docker.io/florider89/joplin-server:3.0 linux/amd64

docker.io/florider89/joplin-server:3.0 - Trivy安全扫描结果 扫描时间: 2024-12-19 19:01
全部漏洞信息
低危漏洞:105 中危漏洞:79 高危漏洞:160 严重漏洞:25

系统OS: debian 11.10 扫描引擎: Trivy 扫描时间: 2024-12-19 19:01

docker.io/florider89/joplin-server:3.0 (debian 11.10) (debian)
低危漏洞:80 中危漏洞:26 高危漏洞:14 严重漏洞:2
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
libdb5.3 CVE-2019-8457 严重 5.3.28+dfsg1-0.8 sqlite: heap out-of-bound read in function rtreenode()

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-8457

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-05-30 16:29 修改: 2023-11-07 03:13

zlib1g CVE-2023-45853 严重 1:1.2.11.dfsg-2+deb11u2 zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45853

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-10-14 02:15 修改: 2024-08-01 13:44

libcom-err2 CVE-2022-1304 高危 1.46.2-2 1.46.2-2+deb11u1 e2fsprogs: out-of-bounds read/write via crafted filesystem

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15

bash CVE-2022-3715 高危 5.1-2+deb11u1 bash: a heap-buffer-overflow in valid_parameter_transform

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3715

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-01-05 15:15 修改: 2023-02-24 18:38

libext2fs2 CVE-2022-1304 高危 1.46.2-2 1.46.2-2+deb11u1 e2fsprogs: out-of-bounds read/write via crafted filesystem

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15

libgcrypt20 CVE-2021-33560 高危 1.8.7-6 libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33560

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2021-06-08 11:15 修改: 2023-11-07 03:35

libss2 CVE-2022-1304 高危 1.46.2-2 1.46.2-2+deb11u1 e2fsprogs: out-of-bounds read/write via crafted filesystem

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15

libsystemd0 CVE-2023-50387 高危 247.3-7+deb11u5 247.3-7+deb11u6 bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16

libsystemd0 CVE-2023-50868 高危 247.3-7+deb11u5 247.3-7+deb11u6 bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16

libudev1 CVE-2023-50387 高危 247.3-7+deb11u5 247.3-7+deb11u6 bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50387

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16

libudev1 CVE-2023-50868 高危 247.3-7+deb11u5 247.3-7+deb11u6 bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50868

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-14 16:15 修改: 2024-06-10 17:16

libzstd1 CVE-2022-4899 高危 1.4.8+dfsg-2.1 zstd: mysql: buffer overrun in util.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4899

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-03-31 20:15 修改: 2023-11-07 03:59

logsave CVE-2022-1304 高危 1.46.2-2 1.46.2-2+deb11u1 e2fsprogs: out-of-bounds read/write via crafted filesystem

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15

perl-base CVE-2020-16156 高危 5.32.1-4+deb11u3 5.32.1-4+deb11u4 perl-CPAN: Bypass of verification of signatures in CHECKSUMS files

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-16156

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2021-12-13 18:15 修改: 2023-11-07 03:18

perl-base CVE-2023-31484 高危 5.32.1-4+deb11u3 5.32.1-4+deb11u4 perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31484

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-04-29 00:15 修改: 2024-08-01 13:43

e2fsprogs CVE-2022-1304 高危 1.46.2-2 1.46.2-2+deb11u1 e2fsprogs: out-of-bounds read/write via crafted filesystem

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1304

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2022-04-14 21:15 修改: 2024-11-22 12:15

libpam-modules-bin CVE-2024-22365 中危 1.4.0-9+deb11u1 pam: allowing unprivileged user to block another user namespace

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27

libpam-runtime CVE-2024-10041 中危 1.4.0-9+deb11u1 pam: libpam: Libpam vulnerable to read hashed password

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-10-23 14:15 修改: 2024-11-26 16:15

libpam-runtime CVE-2024-22365 中危 1.4.0-9+deb11u1 pam: allowing unprivileged user to block another user namespace

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27

libpam0g CVE-2024-10041 中危 1.4.0-9+deb11u1 pam: libpam: Libpam vulnerable to read hashed password

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-10-23 14:15 修改: 2024-11-26 16:15

libpam0g CVE-2024-22365 中危 1.4.0-9+deb11u1 pam: allowing unprivileged user to block another user namespace

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27

libc-bin CVE-2023-4806 中危 2.31-13+deb11u10 glibc: potential use-after-free in getaddrinfo()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

libssl1.1 CVE-2023-5678 中危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5678

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-11-06 16:15 修改: 2024-10-14 15:15

libssl1.1 CVE-2024-0727 中危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: denial of service via null dereference

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15

libssl1.1 CVE-2024-4741 中危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: Use After Free with SSL_free_buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01

libssl1.1 CVE-2024-5535 中危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: SSL_select_next_proto buffer overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15

libc-bin CVE-2023-4813 中危 2.31-13+deb11u10 glibc: potential use-after-free in gaih_inet()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15

libc6 CVE-2023-4806 中危 2.31-13+deb11u10 glibc: potential use-after-free in getaddrinfo()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

libsystemd0 CVE-2023-7008 中危 247.3-7+deb11u5 247.3-7+deb11u6 systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15

libtinfo6 CVE-2023-50495 中危 6.2+20201114-2+deb11u2 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libc6 CVE-2023-4813 中危 2.31-13+deb11u10 glibc: potential use-after-free in gaih_inet()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15

libgcrypt20 CVE-2024-2236 中危 1.8.7-6 libgcrypt: vulnerable to Marvin Attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2236

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-03-06 22:15 修改: 2024-11-12 18:15

libudev1 CVE-2023-7008 中危 247.3-7+deb11u5 247.3-7+deb11u6 systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15

libgnutls30 CVE-2024-28834 中危 3.7.1-5+deb11u5 3.7.1-5+deb11u6 gnutls: vulnerable to Minerva side-channel information leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28834

