docker.io/journeyapps/powersync-service:latest linux/amd64

docker.io/journeyapps/powersync-service:latest - Trivy安全扫描结果 扫描时间: 2026-05-14 17:24
全部漏洞信息
低危漏洞:62 中危漏洞:50 高危漏洞:16 严重漏洞:0

系统OS: debian 13.4 扫描引擎: Trivy 扫描时间: 2026-05-14 17:24

docker.io/journeyapps/powersync-service:latest (debian 13.4) (debian)
低危漏洞:62 中危漏洞:42 高危漏洞:6 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
libcap2 CVE-2026-4878 高危 1:2.75-10+b8 libcap: libcap: Privilege escalation via TOCTOU race condition in cap_set_file()

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4878

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-09 16:16 修改: 2026-05-07 22:16

libsystemd0 CVE-2026-29111 高危 257.9-1~deb13u1 systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-29111

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-03-23 22:16 修改: 2026-04-15 16:44

libtinfo6 CVE-2025-69720 高危 6.5+20250216-2 ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69720

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-03-19 15:16 修改: 2026-03-26 19:35

libudev1 CVE-2026-29111 高危 257.9-1~deb13u1 systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-29111

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-03-23 22:16 修改: 2026-04-15 16:44

ncurses-base CVE-2025-69720 高危 6.5+20250216-2 ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69720

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-03-19 15:16 修改: 2026-03-26 19:35

ncurses-bin CVE-2025-69720 高危 6.5+20250216-2 ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69720

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-03-19 15:16 修改: 2026-03-26 19:35

libc-bin CVE-2026-4438 中危 2.41-12+deb13u2 glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4438

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:40

libc-bin CVE-2026-5435 中危 2.41-12+deb13u2 glibc: glibc: Out-of-bounds write via TSIG record processing

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5435

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-28 13:19 修改: 2026-05-05 17:38

libc-bin CVE-2026-5450 中危 2.41-12+deb13u2 glibc: glibc: Heap Buffer Overflow in `scanf` with `%mc` format specifier and large width

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5450

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33

libc-bin CVE-2026-5928 中危 2.41-12+deb13u2 glibc: glibc: Information disclosure or denial of service via ungetwc function with specific wide character encodings

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5928

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33

libc-bin CVE-2026-6238 中危 2.41-12+deb13u2 glibc: glibc: Application crash or uninitialized memory read via crafted DNS response

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6238

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-28 19:37 修改: 2026-05-04 17:57

libc6 CVE-2026-4046 中危 2.41-12+deb13u2 glibc: glibc: Denial of Service via iconv() function with specific character sets

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4046

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-03-30 18:16 修改: 2026-04-20 22:16

libc6 CVE-2026-4437 中危 2.41-12+deb13u2 glibc: glibc: Incorrect DNS response parsing via crafted DNS server response

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4437

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:41

libc6 CVE-2026-4438 中危 2.41-12+deb13u2 glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4438

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:40

libc6 CVE-2026-5435 中危 2.41-12+deb13u2 glibc: glibc: Out-of-bounds write via TSIG record processing

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5435

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-28 13:19 修改: 2026-05-05 17:38

libc6 CVE-2026-5450 中危 2.41-12+deb13u2 glibc: glibc: Heap Buffer Overflow in `scanf` with `%mc` format specifier and large width

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5450

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33

libc6 CVE-2026-5928 中危 2.41-12+deb13u2 glibc: glibc: Information disclosure or denial of service via ungetwc function with specific wide character encodings

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5928

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-20 21:16 修改: 2026-04-23 15:33

libc6 CVE-2026-6238 中危 2.41-12+deb13u2 glibc: glibc: Application crash or uninitialized memory read via crafted DNS response

