axis:axis |
CVE-2023-40743 |
严重 |
1.4 |
|
** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40743
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-09-05 15:15 修改: 2024-08-02 19:15
|
axis:axis |
CVE-2023-40743 |
严重 |
1.4 |
|
** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x in an ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40743
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-09-05 15:15 修改: 2024-08-02 19:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: exfiltration/XXE in some JDK classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14720
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: exfiltration/XXE in some JDK classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14720
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14721
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14721
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5 |
jackson-databind: improper polymorphic deserialization in axis2-transport-jms class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19360
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5 |
jackson-databind: improper polymorphic deserialization in axis2-transport-jms class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19360
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 |
严重 |
2.9.6 |
2.7.9.5, 2.9.8, 2.8.11.3 |
jackson-databind: improper polymorphic deserialization in openjpa class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19361
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 |
严重 |
2.9.6 |
2.7.9.5, 2.9.8, 2.8.11.3 |
jackson-databind: improper polymorphic deserialization in openjpa class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19361
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9546 |
严重 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in shaded-hikari-config
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9546
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9546 |
严重 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in shaded-hikari-config
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9546
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer |
CVE-2021-42575 |
严重 |
20171016.1 |
20211018.1 |
owasp-java-html-sanitizer: improper policies enforcement may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42575
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-10-18 15:15 修改: 2023-02-24 17:34
|
com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer |
CVE-2021-42575 |
严重 |
20171016.1 |
20211018.1 |
owasp-java-html-sanitizer: improper policies enforcement may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42575
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-10-18 15:15 修改: 2023-02-24 17:34
|
com.h2database:h2 |
CVE-2021-42392 |
严重 |
1.4.197 |
2.0.206 |
h2: Remote Code Execution in Console
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42392
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-01-10 14:10 修改: 2023-02-24 22:15
|
com.h2database:h2 |
CVE-2021-42392 |
严重 |
1.4.197 |
2.0.206 |
h2: Remote Code Execution in Console
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42392
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-01-10 14:10 修改: 2023-02-24 22:15
|
com.h2database:h2 |
CVE-2022-23221 |
严重 |
1.4.197 |
2.1.210 |
h2: Loading of custom classes from remote servers through JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23221
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-01-19 17:15 修改: 2023-08-18 14:15
|
com.h2database:h2 |
CVE-2022-23221 |
严重 |
1.4.197 |
2.1.210 |
h2: Loading of custom classes from remote servers through JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23221
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-01-19 17:15 修改: 2023-08-18 14:15
|
commons-collections:commons-collections |
CVE-2015-7501 |
严重 |
3.2.1 |
3.2.2 |
apache-commons-collections: InvokerTransformer code execution during deserialisation
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7501
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2017-11-09 17:29 修改: 2024-02-16 13:15
|
commons-collections:commons-collections |
CVE-2015-7501 |
严重 |
3.2.1 |
3.2.2 |
apache-commons-collections: InvokerTransformer code execution during deserialisation
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7501
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2017-11-09 17:29 修改: 2024-02-16 13:15
|
commons-fileupload:commons-fileupload |
CVE-2016-1000031 |
严重 |
1.3.1 |
1.3.3 |
FileUpload: DiskFileItem file manipulation
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000031
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2016-10-25 14:29 修改: 2023-11-07 02:29
|
commons-fileupload:commons-fileupload |
CVE-2016-1000031 |
严重 |
1.3.1 |
1.3.3 |
FileUpload: DiskFileItem file manipulation
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000031
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2016-10-25 14:29 修改: 2023-11-07 02:29
|
dom4j:dom4j |
CVE-2020-10683 |
严重 |
1.6.1 |
|
dom4j: XML External Entity vulnerability in default SAX parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10683
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-05-01 19:15 修改: 2023-11-07 03:14
|
dom4j:dom4j |
CVE-2020-10683 |
严重 |
1.6.1 |
|
dom4j: XML External Entity vulnerability in default SAX parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10683
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-05-01 19:15 修改: 2023-11-07 03:14
|
org.apache.bcel:bcel |
CVE-2022-42920 |
严重 |
5.2 |
6.6.0 |
Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42920
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-11-07 13:15 修改: 2024-01-17 15:15
|
org.apache.bcel:bcel |
CVE-2022-42920 |
严重 |
5.2 |
6.6.0 |
Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42920
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-11-07 13:15 修改: 2024-01-17 15:15
|
org.apache.cxf:cxf-core |
CVE-2022-46364 |
严重 |
3.2.11 |
3.4.10, 3.5.5 |
CXF: SSRF Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46364
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-13 17:15 修改: 2023-11-07 03:55
|
org.apache.cxf:cxf-core |
CVE-2022-46364 |
严重 |
3.2.11 |
3.4.10, 3.5.5 |
CXF: SSRF Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46364
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-13 17:15 修改: 2023-11-07 03:55
|
org.apache.cxf:cxf-core |
CVE-2024-28752 |
严重 |
3.2.11 |
3.5.8, 3.6.3, 4.0.4 |
cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28752
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-03-15 11:15 修改: 2024-08-01 13:49
|
org.apache.cxf:cxf-core |
CVE-2024-28752 |
严重 |
3.2.11 |
3.5.8, 3.6.3, 4.0.4 |
cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28752
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-03-15 11:15 修改: 2024-08-01 13:49
|
org.apache.maven.shared:maven-shared-utils |
CVE-2022-29599 |
严重 |
3.2.1 |
3.3.3 |
maven-shared-utils: Command injection via Commandline class
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29599
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-23 11:16 修改: 2023-09-28 09:15
|
org.apache.maven.shared:maven-shared-utils |
CVE-2022-29599 |
严重 |
3.2.1 |
3.3.3 |
maven-shared-utils: Command injection via Commandline class
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29599
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-23 11:16 修改: 2023-09-28 09:15
|
org.apache.maven:maven-core |
CVE-2021-26291 |
严重 |
3.3.9 |
3.8.1 |
maven: Block repositories using http by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26291
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-04-23 15:15 修改: 2023-11-07 03:31
|
org.apache.maven:maven-core |
CVE-2021-26291 |
严重 |
3.3.9 |
3.8.1 |
maven: Block repositories using http by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26291
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-04-23 15:15 修改: 2023-11-07 03:31
|
org.apache.mina:mina-core |
CVE-2024-52046 |
严重 |
2.0.16 |
2.2.4, 2.1.10, 2.0.27 |
mina-core: Apache MINA: applications using unbounded deserialization may allow RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52046
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-25 10:15 修改: 2025-01-03 12:15
|
org.apache.mina:mina-core |
CVE-2024-52046 |
严重 |
2.0.16 |
2.2.4, 2.1.10, 2.0.27 |
mina-core: Apache MINA: applications using unbounded deserialization may allow RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52046
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-25 10:15 修改: 2025-01-03 12:15
|
org.apache.tomcat:tomcat-catalina |
CVE-2024-52316 |
严重 |
9.0.71 |
9.0.96, 10.1.30, 11.0.1 |
tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52316
镜像层: sha256:68bc29757434f5bf5ad47724ca078754a78e21b086e69b875f270830bd0ad7dc
发布日期: 2024-11-18 12:15 修改: 2024-11-18 17:11
|
org.apache.xmlbeans:xmlbeans |
CVE-2021-23926 |
严重 |
2.6.0 |
3.0.0 |
xmlbeans: allowed malicious XML input may lead to XML Entity Expansion attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23926
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-14 15:15 修改: 2023-11-07 03:31
|
org.apache.xmlbeans:xmlbeans |
CVE-2021-23926 |
严重 |
2.6.0 |
3.0.0 |
xmlbeans: allowed malicious XML input may lead to XML Entity Expansion attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23926
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-14 15:15 修改: 2023-11-07 03:31
|
org.eclipse.jetty:jetty-server |
CVE-2017-7658 |
严重 |
9.4.7.v20180619 |
9.2.25.v20180606, 9.3.24.v20180605, 9.4.11.v20180605 |
jetty: Incorrect header handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7658
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-06-26 17:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7658 |
严重 |
9.4.7.v20180619 |
9.2.25.v20180606, 9.3.24.v20180605, 9.4.11.v20180605 |
jetty: Incorrect header handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7658
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-06-26 17:29 修改: 2023-11-07 02:50
|
org.hsqldb:hsqldb |
CVE-2022-41853 |
严重 |
2.4.1 |
2.7.1 |
hsqldb: Untrusted input may lead to RCE attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41853
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-10-06 18:17 修改: 2023-02-03 23:43
|
org.hsqldb:hsqldb |
CVE-2022-41853 |
严重 |
2.4.1 |
2.7.1 |
hsqldb: Untrusted input may lead to RCE attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41853
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-10-06 18:17 修改: 2023-02-03 23:43
|
org.postgresql:postgresql |
CVE-2024-1597 |
严重 |
42.4.1 |
42.2.28, 42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2 |
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1597
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-02-19 13:15 修改: 2024-06-10 17:16
|
org.postgresql:postgresql |
CVE-2024-1597 |
严重 |
42.4.1 |
42.2.28, 42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2 |
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1597
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-02-19 13:15 修改: 2024-06-10 17:16
|
org.quartz-scheduler:quartz |
CVE-2019-13990 |
严重 |
2.2.2 |
2.3.2 |
libquartz: XXE attacks via job description
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13990
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-07-26 19:15 修改: 2024-10-15 19:35
|
org.quartz-scheduler:quartz |
CVE-2019-13990 |
严重 |
2.2.2 |
2.3.2 |
libquartz: XXE attacks via job description
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13990
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-07-26 19:15 修改: 2024-10-15 19:35
|
org.springframework.security:spring-security-core |
CVE-2022-22978 |
严重 |
5.5.2 |
5.5.7, 5.6.4, 5.4.11 |
springframework: Authorization Bypass in RegexRequestMatcher
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22978
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-19 15:15 修改: 2023-04-11 23:15
|
org.springframework.security:spring-security-core |
CVE-2022-22978 |
严重 |
5.5.2 |
5.5.7, 5.6.4, 5.4.11 |
springframework: Authorization Bypass in RegexRequestMatcher
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22978
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-19 15:15 修改: 2023-04-11 23:15
|
org.springframework.security:spring-security-web |
CVE-2022-22978 |
严重 |
5.5.2 |
5.5.7, 5.6.4, 5.4.11 |
springframework: Authorization Bypass in RegexRequestMatcher
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22978
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-19 15:15 修改: 2023-04-11 23:15
|
org.springframework.security:spring-security-web |
CVE-2022-22978 |
严重 |
5.5.2 |
5.5.7, 5.6.4, 5.4.11 |
springframework: Authorization Bypass in RegexRequestMatcher
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22978
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-19 15:15 修改: 2023-04-11 23:15
|
org.springframework.security:spring-security-web |
CVE-2024-38821 |
严重 |
5.5.2 |
5.7.13, 5.8.15, 6.2.7, 6.0.13, 6.1.11, 6.3.4 |
Spring-WebFlux: Authorization Bypass of Static Resources in WebFlux Applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38821
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-10-28 07:15 修改: 2024-10-28 13:58
|
org.springframework.security:spring-security-web |
CVE-2024-38821 |
严重 |
5.5.2 |