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-03-21 14:15 修改: 2024-11-21 21:15

login CVE-2023-4641 中危 1:4.8.1-1 shadow-utils: possible password leak during passwd(1) change

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4641

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-12-27 16:15 修改: 2024-05-03 16:15

libgnutls30 CVE-2024-28835 中危 3.7.1-5+deb11u5 3.7.1-5+deb11u6 gnutls: potential crash during chain building/verification

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28835

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-03-21 06:15 修改: 2024-11-22 12:15

ncurses-base CVE-2023-50495 中危 6.2+20201114-2+deb11u2 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

ncurses-bin CVE-2023-50495 中危 6.2+20201114-2+deb11u2 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

passwd CVE-2023-4641 中危 1:4.8.1-1 shadow-utils: possible password leak during passwd(1) change

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4641

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-12-27 16:15 修改: 2024-05-03 16:15

libpam-modules CVE-2024-10041 中危 1.4.0-9+deb11u1 pam: libpam: Libpam vulnerable to read hashed password

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-10-23 14:15 修改: 2024-11-26 16:15

libpam-modules CVE-2024-22365 中危 1.4.0-9+deb11u1 pam: allowing unprivileged user to block another user namespace

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27

libpam-modules-bin CVE-2024-10041 中危 1.4.0-9+deb11u1 pam: libpam: Libpam vulnerable to read hashed password

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-10-23 14:15 修改: 2024-11-26 16:15

libgssapi-krb5-2 CVE-2024-26461 低危 1.18.3-6+deb11u5 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

libk5crypto3 CVE-2018-5709 低危 1.18.3-6+deb11u5 krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58

libk5crypto3 CVE-2024-26458 低危 1.18.3-6+deb11u5 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15

libk5crypto3 CVE-2024-26461 低危 1.18.3-6+deb11u5 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

libkrb5-3 CVE-2018-5709 低危 1.18.3-6+deb11u5 krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58

libkrb5-3 CVE-2024-26458 低危 1.18.3-6+deb11u5 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15

libkrb5-3 CVE-2024-26461 低危 1.18.3-6+deb11u5 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

libkrb5support0 CVE-2018-5709 低危 1.18.3-6+deb11u5 krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58

libkrb5support0 CVE-2024-26458 低危 1.18.3-6+deb11u5 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15

libkrb5support0 CVE-2024-26461 低危 1.18.3-6+deb11u5 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

libmount1 CVE-2022-0563 低危 2.36.1-8+deb11u2 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15

bsdutils CVE-2022-0563 低危 1:2.36.1-8+deb11u2 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15

libc-bin CVE-2010-4756 低危 2.31-13+deb11u10 glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions

漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15

libc-bin CVE-2018-20796 低危 2.31-13+deb11u10 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56

libc-bin CVE-2019-1010022 低危 2.31-13+deb11u10 glibc: stack guard protection bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libc-bin CVE-2019-1010023 低危 2.31-13+deb11u10 glibc: running ldd on malicious ELF leads to code execution because of wrong size computation

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libc-bin CVE-2019-1010024 低危 2.31-13+deb11u10 glibc: ASLR bypass using cache of thread stack and heap

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libc-bin CVE-2019-1010025 低危 2.31-13+deb11u10 glibc: information disclosure of heap addresses of pthread_created thread

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libc-bin CVE-2019-9192 低危 2.31-13+deb11u10 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15

libpcre2-8-0 CVE-2022-41409 低危 10.36-2+deb11u1 pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-07-18 14:15 修改: 2023-07-27 03:46

libpcre3 CVE-2017-11164 低危 2:8.39-13 pcre: OP_KETRMAX feature in the match function in pcre_exec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38

libpcre3 CVE-2017-16231 低危 2:8.39-13 pcre: self-recursive call in match() in pcre_exec.c leads to denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16231

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-03-21 15:59 修改: 2024-08-05 21:15

libpcre3 CVE-2017-7245 低危 2:8.39-13 pcre: stack-based buffer overflow write in pcre32_copy_substring

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7245

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29

libpcre3 CVE-2017-7246 低危 2:8.39-13 pcre: stack-based buffer overflow write in pcre32_copy_substring

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7246

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2017-03-23 21:59 修改: 2018-08-17 10:29

libpcre3 CVE-2019-20838 低危 2:8.39-13 pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20838

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2020-06-15 17:15 修改: 2024-03-27 16:05

libsepol1 CVE-2021-36084 低危 3.1-1 3.1-1+deb11u1 libsepol: use-after-free in __cil_verify_classperms()

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36084

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36

libsepol1 CVE-2021-36085 低危 3.1-1 3.1-1+deb11u1 libsepol: use-after-free in __cil_verify_classperms()

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36085

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36

libsepol1 CVE-2021-36086 低危 3.1-1 3.1-1+deb11u1 libsepol: use-after-free in cil_reset_classpermission()

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36086

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36

libsepol1 CVE-2021-36087 低危 3.1-1 3.1-1+deb11u1 libsepol: heap-based buffer overflow in ebitmap_match_any()

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36087

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2021-07-01 03:15 修改: 2023-11-07 03:36

libsmartcols1 CVE-2022-0563 低危 2.36.1-8+deb11u2 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15

coreutils CVE-2016-2781 低危 8.32-4+b1 coreutils: Non-privileged session can escape to the parent session in chroot

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2781

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2017-02-07 15:59 修改: 2023-11-07 02:32

coreutils CVE-2017-18018 低危 8.32-4+b1 coreutils: race condition vulnerability in chown and chgrp

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18018

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2018-01-04 04:29 修改: 2018-01-19 15:46

libc6 CVE-2010-4756 低危 2.31-13+deb11u10 glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions

漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15

libc6 CVE-2018-20796 低危 2.31-13+deb11u10 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56

libc6 CVE-2019-1010022 低危 2.31-13+deb11u10 glibc: stack guard protection bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libssl1.1 CVE-2024-2511 低危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: Unbounded memory growth with session handling in TLSv1.3

