docker.io/jasminexzzz/blossom:latest linux/amd64

docker.io/jasminexzzz/blossom:latest - Trivy安全扫描结果 扫描时间: 2024-10-27 08:53
全部漏洞信息
低危漏洞:44 中危漏洞:66 高危漏洞:21 严重漏洞:2

系统OS: ubuntu 22.04 扫描引擎: Trivy 扫描时间: 2024-10-27 08:53

docker.io/jasminexzzz/blossom:latest (ubuntu 22.04) (ubuntu)
低危漏洞:44 中危漏洞:47 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
curl CVE-2024-7264 中危 7.81.0-1ubuntu1.16 7.81.0-1ubuntu1.17 curl: libcurl: ASN.1 date parser overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-07-31 08:15 修改: 2024-08-12 17:30

curl CVE-2024-8096 中危 7.81.0-1ubuntu1.16 7.81.0-1ubuntu1.18 curl: OCSP stapling bypass with GnuTLS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26

gcc-12-base CVE-2023-4039 中危 12.3.0-1ubuntu1~22.04 gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15

libc-bin CVE-2024-2961 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.7 glibc: Out of bounds write in iconv may lead to remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15

libc-bin CVE-2024-33599 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.8 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc-bin CVE-2024-33600 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.8 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc-bin CVE-2024-33601 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.8 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc-bin CVE-2024-33602 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.8 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc6 CVE-2024-2961 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.7 glibc: Out of bounds write in iconv may lead to remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15

libc6 CVE-2024-33599 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.8 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc6 CVE-2024-33600 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.8 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc6 CVE-2024-33601 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.8 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc6 CVE-2024-33602 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.8 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libcurl4 CVE-2024-7264 中危 7.81.0-1ubuntu1.16 7.81.0-1ubuntu1.17 curl: libcurl: ASN.1 date parser overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-07-31 08:15 修改: 2024-08-12 17:30

libcurl4 CVE-2024-8096 中危 7.81.0-1ubuntu1.16 7.81.0-1ubuntu1.18 curl: OCSP stapling bypass with GnuTLS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26

libexpat1 CVE-2024-45490 中危 2.4.7-1ubuntu0.3 2.4.7-1ubuntu0.4 libexpat: Negative Length Parsing Vulnerability in libexpat

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24

libexpat1 CVE-2024-45491 中危 2.4.7-1ubuntu0.3 2.4.7-1ubuntu0.4 libexpat: Integer Overflow or Wraparound

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

libexpat1 CVE-2024-45492 中危 2.4.7-1ubuntu0.3 2.4.7-1ubuntu0.4 libexpat: integer overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

libgcc-s1 CVE-2023-4039 中危 12.3.0-1ubuntu1~22.04 gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15

libgcrypt20 CVE-2024-2236 中危 1.9.4-3ubuntu3 libgcrypt: vulnerable to Marvin Attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2236

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-03-06 22:15 修改: 2024-09-14 04:15

libgnutls30 CVE-2024-28834 中危 3.7.3-4ubuntu1.4 3.7.3-4ubuntu1.5 gnutls: vulnerable to Minerva side-channel information leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28834

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-03-21 14:15 修改: 2024-09-12 20:15

libgnutls30 CVE-2024-28835 中危 3.7.3-4ubuntu1.4 3.7.3-4ubuntu1.5 gnutls: potential crash during chain building/verification

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28835

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-03-21 06:15 修改: 2024-09-16 19:16

libgssapi-krb5-2 CVE-2024-26462 中危 1.19.2-2ubuntu0.3 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libgssapi-krb5-2 CVE-2024-37370 中危 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48

libgssapi-krb5-2 CVE-2024-37371 中危 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39

libk5crypto3 CVE-2024-26462 中危 1.19.2-2ubuntu0.3 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libk5crypto3 CVE-2024-37370 中危 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48

libk5crypto3 CVE-2024-37371 中危 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39

libkrb5-3 CVE-2024-26462 中危 1.19.2-2ubuntu0.3 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkrb5-3 CVE-2024-37370 中危 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48

libkrb5-3 CVE-2024-37371 中危 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39

libkrb5support0 CVE-2024-26462 中危 1.19.2-2ubuntu0.3 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkrb5support0 CVE-2024-37370 中危 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48

libkrb5support0 CVE-2024-37371 中危 1.19.2-2ubuntu0.3 1.19.2-2ubuntu0.4 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39

libnghttp2-14 CVE-2024-28182 中危 1.43.0-1ubuntu0.1 1.43.0-1ubuntu0.2 nghttp2: CONTINUATION frames DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28182