5.7.13, 5.8.15, 6.2.7, 6.0.13, 6.1.11, 6.3.4 |
Spring-WebFlux: Authorization Bypass of Static Resources in WebFlux Applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38821
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-10-28 07:15 修改: 2024-10-28 13:58
|
org.springframework:spring-web |
CVE-2016-1000027 |
严重 |
5.3.18 |
6.0.0 |
spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000027
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-01-02 23:15 修改: 2023-04-20 09:15
|
org.springframework:spring-web |
CVE-2016-1000027 |
严重 |
5.3.18 |
6.0.0 |
spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000027
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-01-02 23:15 修改: 2023-04-20 09:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14195 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14195
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-06-16 16:15 修改: 2021-11-17 20:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.9.6 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.9.6 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.9.6 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.9.6 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.9.6 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.9.6 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.9.6 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.9.6 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.9.6 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.9.6 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.7 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.7 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.6.1 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
2.6.1 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.6.1 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
2.6.1 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.6.1 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
2.6.1 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.6.1 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
2.6.1 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.6.1 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
2.6.1 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.13.4 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.13.4 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
axis:axis |
CVE-2019-0227 |
高危 |
1.4 |
|
axis: Hard coded domain name in example web service named “StockQuoteService.jws” leading to remote code execution.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0227
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-05-01 21:29 修改: 2024-06-21 19:15
|
axis:axis |
CVE-2019-0227 |
高危 |
1.4 |
|
axis: Hard coded domain name in example web service named “StockQuoteService.jws” leading to remote code execution.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0227
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-05-01 21:29 修改: 2024-06-21 19:15
|
ch.qos.logback:logback-classic |
CVE-2023-6378 |
高危 |
1.2.6 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
ch.qos.logback:logback-classic |
CVE-2023-6378 |
高危 |
1.2.6 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
com.lowagie:itext |
CVE-2017-9096 |
高危 |
2.1.7 |
|
itext: External entities not disabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9096
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2017-11-08 16:29 修改: 2020-10-20 22:15
|
com.lowagie:itext |
CVE-2017-9096 |
高危 |
2.1.7 |
|
itext: External entities not disabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9096
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2017-11-08 16:29 修改: 2020-10-20 22:15
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
8.20.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
8.20.1 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
commons-beanutils:commons-beanutils |
CVE-2014-0114 |
高危 |
1.9.0 |
1.9.4 |
1: Class Loader manipulation via request parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0114
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2014-04-30 10:49 修改: 2023-02-13 00:32
|
commons-beanutils:commons-beanutils |
CVE-2014-0114 |
高危 |
1.9.0 |
1.9.4 |
1: Class Loader manipulation via request parameters
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0114
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2014-04-30 10:49 修改: 2023-02-13 00:32
|
commons-beanutils:commons-beanutils |
CVE-2019-10086 |
高危 |
1.9.0 |
1.9.4 |
apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10086
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-08-20 21:15 修改: 2023-11-07 03:02
|
commons-beanutils:commons-beanutils |
CVE-2019-10086 |
高危 |
1.9.0 |
1.9.4 |
apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10086
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-08-20 21:15 修改: 2023-11-07 03:02
|
ch.qos.logback:logback-core |
CVE-2023-6378 |
高危 |
1.2.6 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
ch.qos.logback:logback-core |
CVE-2023-6378 |
高危 |
1.2.6 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
commons-collections:commons-collections |
CVE-2015-6420 |
高危 |
3.2.1 |
3.2.2 |
Insecure Deserialization in Apache Commons Collection
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-6420
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2015-12-15 05:59 修改: 2023-11-07 02:26
|
commons-collections:commons-collections |
CVE-2015-6420 |
高危 |
3.2.1 |
3.2.2 |
Insecure Deserialization in Apache Commons Collection
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-6420
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2015-12-15 05:59 修改: 2023-11-07 02:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.9.6 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.9.6 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
commons-fileupload:commons-fileupload |
CVE-2016-3092 |
高危 |
1.3.1 |
1.3.2 |
tomcat: Usage of vulnerable FileUpload package can result in denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3092
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2016-07-04 22:59 修改: 2023-12-08 16:41
|
commons-fileupload:commons-fileupload |
CVE-2016-3092 |
高危 |
1.3.1 |
1.3.2 |
tomcat: Usage of vulnerable FileUpload package can result in denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3092
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2016-07-04 22:59 修改: 2023-12-08 16:41
|
commons-fileupload:commons-fileupload |
CVE-2023-24998 |
高危 |
1.3.1 |
1.5 |
FileUpload: FileUpload DoS with excessive parts
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11
|
commons-fileupload:commons-fileupload |
CVE-2023-24998 |
高危 |
1.3.1 |
1.5 |
FileUpload: FileUpload DoS with excessive parts
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.4 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
dom4j:dom4j |
CVE-2018-1000632 |
高危 |
1.6.1 |
|
dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000632
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-08-20 19:31 修改: 2023-11-07 02:51
|
dom4j:dom4j |
CVE-2018-1000632 |
高危 |
1.6.1 |
|
dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000632
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-08-20 19:31 修改: 2023-11-07 02:51
|
io.netty:netty-codec |
CVE-2021-37136 |
高危 |
4.1.60.Final |
4.1.68.Final |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty-codec |
CVE-2021-37136 |
高危 |
4.1.60.Final |
4.1.68.Final |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty-codec |
CVE-2021-37137 |
高危 |
4.1.60.Final |
4.1.68.Final |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty-codec |
CVE-2021-37137 |
高危 |
4.1.60.Final |
4.1.68.Final |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p |
高危 |
4.1.60.Final |
4.1.100.Final |
io.netty:netty-codec-http2 vulnerable to HTTP/2 Rapid Reset Attack
漏洞详情: https://github.com/advisories/GHSA-xpw8-rcwv-8f8p
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
io.netty:netty-codec-http2 |
GHSA-xpw8-rcwv-8f8p |
高危 |
4.1.60.Final |
4.1.100.Final |
io.netty:netty-codec-http2 vulnerable to HTTP/2 Rapid Reset Attack
漏洞详情: https://github.com/advisories/GHSA-xpw8-rcwv-8f8p
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
io.projectreactor.netty:reactor-netty-core |
CVE-2023-34054 |
高危 |
1.0.4 |
1.1.13, 1.0.39 |
Reactor Netty HTTP Server denial of service vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34054
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-11-28 09:15 修改: 2023-12-04 19:59
|
io.projectreactor.netty:reactor-netty-core |
CVE-2023-34054 |
高危 |
1.0.4 |
1.1.13, 1.0.39 |
Reactor Netty HTTP Server denial of service vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34054
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-11-28 09:15 修改: 2023-12-04 19:59
|
io.projectreactor.netty:reactor-netty-http |
CVE-2023-34062 |
高危 |
1.0.4 |
1.1.13, 1.0.39 |
reactor-netty-http: directory traversal vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34062
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-11-15 10:15 修改: 2023-11-21 20:11
|
io.projectreactor.netty:reactor-netty-http |
CVE-2023-34062 |
高危 |
1.0.4 |
1.1.13, 1.0.39 |
reactor-netty-http: directory traversal vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34062
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-11-15 10:15 修改: 2023-11-21 20:11
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.3 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
net.minidev:json-smart |
CVE-2023-1370 |
高危 |
2.3 |
2.4.9 |
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.9.6 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.9.6 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
org.apache.commons:commons-compress |
CVE-2019-12402 |
高危 |
1.15 |
1.19 |
apache-commons-compress: Infinite loop in name encoding algorithm
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12402
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-08-30 09:15 修改: 2023-11-07 03:03
|
org.apache.commons:commons-compress |
CVE-2019-12402 |
高危 |
1.15 |
1.19 |
apache-commons-compress: Infinite loop in name encoding algorithm
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12402
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-08-30 09:15 修改: 2023-11-07 03:03
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.15 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.15 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.15 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.15 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.15 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.15 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.15 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.15 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.15 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.15 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14893 |
高危 |
2.9.6 |
2.9.10 |
jackson-databind: Serialization gadgets in classes of the xalan package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14893
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-02 21:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14893 |
高危 |
2.9.6 |
2.9.10 |
jackson-databind: Serialization gadgets in classes of the xalan package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14893
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-02 21:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.9.6 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.9.6 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
org.apache.cxf:cxf-core |
CVE-2022-46363 |
高危 |
3.2.11 |
3.4.10, 3.5.5 |
CXF: directory listing / code exfiltration
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46363
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-13 15:15 修改: 2023-11-07 03:55
|
org.apache.cxf:cxf-core |
CVE-2022-46363 |
高危 |
3.2.11 |
3.4.10, 3.5.5 |
CXF: directory listing / code exfiltration
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46363
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-13 15:15 修改: 2023-11-07 03:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10672 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10672
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10672 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10672
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.9.6 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.9.6 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10968 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10968
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10968 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10968
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
org.apache.mina:mina-core |
CVE-2019-0231 |
高危 |
2.0.16 |
2.0.21, 2.1.1 |
mina-core: Retaining an open socket in close_notify SSL-TLS leading to Information disclosure.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0231
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-10-01 20:15 修改: 2019-10-08 17:47
|
org.apache.mina:mina-core |
CVE-2019-0231 |
高危 |
2.0.16 |
2.0.21, 2.1.1 |
mina-core: Retaining an open socket in close_notify SSL-TLS leading to Information disclosure.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0231