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6238

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-28 19:37 修改: 2026-05-04 17:57

bsdutils CVE-2026-27456 中危 1:2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

liblastlog2-2 CVE-2026-27456 中危 2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

liblastlog2-2 CVE-2026-3184 中危 2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

liblzma5 CVE-2026-34743 中危 5.8.1-1 xz: XZ Utils: Denial of Service via buffer overflow in index decoding

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34743

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-02 19:21 修改: 2026-04-15 17:33

libmount1 CVE-2026-27456 中危 2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

libmount1 CVE-2026-3184 中危 2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

libsmartcols1 CVE-2026-27456 中危 2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

libsmartcols1 CVE-2026-3184 中危 2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

bsdutils CVE-2026-3184 中危 1:2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

libsystemd0 CVE-2026-40225 中危 257.9-1~deb13u1 systemd: udev in systemd: Privilege escalation via malicious hardware devices and unsanitized kernel output

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40225

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-10 16:16 修改: 2026-04-27 19:00

libsystemd0 CVE-2026-40226 中危 257.9-1~deb13u1 systemd: systemd nspawn: Escape-to-host action via crafted config file

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40226

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-10 16:16 修改: 2026-04-17 22:02

libsystemd0 CVE-2026-4105 中危 257.9-1~deb13u1 systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4105

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-03-13 19:55 修改: 2026-04-30 17:16

libblkid1 CVE-2026-27456 中危 2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

libblkid1 CVE-2026-3184 中危 2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

libudev1 CVE-2026-40225 中危 257.9-1~deb13u1 systemd: udev in systemd: Privilege escalation via malicious hardware devices and unsanitized kernel output

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40225

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-10 16:16 修改: 2026-04-27 19:00

libudev1 CVE-2026-40226 中危 257.9-1~deb13u1 systemd: systemd nspawn: Escape-to-host action via crafted config file

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40226

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-10 16:16 修改: 2026-04-17 22:02

libudev1 CVE-2026-4105 中危 257.9-1~deb13u1 systemd: systemd: Privilege escalation via improper access control in RegisterMachine D-Bus method

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4105

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-03-13 19:55 修改: 2026-04-30 17:16

libuuid1 CVE-2026-27456 中危 2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

libuuid1 CVE-2026-3184 中危 2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

login CVE-2026-27456 中危 1:4.16.0-2+really2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

login CVE-2026-3184 中危 1:4.16.0-2+really2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

mount CVE-2026-27456 中危 2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

mount CVE-2026-3184 中危 2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

libc-bin CVE-2026-4046 中危 2.41-12+deb13u2 glibc: glibc: Denial of Service via iconv() function with specific character sets

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4046

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-03-30 18:16 修改: 2026-04-20 22:16

libc-bin CVE-2026-4437 中危 2.41-12+deb13u2 glibc: glibc: Incorrect DNS response parsing via crafted DNS server response

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-4437

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-03-20 20:16 修改: 2026-04-07 18:41

sed CVE-2026-5958 中危 4.9-2 When sed is invoked with both -i (in-place edit) and --follow-symlinks ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5958

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-20 12:16 修改: 2026-04-20 19:05

tar CVE-2026-5704 中危 1.35+dfsg-3.1 tar: tar: Hidden file injection via crafted archives

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-5704

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-06 16:16 修改: 2026-04-22 20:08

util-linux CVE-2026-27456 中危 2.41-5 util-linux: TOCTOU in the mount program when setting up loop devices

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27456

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 22:16 修改: 2026-04-22 16:08

util-linux CVE-2026-3184 中危 2.41-5 util-linux: util-linux: Access control bypass due to improper hostname canonicalization

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-3184

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-03 19:17 修改: 2026-05-01 19:29

zlib1g CVE-2026-27171 中危 1:1.3.dfsg+really1.3.1-1+b1 zlib: zlib: Denial of Service via infinite loop in CRC32 combine functions

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27171

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-02-18 04:16 修改: 2026-03-25 21:27

libc-bin CVE-2019-1010023 低危 2.41-12+deb13u2 glibc: running ldd on malicious ELF leads to code execution because of wrong size computation

