| github.com/minio/minio |
CVE-2026-33322 |
严重 |
v0.0.0-20250907161309-07c3a429bfed+dirty |
|
MinIO has JWT Algorithm Confusion in OIDC Authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33322
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-03-24 20:16 修改: 2026-04-08 19:05
|
| github.com/minio/minio |
CVE-2026-33419 |
严重 |
v0.0.0-20250907161309-07c3a429bfed+dirty |
|
MinIO LDAP login brute-force via user enumeration and missing rate limit
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33419
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-03-24 20:16 修改: 2026-04-08 19:00
|
| google.golang.org/grpc |
CVE-2026-33186 |
严重 |
v1.72.0 |
1.79.3 |
google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33186
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-03-20 23:16 修改: 2026-04-10 20:49
|
| stdlib |
CVE-2025-68121 |
严重 |
v1.24.6 |
1.24.13, 1.25.7, 1.26.0-rc.3 |
crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68121
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-02-05 18:16 修改: 2026-04-29 14:16
|
| github.com/buger/jsonparser |
CVE-2026-32285 |
高危 |
v1.1.1 |
1.1.2 |
github.com/buger/jsonparser: github.com/buger/jsonparser: Denial of Service via malformed JSON input
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32285
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-03-26 20:16 修改: 2026-04-21 15:42
|
| github.com/minio/minio |
CVE-2025-62506 |
高危 |
v0.0.0-20250907161309-07c3a429bfed+dirty |
0.0.0-20251015170045-c1a49490c78e |
MinIO is Vulnerable to Privilege Escalation via Session Policy Bypass in Service Accounts and STS
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-62506
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-10-16 22:15 修改: 2026-04-15 00:35
|
| github.com/minio/minio |
CVE-2026-34204 |
高危 |
v0.0.0-20250907161309-07c3a429bfed+dirty |
|
MinIO is Vulnerable to SSE Metadata Injection via Replication Headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34204
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-03-31 20:16 修改: 2026-04-07 16:06
|
| github.com/minio/minio |
CVE-2026-39414 |
高危 |
v0.0.0-20250907161309-07c3a429bfed+dirty |
|
MinIO affected a DoS via Unbounded Memory Allocation in S3 Select CSV Parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39414
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-04-08 21:16 修改: 2026-04-15 19:30
|
| github.com/minio/minio |
CVE-2026-40344 |
高危 |
v0.0.0-20250907161309-07c3a429bfed+dirty |
|
MinIO has an Unauthenticated Object Write via Missing Signature Verification in Unsigned-Trailer Uploads
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40344
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-04-22 01:16 修改: 2026-04-27 19:28
|
| github.com/minio/minio |
CVE-2026-41145 |
高危 |
v0.0.0-20250907161309-07c3a429bfed+dirty |
|
MinIO has an Unauthenticated Object Write via Query-String Credential Signature Bypass in Unsigned-Trailer Uploads
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41145
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-04-22 01:16 修改: 2026-04-27 19:27
|
| github.com/prometheus/prometheus |
CVE-2026-42151 |
高危 |
v0.303.0 |
0.311.3 |
Prometheus is an open-source monitoring system and time series databas ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42151
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-05-04 19:16 修改: 2026-05-11 17:22
|
| github.com/prometheus/prometheus |
CVE-2026-42154 |
高危 |
v0.303.0 |
0.311.3 |
Prometheus is an open-source monitoring system and time series databas ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42154
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-05-04 19:16 修改: 2026-05-11 17:22
|
| go.opentelemetry.io/otel/sdk |
CVE-2026-24051 |
高危 |
v1.35.0 |
1.40.0 |
OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-24051
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-02-02 23:16 修改: 2026-02-27 20:32
|
| go.opentelemetry.io/otel/sdk |
CVE-2026-39883 |
高危 |
v1.35.0 |
1.43.0 |
opentelemetry-go: BSD kenv command not using absolute path enables PATH hijacking
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39883
