docker.io/goharbor/prepare:v2.11.1 linux/amd64

docker.io/goharbor/prepare:v2.11.1 - Trivy安全扫描结果 扫描时间: 2024-11-08 14:50
全部漏洞信息
低危漏洞:0 中危漏洞:7 高危漏洞:3 严重漏洞:5

系统OS: photon 5.0 扫描引擎: Trivy 扫描时间: 2024-11-08 14:50

docker.io/goharbor/prepare:v2.11.1 (photon 5.0) (photon)
低危漏洞:0 中危漏洞:7 高危漏洞:3 严重漏洞:5
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
expat CVE-2024-45491 严重 2.6.0-2.ph5 2.6.0-3.ph5 libexpat: Integer Overflow or Wraparound

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491

镜像层: sha256:40dbf36fc7e0b426d0be8d8cd2cfb4effb376720d680633495b8773a39efd5d2

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

expat CVE-2024-45492 严重 2.6.0-2.ph5 2.6.0-3.ph5 libexpat: integer overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492

镜像层: sha256:40dbf36fc7e0b426d0be8d8cd2cfb4effb376720d680633495b8773a39efd5d2

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

expat-libs CVE-2024-45491 严重 2.6.0-2.ph5 2.6.0-3.ph5 libexpat: Integer Overflow or Wraparound

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491

镜像层: sha256:fa65d0b345aa676b8e3c7391c9c978a7d97f8d5347de8b0d5540b513caf00de4

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

expat-libs CVE-2024-45492 严重 2.6.0-2.ph5 2.6.0-3.ph5 libexpat: integer overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492

镜像层: sha256:fa65d0b345aa676b8e3c7391c9c978a7d97f8d5347de8b0d5540b513caf00de4

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

krb5 CVE-2024-37371 严重 1.20.2-3.ph5 1.20.2-4.ph5 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371

镜像层: sha256:fa65d0b345aa676b8e3c7391c9c978a7d97f8d5347de8b0d5540b513caf00de4

发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39

expat-libs CVE-2024-45490 高危 2.6.0-2.ph5 2.6.0-3.ph5 libexpat: Negative Length Parsing Vulnerability in libexpat

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490

镜像层: sha256:fa65d0b345aa676b8e3c7391c9c978a7d97f8d5347de8b0d5540b513caf00de4

发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24

expat CVE-2024-45490 高危 2.6.0-2.ph5 2.6.0-3.ph5 libexpat: Negative Length Parsing Vulnerability in libexpat

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490

镜像层: sha256:40dbf36fc7e0b426d0be8d8cd2cfb4effb376720d680633495b8773a39efd5d2

发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24

krb5 CVE-2024-37370 高危 1.20.2-3.ph5 1.20.2-4.ph5 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370

镜像层: sha256:fa65d0b345aa676b8e3c7391c9c978a7d97f8d5347de8b0d5540b513caf00de4

发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48

apr CVE-2023-49582 中危 1.7.4-3.ph5 1.7.5-1.ph5 APR: Lax permissions in Apache Portable Runtime shared memory

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49582

镜像层: sha256:312f4e210c8dd8bccfeffa1b811b6ad620260a9fef3113bd9088ae2326a6d844

发布日期: 2024-08-26 14:15 修改: 2024-08-27 16:04

python3 CVE-2023-27043 中危 3.11.9-2.ph5 3.11.9-4.ph5 python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043

镜像层: sha256:40dbf36fc7e0b426d0be8d8cd2cfb4effb376720d680633495b8773a39efd5d2

发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27

python3 CVE-2024-6923 中危 3.11.9-2.ph5 3.11.9-3.ph5 cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923

镜像层: sha256:40dbf36fc7e0b426d0be8d8cd2cfb4effb376720d680633495b8773a39efd5d2

发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15

python3-libs CVE-2023-27043 中危 3.11.9-2.ph5 3.11.9-4.ph5 python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043

镜像层: sha256:40dbf36fc7e0b426d0be8d8cd2cfb4effb376720d680633495b8773a39efd5d2

发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27

python3-libs CVE-2024-6923 中危 3.11.9-2.ph5 3.11.9-3.ph5 cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923

镜像层: sha256:40dbf36fc7e0b426d0be8d8cd2cfb4effb376720d680633495b8773a39efd5d2

发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15

python3-xml CVE-2023-27043 中危 3.11.9-2.ph5 3.11.9-4.ph5 python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043

镜像层: sha256:40dbf36fc7e0b426d0be8d8cd2cfb4effb376720d680633495b8773a39efd5d2

发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27

python3-xml CVE-2024-6923 中危 3.11.9-2.ph5 3.11.9-3.ph5 cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923

镜像层: sha256:40dbf36fc7e0b426d0be8d8cd2cfb4effb376720d680633495b8773a39efd5d2

发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15

Python (python-pkg)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息