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-10-01 20:15 修改: 2019-10-08 17:47
|
org.apache.santuario:xmlsec |
CVE-2021-40690 |
高危 |
2.1.4 |
2.2.3, 2.1.7 |
xml-security: XPath Transform abuse allows for information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40690
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-09-19 18:15 修改: 2023-11-07 03:38
|
org.apache.santuario:xmlsec |
CVE-2021-40690 |
高危 |
2.1.4 |
2.2.3, 2.1.7 |
xml-security: XPath Transform abuse allows for information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40690
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-09-19 18:15 修改: 2023-11-07 03:38
|
org.apache.tika:tika-core |
CVE-2018-11761 |
高危 |
1.17 |
1.19.1 |
tika: XML entity expansion vulnerability due to lack of limit configuration
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11761
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-09-19 14:29 修改: 2023-11-07 02:51
|
org.apache.tika:tika-core |
CVE-2018-11761 |
高危 |
1.17 |
1.19.1 |
tika: XML entity expansion vulnerability due to lack of limit configuration
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11761
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-09-19 14:29 修改: 2023-11-07 02:51
|
org.apache.tika:tika-core |
CVE-2018-11796 |
高危 |
1.17 |
1.19.1 |
tika: Incomplete fix allows for XML entity expansion resulting in denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11796
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-10-09 22:29 修改: 2023-11-07 02:51
|
org.apache.tika:tika-core |
CVE-2018-11796 |
高危 |
1.17 |
1.19.1 |
tika: Incomplete fix allows for XML entity expansion resulting in denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11796
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-10-09 22:29 修改: 2023-11-07 02:51
|
org.apache.tika:tika-core |
CVE-2018-1335 |
高危 |
1.17 |
1.18 |
tika: Command injection in tika-server can allow remote attackers to execute arbitrary commands via crafted headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1335
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-04-25 21:29 修改: 2023-11-07 02:55
|
org.apache.tika:tika-core |
CVE-2018-1335 |
高危 |
1.17 |
1.18 |
tika: Command injection in tika-server can allow remote attackers to execute arbitrary commands via crafted headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1335
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-04-25 21:29 修改: 2023-11-07 02:55
|
org.apache.tika:tika-core |
CVE-2019-10088 |
高危 |
1.17 |
1.22 |
A carefully crafted or corrupt zip file can cause an OOM in Apache Tik ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10088
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-08-02 19:15 修改: 2023-11-07 03:02
|
org.apache.tika:tika-core |
CVE-2019-10088 |
高危 |
1.17 |
1.22 |
A carefully crafted or corrupt zip file can cause an OOM in Apache Tik ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10088
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-08-02 19:15 修改: 2023-11-07 03:02
|
org.apache.tika:tika-core |
CVE-2019-10094 |
高危 |
1.17 |
1.22 |
A carefully crafted package/compressed file that, when unzipped/uncomp ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10094
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-08-02 19:15 修改: 2023-11-07 03:02
|
org.apache.tika:tika-core |
CVE-2019-10094 |
高危 |
1.17 |
1.22 |
A carefully crafted package/compressed file that, when unzipped/uncomp ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10094
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-08-02 19:15 修改: 2023-11-07 03:02
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2022-42252 |
高危 |
9.0.65 |
8.5.83, 9.0.68, 10.0.27, 10.1.1 |
tomcat: request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42252
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-11-01 09:15 修改: 2023-05-30 06:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2022-42252 |
高危 |
9.0.65 |
8.5.83, 9.0.68, 10.0.27, 10.1.1 |
tomcat: request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42252
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-11-01 09:15 修改: 2023-05-30 06:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2022-45143 |
高危 |
9.0.65 |
8.5.84, 9.0.69, 10.1.2 |
tomcat: JsonErrorReportValve injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45143
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-01-03 19:15 修改: 2023-06-27 13:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2022-45143 |
高危 |
9.0.65 |
8.5.84, 9.0.69, 10.1.2 |
tomcat: JsonErrorReportValve injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45143
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-01-03 19:15 修改: 2023-06-27 13:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-24998 |
高危 |
9.0.65 |
10.1.5, 11.0.0-M5, 8.5.88, 9.0.71 |
FileUpload: FileUpload DoS with excessive parts
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-24998 |
高危 |
9.0.65 |
10.1.5, 11.0.0-M5, 8.5.88, 9.0.71 |
FileUpload: FileUpload DoS with excessive parts
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-46589 |
高危 |
9.0.65 |
11.0.0-M11, 10.1.16, 9.0.83, 8.5.96 |
tomcat: HTTP request smuggling via malformed trailer headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46589
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-11-28 16:15 修改: 2024-07-12 16:11
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-46589 |
高危 |
9.0.65 |
11.0.0-M11, 10.1.16, 9.0.83, 8.5.96 |
tomcat: HTTP request smuggling via malformed trailer headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46589
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-11-28 16:15 修改: 2024-07-12 16:11
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2024-34750 |
高危 |
9.0.65 |
11.0.0-M21, 10.1.25, 9.0.90 |
tomcat: Improper Handling of Exceptional Conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34750
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-07-03 20:15 修改: 2024-07-09 16:22
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2024-34750 |
高危 |
9.0.65 |
11.0.0-M21, 10.1.25, 9.0.90 |
tomcat: Improper Handling of Exceptional Conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34750
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-07-03 20:15 修改: 2024-07-09 16:22
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2024-50379 |
高危 |
9.0.65 |
11.0.2, 10.1.34, 9.0.98 |
tomcat: RCE due to TOCTOU issue in JSP compilation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50379
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-17 13:15 修改: 2025-01-03 12:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2024-50379 |
高危 |
9.0.65 |
11.0.2, 10.1.34, 9.0.98 |
tomcat: RCE due to TOCTOU issue in JSP compilation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50379
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-17 13:15 修改: 2025-01-03 12:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2024-56337 |
高危 |
9.0.65 |
11.0.2, 10.1.34, 9.0.98 |
tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56337
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-20 16:15 修改: 2025-01-03 12:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2024-56337 |
高危 |
9.0.65 |
11.0.2, 10.1.34, 9.0.98 |
tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56337
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-20 16:15 修改: 2025-01-03 12:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10969 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in javax.swing.JEditorPane
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10969
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
org.apache.tomcat:tomcat-catalina |
CVE-2023-46589 |
高危 |
9.0.71 |
11.0.0-M11, 10.1.16, 9.0.83, 8.5.96 |
tomcat: HTTP request smuggling via malformed trailer headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46589
镜像层: sha256:68bc29757434f5bf5ad47724ca078754a78e21b086e69b875f270830bd0ad7dc
发布日期: 2023-11-28 16:15 修改: 2024-07-12 16:11
|
org.apache.tomcat:tomcat-catalina |
CVE-2024-50379 |
高危 |
9.0.71 |
11.0.2, 10.1.34, 9.0.98 |
tomcat: RCE due to TOCTOU issue in JSP compilation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50379
镜像层: sha256:68bc29757434f5bf5ad47724ca078754a78e21b086e69b875f270830bd0ad7dc
发布日期: 2024-12-17 13:15 修改: 2025-01-03 12:15
|
org.apache.tomcat:tomcat-coyote |
CVE-2024-34750 |
高危 |
9.0.71 |
11.0.0-M21, 10.1.25, 9.0.90 |
tomcat: Improper Handling of Exceptional Conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34750
镜像层: sha256:68bc29757434f5bf5ad47724ca078754a78e21b086e69b875f270830bd0ad7dc
发布日期: 2024-07-03 20:15 修改: 2024-07-09 16:22
|
org.apache.tomcat:tomcat-util |
CVE-2024-38286 |
高危 |
9.0.71 |
11.0.0-M21, 10.1.25, 9.0.90 |
tomcat: Denial of Service in Tomcat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38286
镜像层: sha256:68bc29757434f5bf5ad47724ca078754a78e21b086e69b875f270830bd0ad7dc
发布日期: 2024-11-07 08:15 修改: 2024-11-08 19:01
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10969 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in javax.swing.JEditorPane
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10969
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11111 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11111
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
org.apache.xmlgraphics:batik-bridge |
CVE-2022-44729 |
高危 |
1.8 |
1.17 |
batik: Server-Side Request Forgery vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44729
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15
|
org.apache.xmlgraphics:batik-bridge |
CVE-2022-44729 |
高危 |
1.8 |
1.17 |
batik: Server-Side Request Forgery vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44729
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15
|
org.apache.xmlgraphics:xmlgraphics-commons |
CVE-2020-11988 |
高危 |
2.3 |
2.6 |
xmlgraphics-commons: SSRF due to improper input validation by the XMPParser
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11988
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-02-24 18:15 修改: 2023-11-07 03:15
|
org.apache.xmlgraphics:xmlgraphics-commons |
CVE-2020-11988 |
高危 |
2.3 |
2.6 |
xmlgraphics-commons: SSRF due to improper input validation by the XMPParser
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11988
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-02-24 18:15 修改: 2023-11-07 03:15
|
org.cryptacular:cryptacular |
CVE-2020-7226 |
高危 |
1.1.1 |
1.1.4, 1.2.4 |
cryptacular: excessive memory allocation during a decode operation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-7226
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-01-24 15:15 修改: 2023-11-07 03:25
|
org.cryptacular:cryptacular |
CVE-2020-7226 |
高危 |
1.1.1 |
1.1.4, 1.2.4 |
cryptacular: excessive memory allocation during a decode operation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-7226
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-01-24 15:15 修改: 2023-11-07 03:25
|
org.eclipse.jetty:jetty-server |
CVE-2018-12545 |
高危 |
9.4.11.v20180605 |
9.4.12.v20180830, 9.3.25.v20180904 |
jetty: large settings frames causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12545
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-03-27 20:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2018-12545 |
高危 |
9.4.11.v20180605 |
9.4.12.v20180830, 9.3.25.v20180904 |
jetty: large settings frames causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12545
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-03-27 20:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2021-28165 |
高危 |
9.4.11.v20180605 |
9.4.39, 10.0.2, 11.0.2 |
jetty: Resource exhaustion when receiving an invalid large TLS frame
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28165
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-04-01 15:15 修改: 2023-11-07 03:32
|
org.eclipse.jetty:jetty-server |
CVE-2021-28165 |
高危 |
9.4.11.v20180605 |
9.4.39, 10.0.2, 11.0.2 |
jetty: Resource exhaustion when receiving an invalid large TLS frame
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28165
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-04-01 15:15 修改: 2023-11-07 03:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11111 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11111
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11112 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11112
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
org.eclipse.jetty:jetty-server |
CVE-2017-7656 |
高危 |
9.4.7.v20180619 |
9.3.24.v20180605, 9.4.11.v20180605 |
jetty: HTTP request smuggling using the range header
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7656
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-06-26 15:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2017-7656 |
高危 |
9.4.7.v20180619 |
9.3.24.v20180605, 9.4.11.v20180605 |
jetty: HTTP request smuggling using the range header
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7656
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-06-26 15:29 修改: 2023-11-07 02:50
|
org.eclipse.jetty:jetty-server |
CVE-2018-12538 |
高危 |
9.4.7.v20180619 |
9.4.11.v20180605 |
jetty: HttpSessions access/hijack in the FileSystem's storage for the FileSessionDataStore.