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-04-08 21:17 修改: 2026-04-10 21:16
|
| github.com/go-jose/go-jose/v4 |
CVE-2026-34986 |
高危 |
v4.1.0 |
4.1.4 |
github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34986
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-04-06 17:17 修改: 2026-05-04 15:20
|
| github.com/apache/thrift |
CVE-2026-41602 |
高危 |
v0.21.0 |
0.23.0 |
github.com/apache/thrift: Apache Thrift: Integer Overflow in TFramedTransport Go implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-41602
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-04-28 10:16 修改: 2026-04-28 18:40
|
| stdlib |
CVE-2025-58183 |
高危 |
v1.24.6 |
1.24.8, 1.25.2 |
golang: archive/tar: Unbounded allocation when parsing GNU sparse map
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58183
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-10-29 23:16 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2025-61726 |
高危 |
v1.24.6 |
1.24.12, 1.25.6 |
golang: net/url: Memory exhaustion in query parameter parsing in net/url
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61726
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-01-28 20:16 修改: 2026-02-06 18:47
|
| stdlib |
CVE-2025-61728 |
高危 |
v1.24.6 |
1.24.12, 1.25.6 |
golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61728
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-01-28 20:16 修改: 2026-02-06 18:45
|
| stdlib |
CVE-2025-61729 |
高危 |
v1.24.6 |
1.24.11, 1.25.5 |
crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61729
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-12-02 19:15 修改: 2025-12-19 18:25
|
| stdlib |
CVE-2026-25679 |
高危 |
v1.24.6 |
1.25.8, 1.26.1 |
net/url: Incorrect parsing of IPv6 host literals in net/url
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-25679
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-03-06 22:16 修改: 2026-04-21 14:43
|
| stdlib |
CVE-2026-32280 |
高危 |
v1.24.6 |
1.25.9, 1.26.2 |
crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32280
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:16
|
| stdlib |
CVE-2026-32281 |
高危 |
v1.24.6 |
1.25.9, 1.26.2 |
crypto/x509: golang: Go crypto/x509: Denial of Service via inefficient certificate chain validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32281
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:15
|
| stdlib |
CVE-2026-32283 |
高危 |
v1.24.6 |
1.25.9, 1.26.2 |
crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32283
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:12
|
| stdlib |
CVE-2026-33811 |
高危 |
v1.24.6 |
1.25.10, 1.26.3 |
When using LookupCNAME with the cgo DNS resolver, a very long CNAME re ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33811
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-05-07 20:16 修改: 2026-05-12 20:23
|
| stdlib |
CVE-2026-33814 |
高危 |
v1.24.6 |
1.25.10, 1.26.3 |
When processing HTTP/2 SETTINGS frames, transport will enter an infini ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33814
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-05-07 20:16 修改: 2026-05-08 19:16
|
| stdlib |
CVE-2026-39820 |
高危 |
v1.24.6 |
1.25.10, 1.26.3 |
Well-crafted inputs reaching ParseAddress, ParseAddressList, and Parse ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39820
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-05-07 20:16 修改: 2026-05-08 15:16
|
| stdlib |
CVE-2026-39836 |
高危 |
v1.24.6 |
1.25.10, 1.26.3 |
Panic in Dial and LookupPort when handling NUL byte on Windows in net
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39836
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-05-07 20:16 修改: 2026-05-08 22:16
|
| stdlib |
CVE-2026-42499 |
高危 |
v1.24.6 |
1.25.10, 1.26.3 |
Pathological inputs could cause DoS through consumePhrase when parsing ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42499
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-05-07 20:16 修改: 2026-05-08 22:16
|
| github.com/eclipse/paho.mqtt.golang |
CVE-2025-10543 |
中危 |
v1.5.0 |
1.5.1 |
paho.mqtt.golang: paho.mqtt.golang: Integer Overflow in UTF-8 String Encoding
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10543