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15

libssl1.1 CVE-2024-9143 低危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35

libstdc++6 CVE-2023-4039 低危 10.2.1-6 gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15

libc6 CVE-2019-1010023 低危 2.31-13+deb11u10 glibc: running ldd on malicious ELF leads to code execution because of wrong size computation

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libc6 CVE-2019-1010024 低危 2.31-13+deb11u10 glibc: ASLR bypass using cache of thread stack and heap

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libc6 CVE-2019-1010025 低危 2.31-13+deb11u10 glibc: information disclosure of heap addresses of pthread_created thread

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libsystemd0 CVE-2013-4392 低危 247.3-7+deb11u5 systemd: TOCTOU race condition when updating file permissions and SELinux security contexts

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49

libsystemd0 CVE-2020-13529 低危 247.3-7+deb11u5 systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16

libsystemd0 CVE-2023-31437 低危 247.3-7+deb11u5 An issue was discovered in systemd 253. An attacker can modify a seale ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16

libsystemd0 CVE-2023-31438 低危 247.3-7+deb11u5 An issue was discovered in systemd 253. An attacker can truncate a sea ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16

libsystemd0 CVE-2023-31439 低危 247.3-7+deb11u5 An issue was discovered in systemd 253. An attacker can modify the con ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16

libc6 CVE-2019-9192 低危 2.31-13+deb11u10 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15

apt CVE-2011-3374 低危 2.2.4 It was found that apt-key in apt, all versions, do not correctly valid ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3374

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-11-26 00:15 修改: 2021-02-09 16:08

gcc-10-base CVE-2023-4039 低危 10.2.1-6 gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15

gcc-9-base CVE-2023-4039 低危 9.3.0-22 gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15

libudev1 CVE-2013-4392 低危 247.3-7+deb11u5 systemd: TOCTOU race condition when updating file permissions and SELinux security contexts

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2013-10-28 22:55 修改: 2022-01-31 17:49

libudev1 CVE-2020-13529 低危 247.3-7+deb11u5 systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13529

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2021-05-10 16:15 修改: 2023-11-07 03:16

libudev1 CVE-2023-31437 低危 247.3-7+deb11u5 An issue was discovered in systemd 253. An attacker can modify a seale ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16

libudev1 CVE-2023-31438 低危 247.3-7+deb11u5 An issue was discovered in systemd 253. An attacker can truncate a sea ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16

libudev1 CVE-2023-31439 低危 247.3-7+deb11u5 An issue was discovered in systemd 253. An attacker can modify the con ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-06-13 17:15 修改: 2024-08-02 15:16

libuuid1 CVE-2022-0563 低危 2.36.1-8+deb11u2 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15

libgcc-s1 CVE-2023-4039 低危 10.2.1-6 gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15

gpgv CVE-2022-3219 低危 2.2.27-2+deb11u2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

login CVE-2007-5686 低危 1:4.8.1-1 initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2007-5686

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2007-10-28 17:08 修改: 2018-10-15 21:45

login CVE-2013-4235 低危 1:4.8.1-1 shadow-utils: TOCTOU race conditions by copying and removing directory trees

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4235

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-12-03 15:15 修改: 2023-02-13 00:28

login CVE-2023-29383 低危 1:4.8.1-1 shadow: Improper input validation in shadow-utils package utility chfn

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05

login TEMP-0628843-DBAD28 低危 1:4.8.1-1 [more related to CVE-2005-4890]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

libapt-pkg6.0 CVE-2011-3374 低危 2.2.4 It was found that apt-key in apt, all versions, do not correctly valid ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3374

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-11-26 00:15 修改: 2021-02-09 16:08

mount CVE-2022-0563 低危 2.36.1-8+deb11u2 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15

libgcrypt20 CVE-2018-6829 低危 1.8.7-6 libgcrypt: ElGamal implementation doesn't have semantic security due to incorrectly encoded plaintexts possibly allowing to obtain sensitive information

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6829

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2018-02-07 23:29 修改: 2020-01-15 20:15

libblkid1 CVE-2022-0563 低危 2.36.1-8+deb11u2 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15

bash TEMP-0841856-B18BAF 低危 5.1-2+deb11u1 [Privilege escalation possible to other user than root]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

passwd CVE-2007-5686 低危 1:4.8.1-1 initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2007-5686

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2007-10-28 17:08 修改: 2018-10-15 21:45

passwd CVE-2013-4235 低危 1:4.8.1-1 shadow-utils: TOCTOU race conditions by copying and removing directory trees

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4235

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2019-12-03 15:15 修改: 2023-02-13 00:28

passwd CVE-2023-29383 低危 1:4.8.1-1 shadow: Improper input validation in shadow-utils package utility chfn

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05

passwd TEMP-0628843-DBAD28 低危 1:4.8.1-1 [more related to CVE-2005-4890]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

libgnutls30 CVE-2011-3389 低危 3.7.1-5+deb11u5 HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)

漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3389

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2011-09-06 19:55 修改: 2022-11-29 15:56

libgssapi-krb5-2 CVE-2018-5709 低危 1.18.3-6+deb11u5 krb5: integer overflow in dbentry->n_key_data in kadmin/dbutil/dump.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5709

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2018-01-16 09:29 修改: 2023-11-07 02:58

perl-base CVE-2011-4116 低危 5.32.1-4+deb11u3 perl: File:: Temp insecure temporary file handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2020-01-31 18:15 修改: 2020-02-05 22:10

perl-base CVE-2023-31486 低危 5.32.1-4+deb11u3 http-tiny: insecure TLS cert default

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31486

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2023-04-29 00:15 修改: 2024-11-29 12:15

sysvinit-utils TEMP-0517018-A83CE6 低危 2.96-7+deb11u1 [sysvinit: no-root option in expert installer exposes locally exploitable security flaw]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

tar CVE-2005-2541 低危 1.34+dfsg-1+deb11u1 tar: does not properly warn the user when extracting setuid or setgid files