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12538
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-06-22 19:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2018-12538 |
高危 |
9.4.7.v20180619 |
9.4.11.v20180605 |
jetty: HttpSessions access/hijack in the FileSystem's storage for the FileSessionDataStore.
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12538
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-06-22 19:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2018-12545 |
高危 |
9.4.7.v20180619 |
9.4.12.v20180830, 9.3.25.v20180904 |
jetty: large settings frames causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12545
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-03-27 20:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2018-12545 |
高危 |
9.4.7.v20180619 |
9.4.12.v20180830, 9.3.25.v20180904 |
jetty: large settings frames causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12545
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-03-27 20:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2021-28165 |
高危 |
9.4.7.v20180619 |
9.4.39, 10.0.2, 11.0.2 |
jetty: Resource exhaustion when receiving an invalid large TLS frame
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28165
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-04-01 15:15 修改: 2023-11-07 03:32
|
org.eclipse.jetty:jetty-server |
CVE-2021-28165 |
高危 |
9.4.7.v20180619 |
9.4.39, 10.0.2, 11.0.2 |
jetty: Resource exhaustion when receiving an invalid large TLS frame
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28165
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-04-01 15:15 修改: 2023-11-07 03:32
|
org.eclipse.jgit:org.eclipse.jgit |
CVE-2023-4759 |
高危 |
4.4.1.201607150455-r |
6.6.1.202309021850-r, 5.13.3.202401111512-r |
jgit: arbitrary file overwrite
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4759
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-09-12 10:15 修改: 2024-08-07 17:30
|
org.eclipse.jgit:org.eclipse.jgit |
CVE-2023-4759 |
高危 |
4.4.1.201607150455-r |
6.6.1.202309021850-r, 5.13.3.202401111512-r |
jgit: arbitrary file overwrite
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4759
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-09-12 10:15 修改: 2024-08-07 17:30
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11112 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11112
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11113 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11113
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
org.json:json |
CVE-2022-45688 |
高危 |
20201115 |
20230227 |
json stack overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16
|
org.json:json |
CVE-2022-45688 |
高危 |
20201115 |
20230227 |
json stack overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16
|
org.json:json |
CVE-2023-5072 |
高危 |
20201115 |
20231013 |
JSON-java: parser confusion leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5072
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-10-12 17:15 修改: 2024-06-21 19:15
|
org.json:json |
CVE-2023-5072 |
高危 |
20201115 |
20231013 |
JSON-java: parser confusion leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5072
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-10-12 17:15 修改: 2024-06-21 19:15
|
org.jsoup:jsoup |
CVE-2021-37714 |
高危 |
1.11.3 |
1.14.2 |
jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37714
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-08-18 15:15 修改: 2023-11-07 03:37
|
org.jsoup:jsoup |
CVE-2021-37714 |
高危 |
1.11.3 |
1.14.2 |
jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37714
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-08-18 15:15 修改: 2023-11-07 03:37
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11113 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11113
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11619 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.springframework:spring-aop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11619
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11619 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.springframework:spring-aop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11619
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11620 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11620
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11620 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11620
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14060 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14060
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-06-14 21:15 修改: 2023-11-07 03:17
|
org.springframework.security:spring-security-core |
CVE-2024-22257 |
高危 |
5.5.2 |
5.7.12, 5.8.11, 6.1.8, 6.2.3 |
spring-security: Broken Access Control With Direct Use of AuthenticatedVoter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22257
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-03-18 15:15 修改: 2024-11-12 16:35
|
org.springframework.security:spring-security-core |
CVE-2024-22257 |
高危 |
5.5.2 |
5.7.12, 5.8.11, 6.1.8, 6.2.3 |
spring-security: Broken Access Control With Direct Use of AuthenticatedVoter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22257
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-03-18 15:15 修改: 2024-11-12 16:35
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14060 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14060
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-06-14 21:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14061 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in weblogic/oracle-aqjms
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14061
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14061 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in weblogic/oracle-aqjms
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14061
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14062 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14062
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
org.springframework:spring-beans |
CVE-2022-22970 |
高危 |
5.3.18 |
5.2.22.RELEASE, 5.3.20 |
springframework: DoS via data binding to multipartFile or servlet part
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22970
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-12 20:15 修改: 2022-10-07 13:17
|
org.springframework:spring-beans |
CVE-2022-22970 |
高危 |
5.3.18 |
5.2.22.RELEASE, 5.3.20 |
springframework: DoS via data binding to multipartFile or servlet part
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22970
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-12 20:15 修改: 2022-10-07 13:17
|
org.springframework:spring-context |
CVE-2022-22968 |
高危 |
5.3.18 |
5.3.19, 5.2.21.RELEASE |
Framework: Data Binding Rules Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22968
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-04-14 21:15 修改: 2022-10-19 15:15
|
org.springframework:spring-context |
CVE-2022-22968 |
高危 |
5.3.18 |
5.3.19, 5.2.21.RELEASE |
Framework: Data Binding Rules Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22968
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-04-14 21:15 修改: 2022-10-19 15:15
|
org.springframework:spring-expression |
CVE-2023-20863 |
高危 |
5.3.18 |
6.0.8, 5.3.27, 5.2.24.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20863
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-04-13 20:15 修改: 2024-06-10 17:16
|
org.springframework:spring-expression |
CVE-2023-20863 |
高危 |
5.3.18 |
6.0.8, 5.3.27, 5.2.24.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20863
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-04-13 20:15 修改: 2024-06-10 17:16
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14062 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14062
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14195 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14195
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-06-16 16:15 修改: 2021-11-17 20:20
|
org.springframework:spring-web |
CVE-2024-22243 |
高危 |
5.3.18 |
6.1.4, 6.0.17, 5.3.32 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22243
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-02-23 05:15 修改: 2024-08-22 15:35
|
org.springframework:spring-web |
CVE-2024-22243 |
高危 |
5.3.18 |
6.1.4, 6.0.17, 5.3.32 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22243
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-02-23 05:15 修改: 2024-08-22 15:35
|
org.springframework:spring-web |
CVE-2024-22259 |
高危 |
5.3.18 |
6.1.5, 6.0.18, 5.3.33 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47
|
org.springframework:spring-web |
CVE-2024-22259 |
高危 |
5.3.18 |
6.1.5, 6.0.18, 5.3.33 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47
|
org.springframework:spring-web |
CVE-2024-22262 |
高危 |
5.3.18 |
5.3.34, 6.0.19, 6.1.6 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35
|
org.springframework:spring-web |
CVE-2024-22262 |
高危 |
5.3.18 |
5.3.34, 6.0.19, 6.1.6 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35
|
org.springframework:spring-webmvc |
CVE-2024-38816 |
高危 |
5.3.18 |
6.1.13 |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-09-13 06:15 修改: 2024-12-27 16:15
|
org.springframework:spring-webmvc |
CVE-2024-38816 |
高危 |
5.3.18 |
6.1.13 |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-09-13 06:15 修改: 2024-12-27 16:15
|
org.springframework:spring-webmvc |
CVE-2024-38819 |
高危 |
5.3.18 |
6.1.14 |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38819
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-19 18:15 修改: 2025-01-10 13:15
|
org.springframework:spring-webmvc |
CVE-2024-38819 |
高危 |
5.3.18 |
6.1.14 |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38819
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-19 18:15 修改: 2025-01-10 13:15
|
org.yaml:snakeyaml |
CVE-2022-1471 |
高危 |
1.31 |
2.0 |
SnakeYaml: Constructor Deserialization Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15
|
org.yaml:snakeyaml |
CVE-2022-1471 |
高危 |
1.31 |
2.0 |
SnakeYaml: Constructor Deserialization Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15
|
xalan:xalan |
CVE-2014-0107 |
高危 |
2.7.1 |
2.7.2 |
Xalan-Java: insufficient constraints in secure processing feature
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0107
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2014-04-15 23:13 修改: 2023-11-07 02:18
|
xalan:xalan |
CVE-2014-0107 |
高危 |
2.7.1 |
2.7.2 |
Xalan-Java: insufficient constraints in secure processing feature
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-0107
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2014-04-15 23:13 修改: 2023-11-07 02:18
|
xalan:xalan |
CVE-2022-34169 |
高危 |
2.7.1 |
2.7.3 |
OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34169
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-07-19 18:15 修改: 2024-06-21 19:15
|
xalan:xalan |
CVE-2022-34169 |
高危 |
2.7.1 |
2.7.3 |
OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-34169
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-07-19 18:15 修改: 2024-06-21 19:15
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
23.0 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
com.squareup.okio:okio-jvm |
CVE-2023-3635 |
中危 |
3.0.0 |