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-04-04 15:15 修改: 2024-05-01 18:15

libssl3 CVE-2022-40735 中危 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.16

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40735

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2022-11-14 23:15 修改: 2024-04-23 07:15

libssl3 CVE-2024-6119 中危 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.18 openssl: Possible denial of service in X.509 name checks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35

libstdc++6 CVE-2023-4039 中危 12.3.0-1ubuntu1~22.04 gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4039

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-09-13 09:15 修改: 2024-08-02 08:15

locales CVE-2024-2961 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.7 glibc: Out of bounds write in iconv may lead to remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15

locales CVE-2024-33599 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.8 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

locales CVE-2024-33600 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.8 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

locales CVE-2024-33601 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.8 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

locales CVE-2024-33602 中危 2.35-0ubuntu3.6 2.35-0ubuntu3.8 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

openssl CVE-2022-40735 中危 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.16

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40735

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2022-11-14 23:15 修改: 2024-04-23 07:15

openssl CVE-2024-6119 中危 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.18 openssl: Possible denial of service in X.509 name checks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35

wget CVE-2021-31879 中危 1.21.2-2ubuntu1 wget: authorization header disclosure on redirect

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31879

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2021-04-29 05:15 修改: 2022-05-13 20:52

wget CVE-2024-38428 中危 1.21.2-2ubuntu1 1.21.2-2ubuntu1.1 wget: Misinterpretation of input may lead to improper behavior

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38428

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-06-16 03:15 修改: 2024-08-08 15:05

libkrb5support0 CVE-2024-26461 低危 1.19.2-2ubuntu0.3 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

libncurses6 CVE-2023-45918 低危 6.3-2ubuntu0.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15

libncurses6 CVE-2023-50495 低危 6.3-2ubuntu0.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libncursesw6 CVE-2023-45918 低危 6.3-2ubuntu0.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15

libncursesw6 CVE-2023-50495 低危 6.3-2ubuntu0.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libc-bin CVE-2016-20013 低危 2.35-0ubuntu3.6

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-20013

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2022-02-19 05:15 修改: 2022-03-03 16:43

libpcre2-8-0 CVE-2022-41409 低危 10.39-3ubuntu0.1 pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-07-18 14:15 修改: 2023-07-27 03:46

libpcre3 CVE-2017-11164 低危 2:8.39-13ubuntu0.22.04.1 pcre: OP_KETRMAX feature in the match function in pcre_exec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38

libpng16-16 CVE-2022-3857 低危 1.6.37-3build5 libpng: Null pointer dereference leads to segmentation fault

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3857

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2023-03-06 23:15 修改: 2024-10-09 04:15

gpgv CVE-2022-3219 低危 2.2.27-3ubuntu2.1 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

libk5crypto3 CVE-2024-26458 低危 1.19.2-2ubuntu0.3 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libssl3 CVE-2024-2511 低危 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17 openssl: Unbounded memory growth with session handling in TLSv1.3

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15

libssl3 CVE-2024-41996 低危 3.0.2-0ubuntu1.15 openssl: remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41996

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-08-26 06:15 修改: 2024-08-26 16:35

libssl3 CVE-2024-4603 低危 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17 openssl: Excessive time spent checking DSA keys and parameters

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4603

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-05-16 16:15 修改: 2024-10-14 15:15

libssl3 CVE-2024-4741 低危 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17 openssl: Use After Free with SSL_free_buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

libssl3 CVE-2024-5535 低危 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17 openssl: SSL_select_next_proto buffer overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15

libk5crypto3 CVE-2024-26461 低危 1.19.2-2ubuntu0.3 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

libstdc++6 CVE-2022-27943 低危 12.3.0-1ubuntu1~22.04 binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27943

