| google.golang.org/grpc |
CVE-2026-33186 |
严重 |
v1.79.2 |
1.79.3 |
google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33186
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-03-20 23:16 修改: 2026-04-10 20:49
|
| github.com/docker/cli |
CVE-2025-15558 |
高危 |
v28.5.2+incompatible |
29.2.0 |
docker/cli: Docker CLI for Windows: Privilege escalation via malicious plugin binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15558
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-03-04 17:16 修改: 2026-03-09 17:38
|
| github.com/docker/docker |
CVE-2026-34040 |
高危 |
v28.5.2+incompatible |
29.3.1 |
Moby: Moby: Authorization bypass vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34040
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-03-31 03:15 修改: 2026-04-03 16:51
|
| github.com/go-git/go-git/v5 |
CVE-2026-45022 |
高危 |
v5.17.0 |
5.19.0 |
go-git's improper parsing of specially crafted objects may lead to inconsistent interpretation compared to upstream Git
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-45022
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| github.com/go-jose/go-jose/v4 |
CVE-2026-34986 |
高危 |
v4.1.3 |
4.1.4 |
github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34986
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-04-06 17:17 修改: 2026-05-04 15:20
|
| go.opentelemetry.io/otel/sdk |
CVE-2026-39883 |
高危 |
v1.41.0 |
1.43.0 |
opentelemetry-go: BSD kenv command not using absolute path enables PATH hijacking
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39883
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-04-08 21:17 修改: 2026-04-10 21:16
|
| github.com/buger/jsonparser |
CVE-2026-32285 |
高危 |
v1.1.1 |
1.1.2 |
github.com/buger/jsonparser: github.com/buger/jsonparser: Denial of Service via malformed JSON input
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32285
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-03-26 20:16 修改: 2026-04-21 15:42
|
| stdlib |
CVE-2026-25679 |
高危 |
v1.25.7 |
1.25.8, 1.26.1 |
net/url: Incorrect parsing of IPv6 host literals in net/url
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-25679
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-03-06 22:16 修改: 2026-04-21 14:43
|
| stdlib |
CVE-2026-32280 |
高危 |
v1.25.7 |
1.25.9, 1.26.2 |
crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32280
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:16
|
| stdlib |
CVE-2026-32281 |
高危 |
v1.25.7 |
1.25.9, 1.26.2 |
crypto/x509: golang: Go crypto/x509: Denial of Service via inefficient certificate chain validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32281
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:15
|
| stdlib |
CVE-2026-32283 |
高危 |
v1.25.7 |
1.25.9, 1.26.2 |
crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32283
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:12
|
| stdlib |
CVE-2026-33811 |
高危 |
v1.25.7 |
1.25.10, 1.26.3 |
When using LookupCNAME with the cgo DNS resolver, a very long CNAME re ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33811
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-05-07 20:16 修改: 2026-05-12 20:23
|
| stdlib |
CVE-2026-33814 |
高危 |
v1.25.7 |
1.25.10, 1.26.3 |
When processing HTTP/2 SETTINGS frames, transport will enter an infini ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33814
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-05-07 20:16 修改: 2026-05-08 19:16
|
| stdlib |
CVE-2026-39820 |
高危 |
v1.25.7 |
1.25.10, 1.26.3 |
Well-crafted inputs reaching ParseAddress, ParseAddressList, and Parse ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39820
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-05-07 20:16 修改: 2026-05-08 15:16
|
| stdlib |
CVE-2026-39836 |
高危 |
v1.25.7 |
1.25.10, 1.26.3 |
Panic in Dial and LookupPort when handling NUL byte on Windows in net
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39836
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-05-07 20:16 修改: 2026-05-08 22:16
|
| stdlib |
CVE-2026-42499 |
高危 |
v1.25.7 |
1.25.10, 1.26.3 |
Pathological inputs could cause DoS through consumePhrase when parsing ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42499
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-05-07 20:16 修改: 2026-05-08 22:16
|
| github.com/in-toto/in-toto-golang |
GHSA-pmwq-pjrm-6p5r |
