docker.io/dushixiang/guacd:latest linux/amd64

docker.io/dushixiang/guacd:latest - Trivy安全扫描结果 扫描时间: 2024-12-20 08:27
全部漏洞信息
低危漏洞:2 中危漏洞:9 高危漏洞:7 严重漏洞:2

系统OS: alpine 3.18.8 扫描引擎: Trivy 扫描时间: 2024-12-20 08:27

docker.io/dushixiang/guacd:latest (alpine 3.18.8) (alpine)
低危漏洞:2 中危漏洞:9 高危漏洞:7 严重漏洞:2
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
libexpat CVE-2024-45491 严重 2.6.2-r0 2.6.3-r0 libexpat: Integer Overflow or Wraparound

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

libexpat CVE-2024-45492 严重 2.6.2-r0 2.6.3-r0 libexpat: integer overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

ghostscript CVE-2024-46952 高危 10.02.0-r0 10.04.0-r0 ghostscript: Buffer Overflow in Ghostscript PDF XRef Stream Handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46952

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-11-10 22:15 修改: 2024-11-14 02:01

ghostscript CVE-2024-46953 高危 10.02.0-r0 10.04.0-r0 ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46953

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-11-10 22:15 修改: 2024-11-14 02:01

ghostscript CVE-2024-46954 高危 10.02.0-r0 10.04.0-r0 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46954

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-11-10 22:15 修改: 2024-11-14 01:58

ghostscript CVE-2024-46956 高危 10.02.0-r0 10.04.0-r0 ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46956

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-11-10 22:15 修改: 2024-11-14 20:39

ghostscript CVE-2024-33871 高危 10.02.0-r0 10.04.0-r0 ghostscript: OPVP device arbitrary code execution via custom Driver library

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33871

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-07-03 19:15 修改: 2024-07-08 14:18

ghostscript CVE-2024-46951 高危 10.02.0-r0 10.04.0-r0 ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46951

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-11-10 21:15 修改: 2024-11-14 02:13

libexpat CVE-2024-45490 高危 2.6.2-r0 2.6.3-r0 libexpat: Negative Length Parsing Vulnerability in libexpat

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24

ghostscript CVE-2024-33870 中危 10.02.0-r0 10.04.0-r0 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33870

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-07-03 19:15 修改: 2024-11-07 22:35

ghostscript CVE-2024-46955 中危 10.02.0-r0 10.04.0-r0 ghostscript: Out-of-Bounds Read in Ghostscript Indexed Color Space

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46955

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-11-10 22:15 修改: 2024-11-14 01:53

libcrypto3 CVE-2024-6119 中危 3.1.6-r0 3.1.7-r0 openssl: Possible denial of service in X.509 name checks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119

镜像层: sha256:ce7f800efff9a5cfddf4805e3887943b4a7bd97cf83140587336261130ece03b

发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35

ghostscript CVE-2023-52722 中危 10.02.0-r0 10.04.0-r0 ghostscript: eexec seeds other than the Type 1 standard are allowed while using SAFER mode

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52722

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-04-28 00:15 修改: 2024-12-04 21:15

ghostscript CVE-2024-29510 中危 10.02.0-r0 10.04.0-r0 ghostscript: format string injection leads to shell command execution (SAFER bypass)

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29510

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-07-03 19:15 修改: 2024-07-08 14:18

ghostscript CVE-2024-33869 中危 10.02.0-r0 10.04.0-r0 ghostscript: path traversal and command execution due to path reduction

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33869

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-07-03 19:15 修改: 2024-10-31 18:35

libexpat CVE-2024-50602 中危 2.6.2-r0 2.6.4-r0 libexpat: expat: DoS via XML_ResumeParser

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-10-27 05:15 修改: 2024-10-30 18:35

libssl3 CVE-2024-6119 中危 3.1.6-r0 3.1.7-r0 openssl: Possible denial of service in X.509 name checks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119

镜像层: sha256:ce7f800efff9a5cfddf4805e3887943b4a7bd97cf83140587336261130ece03b

发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35

orc CVE-2024-40897 中危 0.4.34-r0 0.4.39-r0 orc: Stack-based buffer overflow vulnerability in ORC

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40897

镜像层: sha256:48690d42a8ea735cf7a6d879d5671b9bb84184abd1d771f67a1cd7dee853d34f

发布日期: 2024-07-26 06:15 修改: 2024-08-27 13:52

libssl3 CVE-2024-9143 低危 3.1.6-r0 3.1.7-r1 openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143

镜像层: sha256:ce7f800efff9a5cfddf4805e3887943b4a7bd97cf83140587336261130ece03b

发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35

libcrypto3 CVE-2024-9143 低危 3.1.6-r0 3.1.7-r1 openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143

镜像层: sha256:ce7f800efff9a5cfddf4805e3887943b4a7bd97cf83140587336261130ece03b

发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35