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2022-03-26 13:15 修改: 2023-11-07 03:45

libsystemd0 CVE-2023-7008 低危 249.11-0ubuntu3.12 systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-12-23 13:15 修改: 2024-09-16 17:16

libtinfo6 CVE-2023-45918 低危 6.3-2ubuntu0.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15

libtinfo6 CVE-2023-50495 低危 6.3-2ubuntu0.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libudev1 CVE-2023-7008 低危 249.11-0ubuntu3.12 systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-12-23 13:15 修改: 2024-09-16 17:16

libzstd1 CVE-2022-4899 低危 1.4.8+dfsg-3build1 zstd: mysql: buffer overrun in util.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4899

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-03-31 20:15 修改: 2023-11-07 03:59

libc6 CVE-2016-20013 低危 2.35-0ubuntu3.6

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-20013

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2022-02-19 05:15 修改: 2022-03-03 16:43

coreutils CVE-2016-2781 低危 8.32-4.1ubuntu1.2 coreutils: Non-privileged session can escape to the parent session in chroot

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2781

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2017-02-07 15:59 修改: 2023-11-07 02:32

libgcc-s1 CVE-2022-27943 低危 12.3.0-1ubuntu1~22.04 binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27943

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2022-03-26 13:15 修改: 2023-11-07 03:45

libkrb5-3 CVE-2024-26458 低危 1.19.2-2ubuntu0.3 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkrb5-3 CVE-2024-26461 低危 1.19.2-2ubuntu0.3 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

locales CVE-2016-20013 低危 2.35-0ubuntu3.6

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-20013

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2022-02-19 05:15 修改: 2022-03-03 16:43

login CVE-2023-29383 低危 1:4.8.1-2ubuntu2.2 shadow: Improper input validation in shadow-utils package utility chfn

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05

ncurses-base CVE-2023-45918 低危 6.3-2ubuntu0.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15

ncurses-base CVE-2023-50495 低危 6.3-2ubuntu0.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

ncurses-bin CVE-2023-45918 低危 6.3-2ubuntu0.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15

ncurses-bin CVE-2023-50495 低危 6.3-2ubuntu0.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libgssapi-krb5-2 CVE-2024-26458 低危 1.19.2-2ubuntu0.3 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libgssapi-krb5-2 CVE-2024-26461 低危 1.19.2-2ubuntu0.3 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

openssl CVE-2024-2511 低危 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17 openssl: Unbounded memory growth with session handling in TLSv1.3

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15

openssl CVE-2024-41996 低危 3.0.2-0ubuntu1.15 openssl: remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41996

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-08-26 06:15 修改: 2024-08-26 16:35

openssl CVE-2024-4603 低危 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17 openssl: Excessive time spent checking DSA keys and parameters

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4603

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-05-16 16:15 修改: 2024-10-14 15:15

openssl CVE-2024-4741 低危 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17 openssl: Use After Free with SSL_free_buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

openssl CVE-2024-5535 低危 3.0.2-0ubuntu1.15 3.0.2-0ubuntu1.17 openssl: SSL_select_next_proto buffer overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535

镜像层: sha256:b5eaffc5281f2b526576ed3522873ba3c95b2a7c7c75ad57b37685d8cd1d8dc5

发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15

passwd CVE-2023-29383 低危 1:4.8.1-2ubuntu2.2 shadow: Improper input validation in shadow-utils package utility chfn

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05

gcc-12-base CVE-2022-27943 低危 12.3.0-1ubuntu1~22.04 binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27943

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2022-03-26 13:15 修改: 2023-11-07 03:45

libkrb5support0 CVE-2024-26458 低危 1.19.2-2ubuntu0.3 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:e0a9f5911802534ba097660206feabeb0247a81e409029167b30e2e1f2803b57