漏洞详情: https://avd.aquasec.com/nvd/cve-2005-2541

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2005-08-10 04:00 修改: 2023-11-07 01:57

tar TEMP-0290435-0B57B5 低危 1.34+dfsg-1+deb11u1 [tar's rmt command may have undesired side effects]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

util-linux CVE-2022-0563 低危 2.36.1-8+deb11u2 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2022-02-21 19:15 修改: 2024-01-07 09:15

libgssapi-krb5-2 CVE-2024-26458 低危 1.18.3-6+deb11u5 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15

tzdata DLA-3972-1 未知 2024a-0+deb11u1 2024b-0+deb11u1 tzdata - new timezone database

漏洞详情:

镜像层: sha256:6f697f52d48595d9c5c3104e2ed3d8e617cb437b485e7396ad5f00726125e52b

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

Node.js (node-pkg)
低危漏洞:25 中危漏洞:53 高危漏洞:146 严重漏洞:23
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

@babel/traverse CVE-2023-45133 严重 7.22.5 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

immer CVE-2021-23436 严重 7.0.15 9.0.6 immer: type confusion vulnerability can lead to a bypass of CVE-2020-28477

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23436

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2021-09-01 18:15 修改: 2021-09-10 13:33

minimist CVE-2021-44906 严重 1.2.5 1.2.6, 0.2.4 minimist: prototype pollution

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44906

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-03-17 16:15 修改: 2024-06-21 19:15

minimist CVE-2021-44906 严重 1.2.5 1.2.6, 0.2.4 minimist: prototype pollution

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44906

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-03-17 16:15 修改: 2024-06-21 19:15

minimist CVE-2021-44906 严重 1.2.5 1.2.6, 0.2.4 minimist: prototype pollution

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44906

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-03-17 16:15 修改: 2024-06-21 19:15

minimist CVE-2021-44906 严重 1.2.5 1.2.6, 0.2.4 minimist: prototype pollution

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44906

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-03-17 16:15 修改: 2024-06-21 19:15

minimist CVE-2021-44906 严重 1.2.5 1.2.6, 0.2.4 minimist: prototype pollution

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44906

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-03-17 16:15 修改: 2024-06-21 19:15

minimist CVE-2021-44906 严重 1.2.5 1.2.6, 0.2.4 minimist: prototype pollution

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44906

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-03-17 16:15 修改: 2024-06-21 19:15

minimist CVE-2021-44906 严重 1.2.5 1.2.6, 0.2.4 minimist: prototype pollution

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44906

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-03-17 16:15 修改: 2024-06-21 19:15

braces CVE-2024-4068 高危 2.3.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

braces CVE-2024-4068 高危 3.0.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

braces CVE-2024-4068 高危 3.0.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

braces CVE-2024-4068 高危 3.0.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

braces CVE-2024-4068 高危 3.0.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

braces CVE-2024-4068 高危 3.0.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

braces CVE-2024-4068 高危 3.0.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

braces CVE-2024-4068 高危 3.0.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

browserify-sign CVE-2023-46234 高危 4.2.1 4.2.2 browserify-sign: upper bound check issue in dsaVerify leads to a signature forgery attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46234

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-26 15:15 修改: 2024-02-28 03:15

browserify-sign CVE-2023-46234 高危 4.2.1 4.2.2 browserify-sign: upper bound check issue in dsaVerify leads to a signature forgery attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46234

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-26 15:15 修改: 2024-02-28 03:15

cached-path-relative CVE-2021-23518 高危 1.0.2 1.1.0 cached-path-relative: Prototype Pollution via the cache variable

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23518

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-01-21 20:15 修改: 2023-02-03 19:16

cached-path-relative CVE-2021-23518 高危 1.0.2 1.1.0 cached-path-relative: Prototype Pollution via the cache variable

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23518

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-01-21 20:15 修改: 2023-02-03 19:16

cross-spawn CVE-2024-21538 高危 7.0.3 7.0.5, 6.0.6 cross-spawn: regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15

cross-spawn CVE-2024-21538 高危 7.0.3 7.0.5, 6.0.6 cross-spawn: regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15

cross-spawn CVE-2024-21538 高危 7.0.3 7.0.5, 6.0.6 cross-spawn: regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15

cross-spawn CVE-2024-21538 高危 7.0.3 7.0.5, 6.0.6 cross-spawn: regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15

cross-spawn CVE-2024-21538 高危 7.0.3 7.0.5, 6.0.6 cross-spawn: regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15

cross-spawn CVE-2024-21538 高危 7.0.3 7.0.5, 6.0.6 cross-spawn: regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15

cross-spawn CVE-2024-21538 高危 7.0.3 7.0.5, 6.0.6 cross-spawn: regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15

cross-spawn CVE-2024-21538 高危 7.0.3 7.0.5, 6.0.6 cross-spawn: regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15

cross-spawn CVE-2024-21538 高危 7.0.3 7.0.5, 6.0.6 cross-spawn: regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15

cross-spawn CVE-2024-21538 高危 7.0.3 7.0.5, 6.0.6 cross-spawn: regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538

镜像层: sha256:be4aa69a49bc8b45090047764a6ae23af3cae1de41093ad042505fe4403d34c4

发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15

d3-color GHSA-36jr-mh4h-2g58 高危 3.0.1 3.1.0 d3-color vulnerable to ReDoS

漏洞详情: https://github.com/advisories/GHSA-36jr-mh4h-2g58

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

decode-uri-component CVE-2022-38900 高危 0.2.0 0.2.1 decode-uri-component: improper input validation resulting in DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38900

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-11-28 13:15 修改: 2023-11-07 03:50

decode-uri-component CVE-2022-38900 高危 0.2.0 0.2.1 decode-uri-component: improper input validation resulting in DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38900

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-11-28 13:15 修改: 2023-11-07 03:50

dompurify CVE-2024-45801 高危 3.0.5 2.5.4, 3.1.3 dompurify: XSS vulnerability via prototype pollution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45801

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-09-16 19:16 修改: 2024-09-20 12:31

dompurify CVE-2024-47875 高危 3.0.5 2.5.0, 3.1.3 dompurify: nesting-based mutation XSS vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47875

