 |
低危 |
1.2.3 |
1.5.13 |
logback-core: SaxEventRecorder vulnerable to Server-Side Request Forgery (SSRF) attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12801
镜像层: sha256:0b8b4953bdd26ff2627d1cbcec09c59a575b84a7829bd8885b42f93a35297106
发布日期: 2024-12-19 17:15 修改: 2024-12-19 17:15
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
3.0.0 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
3.0.0 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
3.0.0 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
3.0.0 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hadoop:hadoop-common |
CVE-2024-23454 |
低危 |
3.0.0 |
3.4.0 |
Apache Hadoop: Temporary File Local Information Disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35
|
org.apache.hive:hive-service |
CVE-2018-1284 |
低危 |
1.1.1 |
2.3.3 |
hive: Mishandled input in UDFXPathUtil.java allows users to access arbitrary files via crafted XML
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1284
镜像层: sha256:a75d002dd56415bee078b479fff2619225edb38fc296540fb4cd71f9053c19a5
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
11.0.2 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
9.2.16.v20160414 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
9.2.16.v20160414 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.2.16.v20160414 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:f0ec7140274a11fdd2b1d85d1e27628df92a43813ec860e24c43458ed10a6a49
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|