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

Java (jar)
低危漏洞:0 中危漏洞:19 高危漏洞:21 严重漏洞:2
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
cn.hutool:hutool-all CVE-2023-24163 严重 5.8.18 5.8.21 Dromara hutool vulnerable to SQL Injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24163

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2023-01-31 16:15 修改: 2024-05-21 17:23

org.springframework:spring-web CVE-2016-1000027 严重 5.3.31 6.0.0 spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000027

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2020-01-02 23:15 修改: 2023-04-20 09:15

ch.qos.logback:logback-core CVE-2023-6481 高危 1.2.12 1.4.14, 1.3.14, 1.2.13 logback: A serialization vulnerability in logback receiver

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6481

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2023-12-04 09:15 修改: 2023-12-07 19:57

ch.qos.logback:logback-classic CVE-2023-6378 高危 1.2.12 1.3.12, 1.4.12, 1.2.13 logback: serialization vulnerability in logback receiver

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2023-11-29 12:15 修改: 2023-12-05 21:00

com.alibaba:fastjson CVE-2022-25845 高危 1.2.75 1.2.83 fastjson: autoType shutdown restriction bypass leads to deserialization

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25845

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-06-10 20:15 修改: 2023-02-23 17:51

com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 高危 2.13.4.1 2.12.7.1, 2.13.4.2 jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15

com.google.protobuf:protobuf-java CVE-2021-22569 高危 3.11.4 3.16.1, 3.18.2, 3.19.2 protobuf-java: potential DoS in the parsing procedure for binary data

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15

com.google.protobuf:protobuf-java CVE-2021-22570 高危 3.11.4 3.15.0 protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30

com.google.protobuf:protobuf-java CVE-2022-3509 高危 3.11.4 3.16.3, 3.19.6, 3.20.3, 3.21.7 protobuf-java: Textformat parsing issue leads to DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57

com.google.protobuf:protobuf-java CVE-2022-3510 高危 3.11.4 3.16.3, 3.19.6, 3.20.3, 3.21.7 protobuf-java: Message-Type Extensions parsing issue leads to DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51

com.google.protobuf:protobuf-java CVE-2024-7254 高危 3.11.4 3.25.5, 4.27.5, 4.28.2 protobuf: StackOverflow vulnerability in Protocol Buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2024-09-19 01:15 修改: 2024-09-20 12:30

org.apache.tomcat.embed:tomcat-embed-core CVE-2024-34750 高危 9.0.83 11.0.0-M21, 10.1.25, 9.0.90 tomcat: Improper Handling of Exceptional Conditions

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34750

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2024-07-03 20:15 修改: 2024-07-09 16:22

org.codehaus.jettison:jettison CVE-2022-40150 高危 1.1 1.5.2 jettison: memory exhaustion via user-supplied XML or JSON data

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24

org.codehaus.jettison:jettison CVE-2022-45685 高危 1.1 1.5.2 jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57

org.codehaus.jettison:jettison CVE-2022-45693 高危 1.1 1.5.2 jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35

org.codehaus.jettison:jettison CVE-2023-1436 高危 1.1 1.5.4 jettison: Uncontrolled Recursion in JSONArray

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03

ch.qos.logback:logback-core CVE-2023-6378 高危 1.2.12 1.3.12, 1.4.12, 1.2.13 logback: serialization vulnerability in logback receiver

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2023-11-29 12:15 修改: 2023-12-05 21:00

org.springframework:spring-web CVE-2024-22243 高危 5.3.31 6.1.4, 6.0.17, 5.3.32 springframework: URL Parsing with Host Validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22243

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2024-02-23 05:15 修改: 2024-08-22 15:35

org.springframework:spring-web CVE-2024-22259 高危 5.3.31 6.1.5, 6.0.18, 5.3.33 springframework: URL Parsing with Host Validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47

org.springframework:spring-web CVE-2024-22262 高危 5.3.31 5.3.34, 6.0.19, 6.1.6 springframework: URL Parsing with Host Validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35

org.springframework:spring-webmvc CVE-2024-38816 高危 5.3.31 6.1.13, 6.0.24, 5.3.40 spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2024-09-13 06:15 修改: 2024-09-13 14:06

org.yaml:snakeyaml CVE-2022-1471 高危 1.30 2.0 SnakeYaml: Constructor Deserialization Remote Code Execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15

org.yaml:snakeyaml CVE-2022-25857 高危 1.30 1.31 snakeyaml: Denial of Service due to missing nested depth limitation for collections