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-10-11 15:15 修改: 2024-10-15 12:58

follow-redirects CVE-2022-0155 高危 1.14.5 1.14.7 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0155

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-01-10 20:15 修改: 2022-10-28 17:54

html-minifier CVE-2022-37620 高危 4.0.0 kangax html-minifier REDoS vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37620

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-31 12:15 修改: 2024-11-04 16:52

http-cache-semantics CVE-2022-25881 高危 4.1.0 4.1.1 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25881

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-01-31 05:15 修改: 2023-11-07 03:44

http-cache-semantics CVE-2022-25881 高危 4.1.0 4.1.1 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25881

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-01-31 05:15 修改: 2023-11-07 03:44

http-cache-semantics CVE-2022-25881 高危 4.1.0 4.1.1 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25881

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-01-31 05:15 修改: 2023-11-07 03:44

http-proxy-middleware CVE-2024-21536 高危 2.0.6 2.0.7, 3.0.3 http-proxy-middleware: Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21536

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-10-19 05:15 修改: 2024-11-01 18:03

@koa/cors CVE-2023-49803 高危 3.4.3 5.0.0 Overly permissive origin policy

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49803

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-12-11 23:15 修改: 2023-12-14 20:03

immer CVE-2020-28477 高危 7.0.15 8.0.1 nodejs-immer: prototype pollution may lead to DoS or remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28477

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2021-01-19 11:15 修改: 2021-02-04 14:43

immer CVE-2021-3757 高危 7.0.15 9.0.6 nodejs-immer: prototype pollution may lead to DoS or remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3757

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2021-09-02 12:15 修改: 2022-09-10 02:46

ip CVE-2024-29415 高危 1.1.5 node-ip: Incomplete fix for CVE-2023-42282

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29415

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-27 20:15 修改: 2024-08-16 14:35

ip CVE-2024-29415 高危 1.1.5 node-ip: Incomplete fix for CVE-2023-42282

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29415

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-27 20:15 修改: 2024-08-16 14:35

ip CVE-2024-29415 高危 1.1.5 node-ip: Incomplete fix for CVE-2023-42282

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29415

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-27 20:15 修改: 2024-08-16 14:35

ip CVE-2024-29415 高危 1.1.8 node-ip: Incomplete fix for CVE-2023-42282

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29415

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-27 20:15 修改: 2024-08-16 14:35

ip CVE-2024-29415 高危 2.0.0 node-ip: Incomplete fix for CVE-2023-42282

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29415

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-27 20:15 修改: 2024-08-16 14:35

ip CVE-2024-29415 高危 2.0.0 node-ip: Incomplete fix for CVE-2023-42282

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29415

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-27 20:15 修改: 2024-08-16 14:35

ip CVE-2024-29415 高危 2.0.0 node-ip: Incomplete fix for CVE-2023-42282

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29415

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-27 20:15 修改: 2024-08-16 14:35

ip CVE-2024-29415 高危 2.0.0 node-ip: Incomplete fix for CVE-2023-42282

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29415

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-27 20:15 修改: 2024-08-16 14:35

ip CVE-2024-29415 高危 2.0.0 node-ip: Incomplete fix for CVE-2023-42282

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29415

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-27 20:15 修改: 2024-08-16 14:35

json5 CVE-2022-46175 高危 1.0.1 2.2.2, 1.0.2 json5: Prototype Pollution in JSON5 via Parse Method

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46175

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-12-24 04:15 修改: 2023-11-26 01:15

json5 CVE-2022-46175 高危 1.0.1 2.2.2, 1.0.2 json5: Prototype Pollution in JSON5 via Parse Method

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46175

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-12-24 04:15 修改: 2023-11-26 01:15

json5 CVE-2022-46175 高危 1.0.1 2.2.2, 1.0.2 json5: Prototype Pollution in JSON5 via Parse Method

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46175

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-12-24 04:15 修改: 2023-11-26 01:15

json5 CVE-2022-46175 高危 2.2.0 2.2.2, 1.0.2 json5: Prototype Pollution in JSON5 via Parse Method

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46175

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-12-24 04:15 修改: 2023-11-26 01:15

json5 CVE-2022-46175 高危 2.2.0 2.2.2, 1.0.2 json5: Prototype Pollution in JSON5 via Parse Method

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46175

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-12-24 04:15 修改: 2023-11-26 01:15

json5 CVE-2022-46175 高危 2.2.0 2.2.2, 1.0.2 json5: Prototype Pollution in JSON5 via Parse Method

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46175

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-12-24 04:15 修改: 2023-11-26 01:15

mermaid GHSA-m4gq-x24j-jpmf 高危 10.9.1 10.9.3 Prototype pollution vulnerability found in Mermaid's bundled version of DOMPurify

漏洞详情: https://github.com/advisories/GHSA-m4gq-x24j-jpmf

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

ansi-regex CVE-2021-3807 高危 3.0.0 6.0.1, 5.0.1, 4.1.1, 3.0.1 nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3807

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2021-09-17 07:15 修改: 2023-07-10 19:01

body-parser CVE-2024-45590 高危 1.20.1 1.20.3 body-parser: Denial of Service Vulnerability in body-parser

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45590

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-09-10 16:15 修改: 2024-09-20 16:26

braces CVE-2024-4068 高危 2.3.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

braces CVE-2024-4068 高危 2.3.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

braces CVE-2024-4068 高危 2.3.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

braces CVE-2024-4068 高危 2.3.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

braces CVE-2024-4068 高危 2.3.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

moment CVE-2022-24785 高危 2.29.1 2.29.2 Moment.js: Path traversal in moment.locale

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24785

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-04-04 17:15 修改: 2023-11-07 03:44

moment CVE-2022-31129 高危 2.29.1 2.29.4 moment: inefficient parsing algorithm resulting in DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31129

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-07-06 18:15 修改: 2023-11-07 03:47

path-to-regexp CVE-2024-45296 高危 0.1.7 1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0 path-to-regexp: Backtracking regular expressions cause ReDoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45296