3.4.0 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.squareup.okio:okio-jvm |
CVE-2023-3635 |
中危 |
3.0.0 |
3.4.0 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
net.lingala.zip4j:zip4j |
CVE-2018-1002202 |
中危 |
1.3.2 |
1.3.3 |
zip4j: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1002202
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-07-25 17:29 修改: 2019-10-09 23:32
|
net.lingala.zip4j:zip4j |
CVE-2018-1002202 |
中危 |
1.3.2 |
1.3.3 |
zip4j: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1002202
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-07-25 17:29 修改: 2019-10-09 23:32
|
net.lingala.zip4j:zip4j |
CVE-2022-24615 |
中危 |
1.3.2 |
2.10.0 |
zip4j: Uncaught exceptions while parsing a specially crafted ZIP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24615
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-02-24 15:15 修改: 2022-04-19 04:03
|
net.lingala.zip4j:zip4j |
CVE-2022-24615 |
中危 |
1.3.2 |
2.10.0 |
zip4j: Uncaught exceptions while parsing a specially crafted ZIP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24615
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-02-24 15:15 修改: 2022-04-19 04:03
|
net.lingala.zip4j:zip4j |
CVE-2023-22899 |
中危 |
1.3.2 |
2.11.3 |
zip4j: does not always check the MAC when decrypting a ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22899
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-01-10 02:15 修改: 2023-01-30 16:24
|
net.lingala.zip4j:zip4j |
CVE-2023-22899 |
中危 |
1.3.2 |
2.11.3 |
zip4j: does not always check the MAC when decrypting a ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22899
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-01-10 02:15 修改: 2023-01-30 16:24
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
23.0 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
23.0 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
net.minidev:json-smart |
CVE-2021-27568 |
中危 |
2.3 |
1.3.2, 2.4.1, 2.3.1 |
json-smart: uncaught exception may lead to crash or information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27568
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-02-23 02:15 修改: 2023-11-07 03:31
|
net.minidev:json-smart |
CVE-2021-27568 |
中危 |
2.3 |
1.3.2, 2.4.1, 2.3.1 |
json-smart: uncaught exception may lead to crash or information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27568
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-02-23 02:15 修改: 2023-11-07 03:31
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-41080 |
中危 |
9.0.65 |
8.5.93, 9.0.80, 10.1.13, 11.0.0-M11 |
tomcat: Open Redirect vulnerability in FORM authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41080
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-08-25 21:15 修改: 2023-11-03 19:00
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-41080 |
中危 |
9.0.65 |
8.5.93, 9.0.80, 10.1.13, 11.0.0-M11 |
tomcat: Open Redirect vulnerability in FORM authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41080
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-08-25 21:15 修改: 2023-11-03 19:00
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-42795 |
中危 |
9.0.65 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
tomcat: improper cleaning of recycled objects could lead to information leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42795
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-10-10 18:15 修改: 2023-11-04 06:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-42795 |
中危 |
9.0.65 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
tomcat: improper cleaning of recycled objects could lead to information leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42795
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-10-10 18:15 修改: 2023-11-04 06:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-44487 |
中危 |
9.0.65 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-10-10 14:15 修改: 2024-12-20 17:40
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-44487 |
中危 |
9.0.65 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-10-10 14:15 修改: 2024-12-20 17:40
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-45648 |
中危 |
9.0.65 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
tomcat: incorrectly parsed http trailer headers can cause request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45648
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-10-10 19:15 修改: 2023-11-04 06:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-45648 |
中危 |
9.0.65 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
tomcat: incorrectly parsed http trailer headers can cause request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45648
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-10-10 19:15 修改: 2023-11-04 06:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2024-24549 |
中危 |
9.0.65 |
8.5.99, 9.0.86, 10.1.19, 11.0.0-M17 |
Tomcat: HTTP/2 header handling DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24549
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-03-13 16:15 修改: 2024-11-04 22:35
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2024-24549 |
中危 |
9.0.65 |
8.5.99, 9.0.86, 10.1.19, 11.0.0-M17 |
Tomcat: HTTP/2 header handling DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24549
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-03-13 16:15 修改: 2024-11-04 22:35
|
org.apache.tomcat.embed:tomcat-embed-websocket |
CVE-2024-23672 |
中危 |
9.0.65 |
11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 |
Tomcat: WebSocket DoS with incomplete closing handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23672
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-03-13 16:15 修改: 2024-11-18 22:35
|
org.apache.tomcat.embed:tomcat-embed-websocket |
CVE-2024-23672 |
中危 |
9.0.65 |
11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 |
Tomcat: WebSocket DoS with incomplete closing handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23672
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-03-13 16:15 修改: 2024-11-18 22:35
|
org.apache.ant:ant |
CVE-2020-1945 |
中危 |
1.7.1 |
1.9.15, 1.10.8 |
ant: insecure temporary file vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1945
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-05-14 16:15 修改: 2023-11-07 03:19
|
org.apache.ant:ant |
CVE-2020-1945 |
中危 |
1.7.1 |
1.9.15, 1.10.8 |
ant: insecure temporary file vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1945
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-05-14 16:15 修改: 2023-11-07 03:19
|
org.apache.ant:ant |
CVE-2021-36373 |
中危 |
1.7.1 |
1.9.16, 1.10.11 |
ant: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36373
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-07-14 07:15 修改: 2023-11-07 03:36
|
org.apache.tomcat:tomcat-catalina |
CVE-2023-28708 |
中危 |
9.0.71 |
11.0.0-M3, 10.1.6, 9.0.72, 8.5.86 |
tomcat: not including the secure attribute causes information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28708
镜像层: sha256:68bc29757434f5bf5ad47724ca078754a78e21b086e69b875f270830bd0ad7dc
发布日期: 2023-03-22 11:15 修改: 2023-11-07 04:10
|
org.apache.tomcat:tomcat-catalina |
CVE-2024-54677 |
中危 |
9.0.71 |
11.0.2, 10.1.34, 9.0.98 |
tomcat: Apache Tomcat: DoS in examples web application
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-54677
镜像层: sha256:68bc29757434f5bf5ad47724ca078754a78e21b086e69b875f270830bd0ad7dc
发布日期: 2024-12-17 13:15 修改: 2024-12-18 17:15
|
org.apache.ant:ant |
CVE-2021-36373 |
中危 |
1.7.1 |
1.9.16, 1.10.11 |
ant: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36373
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-07-14 07:15 修改: 2023-11-07 03:36
|
org.apache.tomcat:tomcat-coyote |
CVE-2023-44487 |
中危 |
9.0.71 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487
镜像层: sha256:68bc29757434f5bf5ad47724ca078754a78e21b086e69b875f270830bd0ad7dc
发布日期: 2023-10-10 14:15 修改: 2024-12-20 17:40
|
org.apache.tomcat:tomcat-coyote |
CVE-2024-24549 |
中危 |
9.0.71 |
11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 |
Tomcat: HTTP/2 header handling DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24549
镜像层: sha256:68bc29757434f5bf5ad47724ca078754a78e21b086e69b875f270830bd0ad7dc
发布日期: 2024-03-13 16:15 修改: 2024-11-04 22:35
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
27.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
org.apache.tomcat:tomcat-websocket |
CVE-2024-23672 |
中危 |
9.0.71 |
11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 |
Tomcat: WebSocket DoS with incomplete closing handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23672
镜像层: sha256:68bc29757434f5bf5ad47724ca078754a78e21b086e69b875f270830bd0ad7dc
发布日期: 2024-03-13 16:15 修改: 2024-11-18 22:35
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
27.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
axis:axis |
CVE-2018-8032 |
中危 |
1.4 |
|
axis: cross-site scripting (XSS) attack in the default servlet/services
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8032
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-08-02 13:29 修改: 2024-06-21 19:15
|
axis:axis |
CVE-2018-8032 |
中危 |
1.4 |
|
axis: cross-site scripting (XSS) attack in the default servlet/services
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8032
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-08-02 13:29 修改: 2024-06-21 19:15
|
axis:axis |
CVE-2012-5784 |
中危 |
1.4 |
|
axis: missing connection hostname check against X.509 certificate name
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-5784
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2012-11-04 22:55 修改: 2023-11-07 02:12
|
org.apache.xmlgraphics:batik-script |
CVE-2022-44730 |
中危 |
1.8 |
1.17 |
batik: Server-Side Request Forgery vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44730
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15
|
org.apache.xmlgraphics:batik-script |
CVE-2022-44730 |
中危 |
1.8 |
1.17 |
batik: Server-Side Request Forgery vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44730
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15
|
axis:axis |
CVE-2012-5784 |
中危 |
1.4 |
|
axis: missing connection hostname check against X.509 certificate name
漏洞详情: https://avd.aquasec.com/nvd/cve-2012-5784
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2012-11-04 22:55 修改: 2023-11-07 02:12
|
axis:axis |
CVE-2014-3596 |
中危 |
1.4 |
|
axis: SSL hostname verification bypass, incomplete CVE-2012-5784 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-3596
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2014-08-27 00:55 修改: 2023-02-13 00:40
|
org.bouncycastle:bcprov-jdk15on |
CVE-2020-15522 |
中危 |
1.60 |
1.66 |
bouncycastle: Timing issue within the EC math library
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15522
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-05-20 12:15 修改: 2021-06-22 09:15
|
org.bouncycastle:bcprov-jdk15on |
CVE-2020-15522 |
中危 |
1.60 |
1.66 |
bouncycastle: Timing issue within the EC math library
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15522
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-05-20 12:15 修改: 2021-06-22 09:15
|
org.bouncycastle:bcprov-jdk15on |
CVE-2020-26939 |
中危 |
1.60 |
1.61 |
In Legion of the Bouncy Castle BC before 1.61 and BC-FJA before 1.0.1. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26939
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-11-02 22:15 修改: 2023-11-07 03:20