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

libmount1 CVE-2022-0563 低危 2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

libmount1 CVE-2025-14104 低危 2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

libc-bin CVE-2019-1010024 低危 2.41-12+deb13u2 glibc: ASLR bypass using cache of thread stack and heap

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

libc-bin CVE-2019-1010025 低危 2.41-12+deb13u2 glibc: information disclosure of heap addresses of pthread_created thread

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

libsmartcols1 CVE-2022-0563 低危 2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

libsmartcols1 CVE-2025-14104 低危 2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

libsqlite3-0 CVE-2021-45346 低危 3.46.1-7+deb13u1 sqlite: crafted SQL query allows a malicious user to obtain sensitive information

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45346

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2022-02-14 19:15 修改: 2024-11-21 06:32

libsqlite3-0 CVE-2025-70873 低危 3.46.1-7+deb13u1 sqlite: SQLite: Information Disclosure via Crafted ZIP File

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-70873

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-03-12 19:16 修改: 2026-04-16 21:15

libc-bin CVE-2019-9192 低危 2.41-12+deb13u2 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2019-02-26 18:29 修改: 2024-11-21 04:51

libblkid1 CVE-2022-0563 低危 2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

libblkid1 CVE-2025-14104 低危 2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

bsdutils CVE-2022-0563 低危 1:2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

libsystemd0 CVE-2013-4392 低危 257.9-1~deb13u1 systemd: TOCTOU race condition when updating file permissions and SELinux security contexts

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2013-10-28 22:55 修改: 2026-04-29 01:13

libsystemd0 CVE-2023-31437 低危 257.9-1~deb13u1 An issue was discovered in systemd 253. An attacker can modify a seale ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2023-06-13 17:15 修改: 2025-01-03 20:15

libsystemd0 CVE-2023-31438 低危 257.9-1~deb13u1 An issue was discovered in systemd 253. An attacker can truncate a sea ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2023-06-13 17:15 修改: 2024-11-21 08:01

libsystemd0 CVE-2023-31439 低危 257.9-1~deb13u1 An issue was discovered in systemd 253. An attacker can modify the con ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2023-06-13 17:15 修改: 2024-11-21 08:01

libsystemd0 CVE-2026-40228 低危 257.9-1~deb13u1 systemd: systemd-journald: Unintended output to user terminals via logger command

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40228

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-10 16:16 修改: 2026-05-05 02:16

bsdutils CVE-2025-14104 低危 1:2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

libtinfo6 CVE-2025-6141 低危 6.5+20250216-2 gnu-ncurses: ncurses Stack Buffer Overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6141

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2025-06-16 22:16 修改: 2026-04-15 00:35

coreutils CVE-2017-18018 低危 9.7-3 coreutils: race condition vulnerability in chown and chgrp

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18018

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2018-01-04 04:29 修改: 2025-06-09 16:15

coreutils CVE-2025-5278 低危 9.7-3 coreutils: Heap Buffer Under-Read in GNU Coreutils sort via Key Specification

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5278

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2025-05-27 21:15 修改: 2026-04-15 00:35

libapt-pkg7.0 CVE-2011-3374 低危 3.0.3 It was found that apt-key in apt, all versions, do not correctly valid ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3374

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2019-11-26 00:15 修改: 2024-11-21 01:30

libc6 CVE-2010-4756 低危 2.41-12+deb13u2 glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions

漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2011-03-02 20:00 修改: 2026-04-29 01:13

libudev1 CVE-2013-4392 低危 257.9-1~deb13u1 systemd: TOCTOU race condition when updating file permissions and SELinux security contexts

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4392

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2013-10-28 22:55 修改: 2026-04-29 01:13

libudev1 CVE-2023-31437 低危 257.9-1~deb13u1 An issue was discovered in systemd 253. An attacker can modify a seale ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31437