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-09-09 19:15 修改: 2024-09-10 12:09

path-to-regexp CVE-2024-45296 高危 1.8.0 1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0 path-to-regexp: Backtracking regular expressions cause ReDoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45296

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-09-09 19:15 修改: 2024-09-10 12:09

path-to-regexp CVE-2024-45296 高危 2.2.1 1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0 path-to-regexp: Backtracking regular expressions cause ReDoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45296

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-09-09 19:15 修改: 2024-09-10 12:09

pdfjs-dist CVE-2024-4367 高危 3.11.174 4.2.67 Mozilla: Arbitrary JavaScript execution in PDF.js

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4367

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 18:15 修改: 2024-06-10 17:16

qs CVE-2022-24999 高危 6.5.2 6.10.3, 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, 6.2.4 express: "qs" prototype poisoning causes the hang of the node process

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24999

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-11-26 22:15 修改: 2023-09-08 17:15

qs CVE-2022-24999 高危 6.5.2 6.10.3, 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, 6.2.4 express: "qs" prototype poisoning causes the hang of the node process

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24999

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-11-26 22:15 修改: 2023-09-08 17:15

qs CVE-2022-24999 高危 6.5.2 6.10.3, 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, 6.2.4 express: "qs" prototype poisoning causes the hang of the node process

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24999

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-11-26 22:15 修改: 2023-09-08 17:15

rollup CVE-2024-47068 高危 0.50.1 3.29.5, 4.22.4, 2.79.2 rollup: DOM Clobbering Gadget found in rollup bundled scripts that leads to XSS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-09-23 16:15 修改: 2024-10-29 16:15

rollup CVE-2024-47068 高危 4.2.0 3.29.5, 4.22.4, 2.79.2 rollup: DOM Clobbering Gadget found in rollup bundled scripts that leads to XSS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47068

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-09-23 16:15 修改: 2024-10-29 16:15

semver CVE-2022-25883 高危 5.7.1 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 5.7.1 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 5.7.1 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 5.7.1 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 5.7.1 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 5.7.1 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.5 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.5 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.5 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.5 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.5 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.5 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.5 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.5 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.5 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.5 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.5 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.5 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.5 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.7 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.8 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.8 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.8 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.8 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.8 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.8 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.8 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

semver CVE-2022-25883 高危 7.3.8 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-21 05:15 修改: 2024-12-06 17:15

trim CVE-2020-7753 高危 0.0.1 0.0.3 nodejs-trim: Regular Expression Denial of Service (ReDoS) in trim function

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-7753

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2020-10-27 09:15 修改: 2023-11-07 03:26

webpack-dev-middleware CVE-2024-29180 高危 5.3.3 7.1.0, 6.1.2, 5.3.4 webpack-dev-middleware: lack of URL validation may lead to file leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29180

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-03-21 17:15 修改: 2024-03-21 19:47

ws CVE-2024-37890 高危 7.4.6 5.2.4, 6.2.3, 7.5.10, 8.17.1 nodejs-ws: denial of service when handling a request with many HTTP headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37890

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44

ws CVE-2024-37890 高危 7.5.6 5.2.4, 6.2.3, 7.5.10, 8.17.1 nodejs-ws: denial of service when handling a request with many HTTP headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37890

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44

ws CVE-2024-37890 高危 7.5.6 5.2.4, 6.2.3, 7.5.10, 8.17.1 nodejs-ws: denial of service when handling a request with many HTTP headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37890

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44

ws CVE-2024-37890 高危 7.5.6 5.2.4, 6.2.3, 7.5.10, 8.17.1 nodejs-ws: denial of service when handling a request with many HTTP headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37890

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44

ws CVE-2024-37890 高危 7.5.9 5.2.4, 6.2.3, 7.5.10, 8.17.1 nodejs-ws: denial of service when handling a request with many HTTP headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37890

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44

ws CVE-2024-37890 高危 7.5.9 5.2.4, 6.2.3, 7.5.10, 8.17.1 nodejs-ws: denial of service when handling a request with many HTTP headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37890

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44

ws CVE-2024-37890 高危 7.5.9 5.2.4, 6.2.3, 7.5.10, 8.17.1 nodejs-ws: denial of service when handling a request with many HTTP headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37890

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44

ws CVE-2024-37890 高危 8.11.0 5.2.4, 6.2.3, 7.5.10, 8.17.1 nodejs-ws: denial of service when handling a request with many HTTP headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37890

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44

ws CVE-2024-37890 高危 8.13.0 5.2.4, 6.2.3, 7.5.10, 8.17.1 nodejs-ws: denial of service when handling a request with many HTTP headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37890

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44

request CVE-2023-28155 中危 2.88.2 The Request package through 2.88.1 for Node.js allows a bypass of SSRF ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28155

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-03-16 15:15 修改: 2024-08-02 13:15

request CVE-2023-28155 中危 2.88.2 The Request package through 2.88.1 for Node.js allows a bypass of SSRF ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28155

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-03-16 15:15 修改: 2024-08-02 13:15

request CVE-2023-28155 中危 2.88.2 The Request package through 2.88.1 for Node.js allows a bypass of SSRF ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28155

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-03-16 15:15 修改: 2024-08-02 13:15

follow-redirects CVE-2024-28849 中危 1.15.3 1.15.6 follow-redirects: Possible credential leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28849

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-03-14 17:15 修改: 2024-03-23 03:15

follow-redirects CVE-2024-28849 中危 1.15.3 1.15.6 follow-redirects: Possible credential leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28849

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-03-14 17:15 修改: 2024-03-23 03:15

got CVE-2022-33987 中危 9.6.0 12.1.0, 11.8.5 nodejs-got: missing verification of requested URLs allows redirects to UNIX sockets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33987

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-06-18 21:15 修改: 2022-06-28 16:15

express CVE-2024-29041 中危 4.18.2 4.19.2, 5.0.0-beta.3 express: cause malformed URLs to be evaluated