|
org.bouncycastle:bcprov-jdk15on |
CVE-2020-26939 |
中危 |
1.60 |
1.61 |
In Legion of the Bouncy Castle BC before 1.61 and BC-FJA before 1.0.1. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26939
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-11-02 22:15 修改: 2023-11-07 03:20
|
org.bouncycastle:bcprov-jdk15on |
CVE-2023-33201 |
中危 |
1.60 |
|
bouncycastle: potential blind LDAP injection attack using a self-signed certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33201
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-07-05 03:15 修改: 2023-08-24 19:15
|
org.bouncycastle:bcprov-jdk15on |
CVE-2023-33201 |
中危 |
1.60 |
|
bouncycastle: potential blind LDAP injection attack using a self-signed certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33201
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-07-05 03:15 修改: 2023-08-24 19:15
|
org.bouncycastle:bcprov-jdk15on |
CVE-2023-33202 |
中危 |
1.60 |
1.70 |
bc-java: Out of memory while parsing ASN.1 crafted data in org.bouncycastle.openssl.PEMParser class
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33202
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-11-23 16:15 修改: 2024-09-09 13:53
|
org.bouncycastle:bcprov-jdk15on |
CVE-2023-33202 |
中危 |
1.60 |
1.70 |
bc-java: Out of memory while parsing ASN.1 crafted data in org.bouncycastle.openssl.PEMParser class
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33202
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-11-23 16:15 修改: 2024-09-09 13:53
|
org.bouncycastle:bcprov-jdk15on |
CVE-2024-29857 |
中危 |
1.60 |
1.78 |
org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29857
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-05-14 15:17 修改: 2024-12-06 14:15
|
org.bouncycastle:bcprov-jdk15on |
CVE-2024-29857 |
中危 |
1.60 |
1.78 |
org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29857
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-05-14 15:17 修改: 2024-12-06 14:15
|
org.bouncycastle:bcprov-jdk15on |
CVE-2024-30171 |
中危 |
1.60 |
1.78 |
bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-30171
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-05-14 15:21 修改: 2024-08-19 18:35
|
org.bouncycastle:bcprov-jdk15on |
CVE-2024-30171 |
中危 |
1.60 |
1.78 |
bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-30171
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-05-14 15:21 修改: 2024-08-19 18:35
|
axis:axis |
CVE-2014-3596 |
中危 |
1.4 |
|
axis: SSL hostname verification bypass, incomplete CVE-2012-5784 fix
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-3596
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2014-08-27 00:55 修改: 2023-02-13 00:40
|
ch.qos.logback:logback-core |
CVE-2021-42550 |
中危 |
1.2.6 |
1.2.9 |
logback: remote code execution through JNDI call from within its configuration file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42550
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-12-16 19:15 修改: 2022-12-12 21:13
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.4.11.v20180605 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.4.11.v20180605 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.4.11.v20180605 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.4.11.v20180605 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.4.7.v20180619 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.4.7.v20180619 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.4.7.v20180619 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
中危 |
9.4.7.v20180619 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15
|
ch.qos.logback:logback-core |
CVE-2021-42550 |
中危 |
1.2.6 |
1.2.9 |
logback: remote code execution through JNDI call from within its configuration file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42550
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-12-16 19:15 修改: 2022-12-12 21:13
|
ch.qos.logback:logback-core |
CVE-2024-12798 |
中危 |
1.2.6 |
1.5.13, 1.3.15 |
logback-core: arbitrary code execution via JaninoEventEvaluator
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12798
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-19 16:15 修改: 2025-01-03 14:15
|
ch.qos.logback:logback-core |
CVE-2024-12798 |
中危 |
1.2.6 |
1.5.13, 1.3.15 |
logback-core: arbitrary code execution via JaninoEventEvaluator
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12798
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-19 16:15 修改: 2025-01-03 14:15
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.6.1 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
org.eclipse.jetty:jetty-server |
CVE-2019-10241 |
中危 |
9.4.11.v20180605 |
9.2.27.v20190403, 9.3.26.v20190403, 9.4.16.v20190411 |
jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10241
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10241 |
中危 |
9.4.11.v20180605 |
9.2.27.v20190403, 9.3.26.v20190403, 9.4.16.v20190411 |
jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10241
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10246 |
中危 |
9.4.11.v20180605 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: Directory Listing on Windows reveals Resource Base path
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10246
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10246 |
中危 |
9.4.11.v20180605 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: Directory Listing on Windows reveals Resource Base path
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10246
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10247 |
中危 |
9.4.11.v20180605 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: error path information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10247
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10247 |
中危 |
9.4.11.v20180605 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: error path information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10247
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2020-27218 |
中危 |
9.4.11.v20180605 |
9.4.35.v20201120 |
jetty: buffer not correctly recycled in Gzip Request inflation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27218
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-11-28 01:15 修改: 2024-02-16 16:46
|
org.eclipse.jetty:jetty-server |
CVE-2020-27218 |
中危 |
9.4.11.v20180605 |
9.4.35.v20201120 |
jetty: buffer not correctly recycled in Gzip Request inflation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27218
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-11-28 01:15 修改: 2024-02-16 16:46
|
org.eclipse.jetty:jetty-server |
CVE-2020-27223 |
中危 |
9.4.11.v20180605 |
9.4.37, 10.0.1, 11.0.1 |
jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27223
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-02-26 22:15 修改: 2023-11-07 03:20
|
org.eclipse.jetty:jetty-server |
CVE-2020-27223 |
中危 |
9.4.11.v20180605 |
9.4.37, 10.0.1, 11.0.1 |
jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27223
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-02-26 22:15 修改: 2023-11-07 03:20
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.4.11.v20180605 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.4.11.v20180605 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2024-8184 |
中危 |
9.4.11.v20180605 |
12.0.9, 10.0.24, 11.0.24, 9.4.56 |
org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8184
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:00
|
org.eclipse.jetty:jetty-server |
CVE-2024-8184 |
中危 |
9.4.11.v20180605 |
12.0.9, 10.0.24, 11.0.24, 9.4.56 |
org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8184
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:00
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
2.6.1 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
org.apache.commons:commons-compress |
CVE-2018-11771 |
中危 |
1.15 |
1.18 |
apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11771
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-08-16 15:29 修改: 2023-11-07 02:51
|
org.apache.commons:commons-compress |
CVE-2018-11771 |
中危 |
1.15 |
1.18 |
apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11771
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-08-16 15:29 修改: 2023-11-07 02:51
|
org.apache.commons:commons-compress |
CVE-2018-1324 |
中危 |
1.15 |
1.16 |
apache-commons-compress: Infinite loop via extra field parser in ZipFile and ZipArchiveInputStream classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1324
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-03-16 13:29 修改: 2023-11-07 02:55
|
org.apache.commons:commons-compress |
CVE-2018-1324 |
中危 |
1.15 |
1.16 |
apache-commons-compress: Infinite loop via extra field parser in ZipFile and ZipArchiveInputStream classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1324
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-03-16 13:29 修改: 2023-11-07 02:55
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.4 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
commons-net:commons-net |
CVE-2021-37533 |
中危 |
3.6 |
3.9.0 |
apache-commons-net: FTP client trusts the host from PASV response by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
org.eclipse.jetty:jetty-server |
CVE-2018-12536 |
中危 |
9.4.7.v20180619 |
9.4.11.v20180605, 9.3.24.v20180605 |
jetty: full server path revealed when using the default Error Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12536
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-06-27 17:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2018-12536 |
中危 |
9.4.7.v20180619 |
9.4.11.v20180605, 9.3.24.v20180605 |
jetty: full server path revealed when using the default Error Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12536
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-06-27 17:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2019-10241 |
中危 |
9.4.7.v20180619 |
9.2.27.v20190403, 9.3.26.v20190403, 9.4.16.v20190411 |
jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10241
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10241 |
中危 |
9.4.7.v20180619 |
9.2.27.v20190403, 9.3.26.v20190403, 9.4.16.v20190411 |
jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10241
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10246 |
中危 |
9.4.7.v20180619 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: Directory Listing on Windows reveals Resource Base path
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10246
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10246 |
中危 |
9.4.7.v20180619 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: Directory Listing on Windows reveals Resource Base path
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10246
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10247 |
中危 |
9.4.7.v20180619 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: error path information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10247
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2019-10247 |
中危 |
9.4.7.v20180619 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: error path information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10247
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2020-27218 |
中危 |
9.4.7.v20180619 |
9.4.35.v20201120 |
jetty: buffer not correctly recycled in Gzip Request inflation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27218