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2023-06-13 17:15 修改: 2025-01-03 20:15

libudev1 CVE-2023-31438 低危 257.9-1~deb13u1 An issue was discovered in systemd 253. An attacker can truncate a sea ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31438

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2023-06-13 17:15 修改: 2024-11-21 08:01

libudev1 CVE-2023-31439 低危 257.9-1~deb13u1 An issue was discovered in systemd 253. An attacker can modify the con ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31439

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2023-06-13 17:15 修改: 2024-11-21 08:01

libudev1 CVE-2026-40228 低危 257.9-1~deb13u1 systemd: systemd-journald: Unintended output to user terminals via logger command

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40228

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2026-04-10 16:16 修改: 2026-05-05 02:16

libc6 CVE-2018-20796 低危 2.41-12+deb13u2 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2019-02-26 02:29 修改: 2024-11-21 04:02

libc6 CVE-2019-1010022 低危 2.41-12+deb13u2 glibc: stack guard protection bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

libuuid1 CVE-2022-0563 低危 2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

libuuid1 CVE-2025-14104 低危 2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

libc6 CVE-2019-1010023 低危 2.41-12+deb13u2 glibc: running ldd on malicious ELF leads to code execution because of wrong size computation

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

libc6 CVE-2019-1010024 低危 2.41-12+deb13u2 glibc: ASLR bypass using cache of thread stack and heap

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

login CVE-2022-0563 低危 1:4.16.0-2+really2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

login CVE-2025-14104 低危 1:4.16.0-2+really2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

login.defs CVE-2007-5686 低危 1:4.17.4-2 initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2007-5686

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2007-10-28 17:08 修改: 2026-04-23 00:35

login.defs CVE-2024-56433 低危 1:4.17.4-2 shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56433

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2024-12-26 09:15 修改: 2026-04-15 00:35

login.defs TEMP-0628843-DBAD28 低危 1:4.17.4-2 [more related to CVE-2005-4890]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

libc6 CVE-2019-1010025 低危 2.41-12+deb13u2 glibc: information disclosure of heap addresses of pthread_created thread

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

libc6 CVE-2019-9192 低危 2.41-12+deb13u2 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2019-02-26 18:29 修改: 2024-11-21 04:51

mount CVE-2022-0563 低危 2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

mount CVE-2025-14104 低危 2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

apt CVE-2011-3374 低危 3.0.3 It was found that apt-key in apt, all versions, do not correctly valid ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2011-3374

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2019-11-26 00:15 修改: 2024-11-21 01:30

ncurses-base CVE-2025-6141 低危 6.5+20250216-2 gnu-ncurses: ncurses Stack Buffer Overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6141

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2025-06-16 22:16 修改: 2026-04-15 00:35

bash TEMP-0841856-B18BAF 低危 5.2.37-2+b8 [Privilege escalation possible to other user than root]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

ncurses-bin CVE-2025-6141 低危 6.5+20250216-2 gnu-ncurses: ncurses Stack Buffer Overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6141

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2025-06-16 22:16 修改: 2026-04-15 00:35

passwd CVE-2007-5686 低危 1:4.17.4-2 initscripts in rPath Linux 1 sets insecure permissions for the /var/lo ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2007-5686

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2007-10-28 17:08 修改: 2026-04-23 00:35

passwd CVE-2024-56433 低危 1:4.17.4-2 shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56433

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2024-12-26 09:15 修改: 2026-04-15 00:35

passwd TEMP-0628843-DBAD28 低危 1:4.17.4-2 [more related to CVE-2005-4890]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

perl-base CVE-2011-4116 低危 5.40.1-6 perl: File:: Temp insecure temporary file handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2011-4116

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2020-01-31 18:15 修改: 2025-08-04 19:04

libc-bin CVE-2010-4756 低危 2.41-12+deb13u2 glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions

漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2011-03-02 20:00 修改: 2026-04-29 01:13

sysvinit-utils TEMP-0517018-A83CE6 低危 3.14-4 [sysvinit: no-root option in expert installer exposes locally exploitable security flaw]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

liblastlog2-2 CVE-2022-0563 低危 2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

tar CVE-2005-2541 低危 1.35+dfsg-3.1 tar: does not properly warn the user when extracting setuid or setgid files

漏洞详情: https://avd.aquasec.com/nvd/cve-2005-2541

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2005-08-10 04:00 修改: 2026-04-16 00:27

tar TEMP-0290435-0B57B5 低危 1.35+dfsg-3.1 [tar's rmt command may have undesired side effects]

漏洞详情: https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

liblastlog2-2 CVE-2025-14104 低危 2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

libc-bin CVE-2018-20796 低危 2.41-12+deb13u2 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2019-02-26 02:29 修改: 2024-11-21 04:02

util-linux CVE-2022-0563 低危 2.41-5 util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0563

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2022-02-21 19:15 修改: 2025-06-09 16:15

util-linux CVE-2025-14104 低危 2.41-5 util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2025-12-05 17:16 修改: 2026-04-19 20:16

libc-bin CVE-2019-1010022 低危 2.41-12+deb13u2 glibc: stack guard protection bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022

镜像层: sha256:79dd1f4c855cd061f687a994426634cf5f84c8ecdbc66c7a7d118e828dd93c99

发布日期: 2019-07-15 04:15 修改: 2024-11-21 04:17

Node.js (node-pkg)
低危漏洞:0 中危漏洞:8 高危漏洞:10 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
@opentelemetry/exporter-prometheus CVE-2026-44902 高危 0.203.0 0.217.0 Prometheus exporter process crash via malformed HTTP request

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44902

镜像层: sha256:88d71bde4fdbd011716df4d083dc9efb52f986eef6cd84469b3f52dc6d3730b8

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

fast-uri CVE-2026-6321 高危 3.0.6 3.1.1 fast-uri: fast-uri: Path traversal vulnerability allows bypass of security policies

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6321

镜像层: sha256:88d71bde4fdbd011716df4d083dc9efb52f986eef6cd84469b3f52dc6d3730b8

发布日期: 2026-05-04 20:16 修改: 2026-05-12 18:54

fast-uri CVE-2026-6322 高危 3.0.6 3.1.2 fast-uri normalize() decoded percent-encoded authority delimiters insi ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6322

镜像层: sha256:88d71bde4fdbd011716df4d083dc9efb52f986eef6cd84469b3f52dc6d3730b8

发布日期: 2026-05-05 11:16 修改: 2026-05-12 19:11

fast-uri CVE-2026-6321 高危 3.1.0 3.1.1 fast-uri: fast-uri: Path traversal vulnerability allows bypass of security policies

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6321

镜像层: sha256:88d71bde4fdbd011716df4d083dc9efb52f986eef6cd84469b3f52dc6d3730b8

发布日期: 2026-05-04 20:16 修改: 2026-05-12 18:54

fast-uri CVE-2026-6322 高危 3.1.0 3.1.2 fast-uri normalize() decoded percent-encoded authority delimiters insi ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-6322

镜像层: sha256:88d71bde4fdbd011716df4d083dc9efb52f986eef6cd84469b3f52dc6d3730b8

发布日期: 2026-05-05 11:16 修改: 2026-05-12 19:11

picomatch CVE-2026-33671 高危 4.0.3 4.0.4, 3.0.2, 2.3.2 picomatch: Picomatch: Regular Expression Denial of Service via crafted extglob patterns

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33671

镜像层: sha256:d15675b7e89eb90be9d6e300c4ad7fb16a8e9bae332494f8751e31150e52ad44

发布日期: 2026-03-26 22:16 修改: 2026-04-01 13:45

protobufjs CVE-2026-44289 高危 7.5.5 7.5.6, 8.0.2 protobuf.js: Denial of service through unbounded protobuf recursion