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25857

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-08-30 05:15 修改: 2024-03-15 11:15

com.google.protobuf:protobuf-java CVE-2022-3171 中危 3.11.4 3.21.7, 3.20.3, 3.19.6, 3.16.3 protobuf-java: timeout in parser leads to DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50

org.apache.tomcat.embed:tomcat-embed-core CVE-2024-24549 中危 9.0.83 8.5.99, 9.0.86, 10.1.19, 11.0.0-M17 Tomcat: HTTP/2 header handling DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24549

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2024-03-13 16:15 修改: 2024-06-23 09:15

org.apache.tomcat.embed:tomcat-embed-websocket CVE-2024-23672 中危 9.0.83 11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 Tomcat: WebSocket DoS with incomplete closing handshake

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23672

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2024-03-13 16:15 修改: 2024-06-23 09:15

org.codehaus.jettison:jettison CVE-2022-40149 中危 1.1 1.5.1 jettison: parser crash by stackoverflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32

org.springframework:spring-context CVE-2024-38820 中危 5.3.31 6.1.14, 6.0.25, 5.3.41 The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2024-10-18 06:15 修改: 2024-10-22 15:42

org.springframework:spring-expression CVE-2024-38808 中危 5.3.31 5.3.39 spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38808

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2024-08-20 08:15 修改: 2024-08-20 15:44

org.bouncycastle:bcprov-jdk15on CVE-2020-15522 中危 1.64 1.66 bouncycastle: Timing issue within the EC math library

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15522

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2021-05-20 12:15 修改: 2021-06-22 09:15

org.bouncycastle:bcprov-jdk15on CVE-2023-33201 中危 1.64 bouncycastle: potential blind LDAP injection attack using a self-signed certificate

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33201

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2023-07-05 03:15 修改: 2023-08-24 19:15

org.bouncycastle:bcprov-jdk15on CVE-2023-33202 中危 1.64 1.70 bc-java: Out of memory while parsing ASN.1 crafted data in org.bouncycastle.openssl.PEMParser class

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33202

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2023-11-23 16:15 修改: 2024-09-09 13:53

org.bouncycastle:bcprov-jdk15on CVE-2024-29857 中危 1.64 1.78 org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29857

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2024-05-14 15:17 修改: 2024-08-15 19:35

org.springframework:spring-web CVE-2024-38809 中危 5.3.31 5.3.38, 6.0.23, 6.1.12 org.springframework:spring-web: Spring Framework DoS via conditional HTTP request

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45

org.bouncycastle:bcprov-jdk15on CVE-2024-30171 中危 1.64 1.78 bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack)

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-30171

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2024-05-14 15:21 修改: 2024-08-19 18:35

org.bouncycastle:bcprov-jdk15on CVE-2024-30172 中危 1.64 1.78 org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-30172

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2024-05-14 15:21 修改: 2024-06-14 13:15

com.squareup.okio:okio CVE-2023-3635 中危 2.8.0 3.4.0, 1.17.6 okio: GzipSource class improper exception handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17

org.yaml:snakeyaml CVE-2022-38749 中危 1.30 1.31 snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38749

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15

org.yaml:snakeyaml CVE-2022-38750 中危 1.30 1.31 snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38750

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15

org.yaml:snakeyaml CVE-2022-38751 中危 1.30 1.31 snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38751

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15

org.yaml:snakeyaml CVE-2022-38752 中危 1.30 1.32 snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15

org.yaml:snakeyaml CVE-2022-41854 中危 1.30 1.32 dev-java/snakeyaml: DoS via stack overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854

镜像层: sha256:5007cace9be393cf31c4078d27b52148ea8c217c8f7266e3dc4cf6bd40fcbe11

发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15