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-11-28 01:15 修改: 2024-02-16 16:46
|
org.eclipse.jetty:jetty-server |
CVE-2020-27218 |
中危 |
9.4.7.v20180619 |
9.4.35.v20201120 |
jetty: buffer not correctly recycled in Gzip Request inflation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27218
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-11-28 01:15 修改: 2024-02-16 16:46
|
org.eclipse.jetty:jetty-server |
CVE-2020-27223 |
中危 |
9.4.7.v20180619 |
9.4.37, 10.0.1, 11.0.1 |
jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27223
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-02-26 22:15 修改: 2023-11-07 03:20
|
org.eclipse.jetty:jetty-server |
CVE-2020-27223 |
中危 |
9.4.7.v20180619 |
9.4.37, 10.0.1, 11.0.1 |
jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27223
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-02-26 22:15 修改: 2023-11-07 03:20
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.4.7.v20180619 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.4.7.v20180619 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2024-8184 |
中危 |
9.4.7.v20180619 |
12.0.9, 10.0.24, 11.0.24, 9.4.56 |
org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8184
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:00
|
org.eclipse.jetty:jetty-server |
CVE-2024-8184 |
中危 |
9.4.7.v20180619 |
12.0.9, 10.0.24, 11.0.24, 9.4.56 |
org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8184
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.1 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.1 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.0.3 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.0.3 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.jayway.jsonpath:json-path |
CVE-2023-51074 |
中危 |
2.6.0 |
2.9.0 |
json-path: stack-based buffer overflow in Criteria.parse method
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51074
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-12-27 21:15 修改: 2024-01-11 20:01
|
com.jayway.jsonpath:json-path |
CVE-2023-51074 |
中危 |
2.6.0 |
2.9.0 |
json-path: stack-based buffer overflow in Criteria.parse method
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51074
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-12-27 21:15 修改: 2024-01-11 20:01
|
io.netty:netty-codec-http |
CVE-2021-43797 |
中危 |
4.1.60.Final |
4.1.71.Final |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
org.jsoup:jsoup |
CVE-2022-36033 |
中危 |
1.11.3 |
1.15.3 |
jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36033
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-08-29 17:15 修改: 2022-12-08 03:48
|
org.jsoup:jsoup |
CVE-2022-36033 |
中危 |
1.11.3 |
1.15.3 |
jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36033
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-08-29 17:15 修改: 2022-12-08 03:48
|
org.opensaml:opensaml |
CVE-2013-6440 |
中危 |
1.1 |
2.6.1 |
Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-6440
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2014-02-14 15:55 修改: 2022-02-07 16:15
|
org.opensaml:opensaml |
CVE-2013-6440 |
中危 |
1.1 |
2.6.1 |
Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-6440
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2014-02-14 15:55 修改: 2022-02-07 16:15
|
org.opensaml:opensaml |
CVE-2014-3603 |
中危 |
1.1 |
2.6.2 |
Java: HTTPS Connections Via HTTP Resources Do Not Perform Hostname Verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-3603
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-04-04 14:29 修改: 2019-04-08 13:22
|
org.opensaml:opensaml |
CVE-2014-3603 |
中危 |
1.1 |
2.6.2 |
Java: HTTPS Connections Via HTTP Resources Do Not Perform Hostname Verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2014-3603
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-04-04 14:29 修改: 2019-04-08 13:22
|
org.opensaml:opensaml |
CVE-2015-1796 |
中危 |
1.1 |
2.6.5 |
Java: PKIX Trust Engines Exhibit Critical Flaw In Trusted Names Evaluation
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-1796
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2015-07-08 15:59 修改: 2016-11-30 02:59
|
org.opensaml:opensaml |
CVE-2015-1796 |
中危 |
1.1 |
2.6.5 |
Java: PKIX Trust Engines Exhibit Critical Flaw In Trusted Names Evaluation
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-1796
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2015-07-08 15:59 修改: 2016-11-30 02:59
|
io.netty:netty-codec-http |
CVE-2021-43797 |
中危 |
4.1.60.Final |
4.1.71.Final |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
org.apache.mina:mina-core |
CVE-2021-41973 |
中危 |
2.0.16 |
2.1.5, 2.0.22 |
mina-core: infinite loop may lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41973
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-11-01 09:15 修改: 2022-05-02 18:09
|
org.postgresql:postgresql |
CVE-2022-41946 |
中危 |
42.4.1 |
42.2.27, 42.3.8, 42.4.3, 42.5.1 |
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41946
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-11-23 20:15 修改: 2024-03-29 13:15
|
org.postgresql:postgresql |
CVE-2022-41946 |
中危 |
42.4.1 |
42.2.27, 42.3.8, 42.4.3, 42.5.1 |
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41946
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-11-23 20:15 修改: 2024-03-29 13:15
|
org.apache.mina:mina-core |
CVE-2021-41973 |
中危 |
2.0.16 |
2.1.5, 2.0.22 |
mina-core: infinite loop may lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41973
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-11-01 09:15 修改: 2022-05-02 18:09
|
org.apache.pdfbox:pdfbox |
CVE-2021-27807 |
中危 |
2.0.16 |
2.0.23 |
pdfbox: infinite loop while loading a crafted PDF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27807
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-03-19 16:15 修改: 2023-11-07 03:32
|
org.springframework.ldap:spring-ldap-core |
CVE-2024-38829 |
中危 |
2.3.2.RELEASE |
3.2.8, 2.4.4 |
spring-ldap: Spring LDAP sensitive data exposure for case-sensitive comparisons
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38829
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-04 21:15 修改: 2024-12-10 15:15
|
org.springframework.ldap:spring-ldap-core |
CVE-2024-38829 |
中危 |
2.3.2.RELEASE |
3.2.8, 2.4.4 |
spring-ldap: Spring LDAP sensitive data exposure for case-sensitive comparisons
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38829
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-04 21:15 修改: 2024-12-10 15:15
|
org.apache.pdfbox:pdfbox |
CVE-2021-27807 |
中危 |
2.0.16 |
2.0.23 |
pdfbox: infinite loop while loading a crafted PDF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27807
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-03-19 16:15 修改: 2023-11-07 03:32
|
org.apache.pdfbox:pdfbox |
CVE-2021-27906 |
中危 |
2.0.16 |
2.0.23 |
pdfbox: OutOfMemory-Exception while loading a crafted PDF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27906
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-03-19 16:15 修改: 2023-11-07 03:32
|
org.apache.pdfbox:pdfbox |
CVE-2021-27906 |
中危 |
2.0.16 |
2.0.23 |
pdfbox: OutOfMemory-Exception while loading a crafted PDF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27906
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-03-19 16:15 修改: 2023-11-07 03:32
|
org.apache.pdfbox:pdfbox |
CVE-2021-31811 |
中危 |
2.0.16 |
2.0.24 |
pdfbox: OutOfMemory-Exception while loading a crafted PDF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31811
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-06-12 10:15 修改: 2023-11-07 03:35
|
org.springframework.security:spring-security-core |
CVE-2022-22976 |
中危 |
5.5.2 |
5.5.7, 5.6.4 |
springframework: BCrypt skips salt rounds for work factor of 31
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22976
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-19 15:15 修改: 2024-06-13 18:38
|
org.springframework.security:spring-security-core |
CVE-2022-22976 |
中危 |
5.5.2 |
5.5.7, 5.6.4 |
springframework: BCrypt skips salt rounds for work factor of 31
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22976
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-19 15:15 修改: 2024-06-13 18:38
|
org.springframework.security:spring-security-core |
CVE-2024-38827 |
中危 |
5.5.2 |
5.7.14, 5.8.16, 6.0.14, 6.1.12, 6.2.8, 6.3.5 |
spring-security: authorization bypass for case sensitive comparisons
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38827
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-02 15:15 修改: 2024-12-02 15:15
|
org.springframework.security:spring-security-core |
CVE-2024-38827 |
中危 |
5.5.2 |
5.7.14, 5.8.16, 6.0.14, 6.1.12, 6.2.8, 6.3.5 |
spring-security: authorization bypass for case sensitive comparisons
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38827
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-02 15:15 修改: 2024-12-02 15:15
|
org.apache.pdfbox:pdfbox |
CVE-2021-31811 |
中危 |
2.0.16 |
2.0.24 |
pdfbox: OutOfMemory-Exception while loading a crafted PDF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31811
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-06-12 10:15 修改: 2023-11-07 03:35
|
org.apache.pdfbox:pdfbox |
CVE-2021-31812 |
中危 |
2.0.16 |
2.0.24 |
pdfbox: infinite loop while loading a crafted PDF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31812
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-06-12 10:15 修改: 2023-11-07 03:35
|
org.apache.pdfbox:pdfbox |
CVE-2021-31812 |
中危 |
2.0.16 |
2.0.24 |
pdfbox: infinite loop while loading a crafted PDF file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31812
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-06-12 10:15 修改: 2023-11-07 03:35
|
org.apache.poi:poi |
CVE-2019-12415 |
中危 |
3.17 |
4.1.1 |
poi: a specially crafted Microsoft Excel document allows attacker to read files from the local filesystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12415
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-10-23 20:15 修改: 2023-11-07 03:03
|
org.apache.poi:poi |
CVE-2019-12415 |
中危 |
3.17 |
4.1.1 |
poi: a specially crafted Microsoft Excel document allows attacker to read files from the local filesystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12415
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2019-10-23 20:15 修改: 2023-11-07 03:03
|
io.netty:netty-codec-http |
CVE-2022-24823 |
中危 |
4.1.60.Final |
4.1.77.Final |
netty: world readable temporary file containing sensitive data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24823
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-06 12:15 修改: 2022-12-03 14:25
|
io.netty:netty-codec-http |
CVE-2022-24823 |
中危 |
4.1.60.Final |
4.1.77.Final |
netty: world readable temporary file containing sensitive data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24823
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-06 12:15 修改: 2022-12-03 14:25
|
org.apache.santuario:xmlsec |
CVE-2023-44483 |
中危 |
2.1.4 |
2.3.4, 2.2.6, 3.0.3 |
santuario: Private Key disclosure in debug-log output
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44483
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-10-20 10:15 修改: 2023-10-27 18:49
|
org.springframework:spring-context |
CVE-2024-38820 |
中危 |
5.3.18 |
6.1.14 |
The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-10-18 06:15 修改: 2024-11-29 12:15
|