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44289

镜像层: sha256:88d71bde4fdbd011716df4d083dc9efb52f986eef6cd84469b3f52dc6d3730b8

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

protobufjs CVE-2026-44290 高危 7.5.5 7.5.6, 8.0.2 protobuf.js: Process-wide denial of service through unsafe option paths

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44290

镜像层: sha256:88d71bde4fdbd011716df4d083dc9efb52f986eef6cd84469b3f52dc6d3730b8

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

protobufjs CVE-2026-44291 高危 7.5.5 7.5.6, 8.0.2 protobuf.js: Code generation gadget after prototype pollution

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44291

镜像层: sha256:88d71bde4fdbd011716df4d083dc9efb52f986eef6cd84469b3f52dc6d3730b8

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

protobufjs CVE-2026-44293 高危 7.5.5 7.5.6, 8.0.2 protobuf.js: Code injection through bytes field defaults in generated toObject code

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44293

镜像层: sha256:88d71bde4fdbd011716df4d083dc9efb52f986eef6cd84469b3f52dc6d3730b8

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

picomatch CVE-2026-33672 中危 4.0.3 4.0.4, 3.0.2, 2.3.2 picomatch: Picomatch: Data integrity compromised via method injection with crafted POSIX bracket expressions

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33672

镜像层: sha256:d15675b7e89eb90be9d6e300c4ad7fb16a8e9bae332494f8751e31150e52ad44

发布日期: 2026-03-26 22:16 修改: 2026-04-01 13:44

brace-expansion CVE-2026-33750 中危 5.0.4 5.0.5, 3.0.2, 2.0.3, 1.1.13 brace-expansion: brace-expansion: Denial of Service via zero step value in brace pattern

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33750

镜像层: sha256:d15675b7e89eb90be9d6e300c4ad7fb16a8e9bae332494f8751e31150e52ad44

发布日期: 2026-03-27 15:16 修改: 2026-04-22 14:23

ip-address CVE-2026-42338 中危 10.1.0 10.1.1 ip-address has XSS in Address6 HTML-emitting methods

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42338

镜像层: sha256:d15675b7e89eb90be9d6e300c4ad7fb16a8e9bae332494f8751e31150e52ad44

发布日期: 2026-05-12 20:16 修改: 2026-05-12 20:16

ip-address CVE-2026-42338 中危 9.0.5 10.1.1 ip-address has XSS in Address6 HTML-emitting methods

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42338

镜像层: sha256:88d71bde4fdbd011716df4d083dc9efb52f986eef6cd84469b3f52dc6d3730b8

发布日期: 2026-05-12 20:16 修改: 2026-05-12 20:16

@protobufjs/utf8 CVE-2026-44288 中危 1.1.0 1.1.1 protobufjs has overlong UTF-8 decoding

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44288

镜像层: sha256:88d71bde4fdbd011716df4d083dc9efb52f986eef6cd84469b3f52dc6d3730b8

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

protobufjs CVE-2026-44288 中危 7.5.5 7.5.6, 8.0.2 protobufjs has overlong UTF-8 decoding

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44288

镜像层: sha256:88d71bde4fdbd011716df4d083dc9efb52f986eef6cd84469b3f52dc6d3730b8

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

protobufjs CVE-2026-44292 中危 7.5.5 7.5.6, 8.0.2 protobuf.js: Prototype injection in generated message constructors

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44292

镜像层: sha256:88d71bde4fdbd011716df4d083dc9efb52f986eef6cd84469b3f52dc6d3730b8

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

protobufjs CVE-2026-44294 中危 7.5.5 7.5.6, 8.0.2 protobuf.js: Denial of service from crafted field names in generated code

漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44294

镜像层: sha256:88d71bde4fdbd011716df4d083dc9efb52f986eef6cd84469b3f52dc6d3730b8

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00