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29041

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-03-25 21:15 修改: 2024-03-26 12:55

fast-xml-parser CVE-2023-26920 中危 3.21.1 4.1.2 fast-xml-parser vulnerable to Prototype Pollution through tag or attribute name

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26920

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-12-12 17:15 修改: 2023-12-14 20:41

micromatch CVE-2024-4067 中危 3.1.10 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

micromatch CVE-2024-4067 中危 3.1.10 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

micromatch CVE-2024-4067 中危 3.1.10 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

micromatch CVE-2024-4067 中危 3.1.10 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

micromatch CVE-2024-4067 中危 3.1.10 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

micromatch CVE-2024-4067 中危 3.1.10 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

micromatch CVE-2024-4067 中危 4.0.4 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

micromatch CVE-2024-4067 中危 4.0.4 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

micromatch CVE-2024-4067 中危 4.0.4 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

micromatch CVE-2024-4067 中危 4.0.4 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

micromatch CVE-2024-4067 中危 4.0.4 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

micromatch CVE-2024-4067 中危 4.0.4 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

micromatch CVE-2024-4067 中危 4.0.5 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

nanoid CVE-2024-55565 中危 3.3.7 5.0.9, 3.3.8 nanoid: nanoid mishandles non-integer values

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-55565

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-12-09 02:15 修改: 2024-12-12 19:15

tar CVE-2024-28863 中危 6.1.11 6.2.1 node-tar: denial of service while parsing a tar file due to lack of folders depth validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16

tar CVE-2024-28863 中危 6.1.11 6.2.1 node-tar: denial of service while parsing a tar file due to lack of folders depth validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16

tar CVE-2024-28863 中危 6.1.11 6.2.1 node-tar: denial of service while parsing a tar file due to lack of folders depth validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16

tar CVE-2024-28863 中危 6.1.11 6.2.1 node-tar: denial of service while parsing a tar file due to lack of folders depth validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16

tar CVE-2024-28863 中危 6.1.11 6.2.1 node-tar: denial of service while parsing a tar file due to lack of folders depth validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16

tar CVE-2024-28863 中危 6.1.11 6.2.1 node-tar: denial of service while parsing a tar file due to lack of folders depth validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16

tar CVE-2024-28863 中危 6.1.11 6.2.1 node-tar: denial of service while parsing a tar file due to lack of folders depth validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16

tar CVE-2024-28863 中危 6.1.11 6.2.1 node-tar: denial of service while parsing a tar file due to lack of folders depth validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16

tough-cookie CVE-2023-26136 中危 2.5.0 4.1.3 tough-cookie: prototype pollution in cookie memstore

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26136

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-07-01 05:15 修改: 2024-06-21 19:15

tough-cookie CVE-2023-26136 中危 2.5.0 4.1.3 tough-cookie: prototype pollution in cookie memstore

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26136

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-07-01 05:15 修改: 2024-06-21 19:15

tough-cookie CVE-2023-26136 中危 2.5.0 4.1.3 tough-cookie: prototype pollution in cookie memstore

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26136

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-07-01 05:15 修改: 2024-06-21 19:15

tough-cookie CVE-2023-26136 中危 4.0.0 4.1.3 tough-cookie: prototype pollution in cookie memstore

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26136

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-07-01 05:15 修改: 2024-06-21 19:15

tough-cookie CVE-2023-26136 中危 4.0.0 4.1.3 tough-cookie: prototype pollution in cookie memstore

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26136

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-07-01 05:15 修改: 2024-06-21 19:15

tough-cookie CVE-2023-26136 中危 4.1.2 4.1.3 tough-cookie: prototype pollution in cookie memstore

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26136

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-07-01 05:15 修改: 2024-06-21 19:15

nanoid CVE-2024-55565 中危 3.3.7 5.0.9, 3.3.8 nanoid: nanoid mishandles non-integer values

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-55565

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-12-09 02:15 修改: 2024-12-12 19:15

webpack CVE-2024-43788 中危 5.89.0 5.94.0 webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43788

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-08-27 17:15 修改: 2024-09-03 15:15

micromatch CVE-2024-4067 中危 4.0.5 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

word-wrap CVE-2023-26115 中危 1.2.3 1.2.4 word-wrap: ReDoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26115

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-22 05:15 修改: 2024-06-21 19:15

word-wrap CVE-2023-26115 中危 1.2.3 1.2.4 word-wrap: ReDoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26115

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-22 05:15 修改: 2024-06-21 19:15

word-wrap CVE-2023-26115 中危 1.2.3 1.2.4 word-wrap: ReDoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26115

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-06-22 05:15 修改: 2024-06-21 19:15

path-to-regexp CVE-2024-52798 中危 0.1.7 0.1.12 path-to-regexp: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52798

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-12-05 23:15 修改: 2024-12-05 23:15

axios CVE-2023-45857 中危 0.25.0 1.6.0, 0.28.0 axios: exposure of confidential data stored in cookies

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45857

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-11-08 21:15 修改: 2024-06-21 19:15

follow-redirects CVE-2022-0536 中危 1.14.5 1.14.8 follow-redirects: Exposure of Sensitive Information via Authorization Header leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0536

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2022-02-09 11:15 修改: 2023-08-02 09:15

follow-redirects CVE-2023-26159 中危 1.14.5 1.15.4 follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26159

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-01-02 05:15 修改: 2024-01-23 03:15

postcss CVE-2023-44270 中危 8.4.24 8.4.31 PostCSS: Improper input validation in PostCSS

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44270

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-09-29 22:15 修改: 2023-10-10 17:19

follow-redirects CVE-2024-28849 中危 1.14.5 1.15.6 follow-redirects: Possible credential leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28849

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-03-14 17:15 修改: 2024-03-23 03:15

follow-redirects CVE-2023-26159 中危 1.15.3 1.15.4 follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26159

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-01-02 05:15 修改: 2024-01-23 03:15

follow-redirects CVE-2023-26159 中危 1.15.3 1.15.4 follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26159