org.springframework:spring-context |
CVE-2024-38820 |
中危 |
5.3.18 |
6.1.14 |
The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-10-18 06:15 修改: 2024-11-29 12:15
|
org.apache.santuario:xmlsec |
CVE-2023-44483 |
中危 |
2.1.4 |
2.3.4, 2.2.6, 3.0.3 |
santuario: Private Key disclosure in debug-log output
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44483
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-10-20 10:15 修改: 2023-10-27 18:49
|
io.netty:netty-codec-http |
CVE-2024-29025 |
中危 |
4.1.60.Final |
4.1.108.Final |
netty-codec-http: Allocation of Resources Without Limits or Throttling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29025
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-03-25 20:15 修改: 2024-06-21 22:15
|
org.springframework:spring-expression |
CVE-2023-20861 |
中危 |
5.3.18 |
6.0.7, 5.3.26, 5.2.23.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20861
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-03-23 21:15 修改: 2023-04-20 09:15
|
org.springframework:spring-expression |
CVE-2023-20861 |
中危 |
5.3.18 |
6.0.7, 5.3.26, 5.2.23.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20861
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-03-23 21:15 修改: 2023-04-20 09:15
|
org.springframework:spring-expression |
CVE-2024-38808 |
中危 |
5.3.18 |
5.3.39 |
spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38808
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-08-20 08:15 修改: 2024-10-30 19:35
|
org.springframework:spring-expression |
CVE-2024-38808 |
中危 |
5.3.18 |
5.3.39 |
spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38808
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-08-20 08:15 修改: 2024-10-30 19:35
|
org.springframework:spring-messaging |
CVE-2022-22971 |
中危 |
5.3.18 |
5.3.20, 5.2.22.RELEASE |
springframework: DoS with STOMP over WebSocket
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22971
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-12 20:15 修改: 2022-10-05 16:54
|
org.springframework:spring-messaging |
CVE-2022-22971 |
中危 |
5.3.18 |
5.3.20, 5.2.22.RELEASE |
springframework: DoS with STOMP over WebSocket
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22971
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-12 20:15 修改: 2022-10-05 16:54
|
io.netty:netty-codec-http |
CVE-2024-29025 |
中危 |
4.1.60.Final |
4.1.108.Final |
netty-codec-http: Allocation of Resources Without Limits or Throttling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29025
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-03-25 20:15 修改: 2024-06-21 22:15
|
com.azure:azure-identity |
CVE-2024-35255 |
中危 |
1.2.5 |
1.12.2 |
azure-identity: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/Azure/azure-sdk-for-go/sdk/azidentity
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35255
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-06-11 17:16 修改: 2024-06-20 16:31
|
com.azure:azure-identity |
CVE-2024-35255 |
中危 |
1.2.5 |
1.12.2 |
azure-identity: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/Azure/azure-sdk-for-go/sdk/azidentity
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35255
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-06-11 17:16 修改: 2024-06-20 16:31
|
io.netty:netty-codec-http2 |
CVE-2021-21409 |
中危 |
4.1.60.Final |
4.1.61.Final |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty-codec-http2 |
CVE-2021-21409 |
中危 |
4.1.60.Final |
4.1.61.Final |
netty: Request smuggling via content-length header
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30
|
io.netty:netty-common |
CVE-2024-47535 |
中危 |
4.1.60.Final |
4.1.115 |
netty: Denial of Service attack on windows app using Netty
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01
|
io.netty:netty-common |
CVE-2024-47535 |
中危 |
4.1.60.Final |
4.1.115 |
netty: Denial of Service attack on windows app using Netty
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01
|
io.netty:netty-handler |
CVE-2023-34462 |
中危 |
4.1.60.Final |
4.1.94.Final |
netty: SniHandler 16MB allocation leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34462
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-06-22 23:15 修改: 2024-06-21 19:15
|
org.springframework:spring-web |
CVE-2024-38809 |
中危 |
5.3.18 |
5.3.38, 6.0.23, 6.1.12 |
org.springframework:spring-web: Spring Framework DoS via conditional HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45
|
org.springframework:spring-web |
CVE-2024-38809 |
中危 |
5.3.18 |
5.3.38, 6.0.23, 6.1.12 |
org.springframework:spring-web: Spring Framework DoS via conditional HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45
|
io.netty:netty-handler |
CVE-2023-34462 |
中危 |
4.1.60.Final |
4.1.94.Final |
netty: SniHandler 16MB allocation leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34462
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-06-22 23:15 修改: 2024-06-21 19:15
|
org.apache.tika:tika-core |
CVE-2018-11762 |
中危 |
1.17 |
1.19 |
tika: Zip Slip vulnerability in tika-app
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11762
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-09-19 14:29 修改: 2023-11-07 02:51
|
org.apache.tika:tika-core |
CVE-2018-11762 |
中危 |
1.17 |
1.19 |
tika: Zip Slip vulnerability in tika-app
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11762
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-09-19 14:29 修改: 2023-11-07 02:51
|
org.apache.tika:tika-core |
CVE-2018-1338 |
中危 |
1.17 |
1.18 |
tika: Infinite loop in BPGParser can allow remote attacker to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1338
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-04-25 21:29 修改: 2023-11-07 02:55
|
org.springframework:spring-webmvc |
CVE-2024-38828 |
中危 |
5.3.18 |
5.3.42 |
org.springframework:spring-webmvc: DoS via Spring MVC controller method with byte[] parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38828
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-11-18 04:15 修改: 2024-11-18 17:11
|
org.springframework:spring-webmvc |
CVE-2024-38828 |
中危 |
5.3.18 |
5.3.42 |
org.springframework:spring-webmvc: DoS via Spring MVC controller method with byte[] parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38828
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-11-18 04:15 修改: 2024-11-18 17:11
|
org.apache.tika:tika-core |
CVE-2018-1338 |
中危 |
1.17 |
1.18 |
tika: Infinite loop in BPGParser can allow remote attacker to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1338
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-04-25 21:29 修改: 2023-11-07 02:55
|
org.apache.tika:tika-core |
CVE-2018-8017 |
中危 |
1.17 |
1.19 |
tika: infinite loop in the IptcAnpaParser
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8017
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-09-19 14:29 修改: 2023-11-07 03:01
|
org.yaml:snakeyaml |
CVE-2022-38752 |
中危 |
1.31 |
1.32 |
snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38752 |
中危 |
1.31 |
1.32 |
snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-41854 |
中危 |
1.31 |
1.32 |
dev-java/snakeyaml: DoS via stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15
|
org.yaml:snakeyaml |
CVE-2022-41854 |
中危 |
1.31 |
1.32 |
dev-java/snakeyaml: DoS via stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15
|
org.apache.tika:tika-core |
CVE-2018-8017 |
中危 |
1.17 |
1.19 |
tika: infinite loop in the IptcAnpaParser
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8017
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-09-19 14:29 修改: 2023-11-07 03:01
|
org.apache.tika:tika-core |
CVE-2022-30973 |
中危 |
1.17 |
1.28.3 |
tika-core: incomplete fix for CVE-2022-30126
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30973
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-31 14:15 修改: 2022-10-27 16:41
|
org.apache.tika:tika-core |
CVE-2022-30973 |
中危 |
1.17 |
1.28.3 |
tika-core: incomplete fix for CVE-2022-30126
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30973
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-05-31 14:15 修改: 2022-10-27 16:41
|
com.google.guava:guava |
CVE-2018-10237 |
中危 |
23.0 |
24.1.1-android |
guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-10237
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2018-04-26 21:29 修改: 2023-11-07 02:51
|
org.apache.cxf:cxf-rt-rs-service-description |
CVE-2024-29736 |
低危 |
3.2.11 |
4.0.5, 3.6.4, 3.5.9 |
apache: cxf: org.apache.cxf:cxf-rt-rs-service-description: SSRF via WADL stylesheet parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29736
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-07-19 09:15 修改: 2024-08-22 17:31
|
org.apache.cxf:cxf-rt-rs-service-description |
CVE-2024-29736 |
低危 |
3.2.11 |
4.0.5, 3.6.4, 3.5.9 |
apache: cxf: org.apache.cxf:cxf-rt-rs-service-description: SSRF via WADL stylesheet parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29736
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-07-19 09:15 修改: 2024-08-22 17:31
|
ch.qos.logback:logback-core |
CVE-2024-12801 |
低危 |
1.2.6 |
1.5.13, 1.3.15 |
logback-core: SaxEventRecorder vulnerable to Server-Side Request Forgery (SSRF) attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12801
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-19 17:15 修改: 2025-01-03 14:15
|
ch.qos.logback:logback-core |
CVE-2024-12801 |
低危 |
1.2.6 |
1.5.13, 1.3.15 |
logback-core: SaxEventRecorder vulnerable to Server-Side Request Forgery (SSRF) attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12801
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2024-12-19 17:15 修改: 2025-01-03 14:15
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
9.4.7.v20180619 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
9.4.7.v20180619 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.4.7.v20180619 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.4.7.v20180619 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh |
低危 |
9.4.9.v20180320 |
10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
Eclipse Jetty XmlParser allows arbitrary DOCTYPE declarations
漏洞详情: https://github.com/advisories/GHSA-58qw-p7qm-5rvh
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.eclipse.jetty:jetty-xml |
GHSA-58qw-p7qm-5rvh |
低危 |
9.4.9.v20180320 |
10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 |
Eclipse Jetty XmlParser allows arbitrary DOCTYPE declarations
漏洞详情: https://github.com/advisories/GHSA-58qw-p7qm-5rvh
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.4.11.v20180605 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.4.11.v20180605 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
9.4.11.v20180605 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
9.4.11.v20180605 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.4.11.v20180605 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.4.11.v20180605 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
27.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
27.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
23.0 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
23.0 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.4.7.v20180619 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.4.7.v20180619 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:6ea8d65a306cfb0130b747cd59a3b20132de33e003e2f38e5a81f5e72bb8c6e8
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|