中危 |
v0.10.0 |
0.11.0 |
in-toto-golang and in-toto-python have inconsistent negation behavior
漏洞详情: https://github.com/advisories/GHSA-pmwq-pjrm-6p5r
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-05-08 22:24 修改: 2026-05-08 22:24
|
| github.com/docker/docker |
CVE-2026-33997 |
中危 |
v28.5.2+incompatible |
29.3.1 |
moby: docker: github.com/moby/moby: Moby: Privilege validation bypass during plugin installation
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33997
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-03-31 03:15 修改: 2026-04-03 17:23
|
| github.com/aws/aws-sdk-go-v2/service/s3 |
GHSA-xmrv-pmrh-hhx2 |
中危 |
v1.96.0 |
1.97.3 |
Denial of Service due to Panic in AWS SDK for Go v2 SDK EventStream Decoder
漏洞详情: https://github.com/advisories/GHSA-xmrv-pmrh-hhx2
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-04-08 00:18 修改: 2026-04-08 00:18
|
| github.com/go-git/go-git/v5 |
CVE-2026-34165 |
中危 |
v5.17.0 |
5.17.1 |
github.com/go-git/go-git/v5: go-git: Denial of Service via crafted .idx file
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34165
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-03-31 15:16 修改: 2026-04-02 16:49
|
| github.com/go-git/go-git/v5 |
CVE-2026-41506 |
中危 |
v5.17.0 |
5.18.0 |
go-git is an extensible git implementation library written in pure Go. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41506
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-05-08 14:16 修改: 2026-05-12 14:33
|
| github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream |
GHSA-xmrv-pmrh-hhx2 |
中危 |
v1.7.4 |
1.7.8 |
Denial of Service due to Panic in AWS SDK for Go v2 SDK EventStream Decoder
漏洞详情: https://github.com/advisories/GHSA-xmrv-pmrh-hhx2
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-04-08 00:18 修改: 2026-04-08 00:18
|
| stdlib |
CVE-2026-27142 |
中危 |
v1.25.7 |
1.25.8, 1.26.1 |
html/template: URLs in meta content attribute actions are not escaped in html/template
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27142
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-03-06 22:16 修改: 2026-04-21 14:30
|
| stdlib |
CVE-2026-32282 |
中危 |
v1.25.7 |
1.25.9, 1.26.2 |
golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32282
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:15
|
| stdlib |
CVE-2026-32288 |
中危 |
v1.25.7 |
1.25.9, 1.26.2 |
archive/tar: golang: Go's archive/tar package: Denial of Service via maliciously-crafted archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32288
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:08
|
| stdlib |
CVE-2026-32289 |
中危 |
v1.25.7 |
1.25.9, 1.26.2 |
html/template: golang: html/template: Cross-Site Scripting (XSS) via improper context and brace depth tracking in JS template literals
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32289
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:06
|
| stdlib |
CVE-2026-39823 |
中危 |
v1.25.7 |
1.25.10, 1.26.3 |
CVE-2026-27142 fixed a vulnerability in which URLs were not correctly ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39823
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-05-07 20:16 修改: 2026-05-08 15:16
|
| stdlib |
CVE-2026-39825 |
中危 |
v1.25.7 |
1.25.10, 1.26.3 |
ReverseProxy can forward queries containing parameters not visible to ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39825
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-05-07 20:16 修改: 2026-05-08 22:16
|
| stdlib |
CVE-2026-39826 |
中危 |
v1.25.7 |
1.25.10, 1.26.3 |
If a trusted template author were to write a <script> tag containing a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39826
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-05-07 20:16 修改: 2026-05-08 15:16
|
| github.com/go-git/go-git/v5 |
CVE-2026-33762 |
低危 |
v5.17.0 |
5.17.1 |
github.com/go-git/go-git/v5: go-git: Denial of Service via crafted Git index file
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33762
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-03-31 15:16 修改: 2026-04-02 16:49
|
| stdlib |
CVE-2026-27139 |
低危 |
v1.25.7 |
1.25.8, 1.26.1 |
os: FileInfo can escape from a Root in golang os module
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27139
镜像层: sha256:4f5ab020ff7decd3004ae37178c71b2fd176a6612710900494c94cff4f3613e5
发布日期: 2026-03-06 22:16 修改: 2026-04-21 14:32
|