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-01-02 05:15 修改: 2024-01-23 03:15

react-devtools-core CVE-2023-5654 中危 4.26.1 4.28.4 React Developer Tools extension Improper Authorization vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5654

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-10-19 15:15 修改: 2024-09-12 15:35

xml2js CVE-2023-0842 中危 0.4.23 0.5.0 node-xml2js: xml2js is vulnerable to prototype pollution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0842

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2023-04-05 20:15 修改: 2024-03-14 21:15

yargs-parser CVE-2020-7608 中危 7.0.0 13.1.2, 15.0.1, 18.1.1, 5.0.1 nodejs-yargs-parser: prototype pollution vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-7608

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2020-03-16 20:15 修改: 2022-11-15 16:40

elliptic CVE-2024-42460 低危 6.5.4 6.5.7 elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42460

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-08-02 07:16 修改: 2024-08-02 16:35

elliptic CVE-2024-42460 低危 6.5.4 6.5.7 elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42460

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-08-02 07:16 修改: 2024-08-02 16:35

elliptic CVE-2024-42461 低危 6.5.4 6.5.7 elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42461

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-08-02 07:16 修改: 2024-08-16 16:51

elliptic CVE-2024-42461 低危 6.5.4 6.5.7 elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42461

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-08-02 07:16 修改: 2024-08-16 16:51

elliptic CVE-2024-48948 低危 6.5.4 6.6.0 elliptic: ECDSA signature verification error may reject legitimate transactions

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48948

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-10-15 14:15 修改: 2024-11-05 19:36

ip CVE-2023-42282 低危 1.1.5 2.0.1, 1.1.9 nodejs-ip: arbitrary code execution via the isPublic() function

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42282

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-02-08 17:15 修改: 2024-10-09 15:14

ip CVE-2023-42282 低危 1.1.5 2.0.1, 1.1.9 nodejs-ip: arbitrary code execution via the isPublic() function

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42282

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-02-08 17:15 修改: 2024-10-09 15:14

ip CVE-2023-42282 低危 1.1.5 2.0.1, 1.1.9 nodejs-ip: arbitrary code execution via the isPublic() function

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42282

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-02-08 17:15 修改: 2024-10-09 15:14

elliptic CVE-2024-48948 低危 6.5.4 6.6.0 elliptic: ECDSA signature verification error may reject legitimate transactions

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48948

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-10-15 14:15 修改: 2024-11-05 19:36

ip CVE-2023-42282 低危 1.1.8 2.0.1, 1.1.9 nodejs-ip: arbitrary code execution via the isPublic() function

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42282

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-02-08 17:15 修改: 2024-10-09 15:14

elliptic CVE-2024-48949 低危 6.5.4 6.5.6 elliptic: Missing Validation in Elliptic's EDDSA Signature Verification

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48949

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-10-10 01:15 修改: 2024-10-15 14:07

elliptic CVE-2024-48949 低危 6.5.4 6.5.6 elliptic: Missing Validation in Elliptic's EDDSA Signature Verification

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48949

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-10-10 01:15 修改: 2024-10-15 14:07

es5-ext CVE-2024-27088 低危 0.10.53 0.10.63 es5-ext contains ECMAScript 5 extensions. Passing functions with very ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27088

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-02-26 17:15 修改: 2024-02-26 22:10

es5-ext CVE-2024-27088 低危 0.10.53 0.10.63 es5-ext contains ECMAScript 5 extensions. Passing functions with very ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27088

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-02-26 17:15 修改: 2024-02-26 22:10

cookie CVE-2024-47764 低危 0.5.0 0.7.0 cookie: cookie accepts cookie name, path, and domain with out of bounds characters

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47764

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-10-04 20:15 修改: 2024-10-07 17:48

ip CVE-2023-42282 低危 2.0.0 2.0.1, 1.1.9 nodejs-ip: arbitrary code execution via the isPublic() function

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42282

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-02-08 17:15 修改: 2024-10-09 15:14

ip CVE-2023-42282 低危 2.0.0 2.0.1, 1.1.9 nodejs-ip: arbitrary code execution via the isPublic() function

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42282

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-02-08 17:15 修改: 2024-10-09 15:14

send CVE-2024-43799 低危 0.18.0 0.19.0 send: Code Execution Vulnerability in Send Library

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43799

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-09-10 15:15 修改: 2024-09-20 16:57

serve-static CVE-2024-43800 低危 1.15.0 1.16.0, 2.1.0 serve-static: Improper Sanitization in serve-static

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43800

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-09-10 15:15 修改: 2024-09-20 17:36

ip CVE-2023-42282 低危 2.0.0 2.0.1, 1.1.9 nodejs-ip: arbitrary code execution via the isPublic() function

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42282

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-02-08 17:15 修改: 2024-10-09 15:14

ip CVE-2023-42282 低危 2.0.0 2.0.1, 1.1.9 nodejs-ip: arbitrary code execution via the isPublic() function

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42282

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-02-08 17:15 修改: 2024-10-09 15:14

ip CVE-2023-42282 低危 2.0.0 2.0.1, 1.1.9 nodejs-ip: arbitrary code execution via the isPublic() function

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42282

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-02-08 17:15 修改: 2024-10-09 15:14

express CVE-2024-43796 低危 4.18.2 4.20.0, 5.0.0 express: Improper Input Handling in Express Redirects

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43796

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-09-10 15:15 修改: 2024-09-20 16:07

elliptic CVE-2024-42459 低危 6.5.4 6.5.7 elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42459

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-08-02 07:16 修改: 2024-08-02 15:35

elliptic CVE-2024-42459 低危 6.5.4 6.5.7 elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42459

镜像层: sha256:8c01c72a66f88824d7b6152dd97f454ee7fe2e3d435685ea7a9d85bf8c046d9d

发布日期: 2024-08-02 07:16 修改: 2024-08-02 15:35

/home/joplin/packages/lib/services/e2ee/ppkTestUtils.ts ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/joplin/packages/server/stripeConfig.json ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/joplin/packages/lib/services/e2ee/ppkTestUtils.js ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息