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-12-02 09:15 修改: 2026-01-16 21:22
|
| golang.org/x/crypto |
CVE-2025-47914 |
中危 |
v0.37.0 |
0.45.0 |
golang.org/x/crypto/ssh/agent: SSH Agent servers: Denial of Service due to malformed messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47914
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-11-19 21:15 修改: 2025-12-11 19:36
|
| golang.org/x/crypto |
CVE-2025-58181 |
中危 |
v0.37.0 |
0.45.0 |
golang.org/x/crypto/ssh: golang.org/x/crypto/ssh: Denial of Service via unbounded memory consumption in GSSAPI authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58181
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-11-19 21:15 修改: 2025-12-11 19:29
|
| github.com/prometheus/prometheus |
CVE-2026-40179 |
中危 |
v0.303.0 |
0.311.2-0.20260410083055-07c6232d159b |
Prometheus has Stored XSS via metric names and label values in Prometheus web UI tooltips and metrics explorer
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-40179
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-04-15 23:16 修改: 2026-04-22 20:04
|
| github.com/prometheus/prometheus |
GHSA-fw8g-cg8f-9j28 |
中危 |
v0.303.0 |
0.311.3 |
Prometheus vulnerable to stored XSS via crafted histogram bucket label values in the old web UI heatmap display
漏洞详情: https://github.com/advisories/GHSA-fw8g-cg8f-9j28
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-05-05 21:53 修改: 2026-05-08 16:52
|
| github.com/Azure/go-ntlmssp |
CVE-2026-32952 |
中危 |
v0.0.0-20221128193559-754e69321358 |
0.1.1 |
go-ntlmssp: go-ntlmssp: Denial of Service via malicious NTLM challenge
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32952
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-04-24 03:16 修改: 2026-04-24 14:50
|
| stdlib |
CVE-2025-47912 |
中危 |
v1.24.6 |
1.24.8, 1.25.2 |
net/url: Insufficient validation of bracketed IPv6 hostnames in net/url
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47912
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-10-29 23:16 修改: 2026-01-29 13:57
|
| stdlib |
CVE-2025-58185 |
中危 |
v1.24.6 |
1.24.8, 1.25.2 |
encoding/asn1: Parsing DER payload can cause memory exhaustion in encoding/asn1
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58185
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-10-29 23:16 修改: 2026-02-06 20:26
|
| stdlib |
CVE-2025-58186 |
中危 |
v1.24.6 |
1.24.8, 1.25.2 |
golang.org/net/http: Lack of limit when parsing cookies can cause memory exhaustion in net/http
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58186
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-10-29 23:16 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2025-58187 |
中危 |
v1.24.6 |
1.24.9, 1.25.3 |
crypto/x509: Quadratic complexity when checking name constraints in crypto/x509
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58187
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-10-29 23:16 修改: 2026-01-29 16:02
|
| stdlib |
CVE-2025-58188 |
中危 |
v1.24.6 |
1.24.8, 1.25.2 |
crypto/x509: golang: Panic when validating certificates with DSA public keys in crypto/x509
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58188
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-10-29 23:16 修改: 2026-01-29 15:55
|
| stdlib |
CVE-2025-58189 |
中危 |
v1.24.6 |
1.24.8, 1.25.2 |
crypto/tls: go crypto/tls ALPN negotiation error contains attacker controlled information
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58189
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-10-29 23:16 修改: 2026-01-29 15:49
|
| stdlib |
CVE-2025-61723 |
中危 |
v1.24.6 |
1.24.8, 1.25.2 |
encoding/pem: Quadratic complexity when parsing some invalid inputs in encoding/pem
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61723
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-10-29 23:16 修改: 2026-01-29 15:49
|
| stdlib |
CVE-2025-61724 |
中危 |
v1.24.6 |
1.24.8, 1.25.2 |
net/textproto: Excessive CPU consumption in Reader.ReadResponse in net/textproto
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61724
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-10-29 23:16 修改: 2026-01-29 15:30
|
| stdlib |
CVE-2025-61725 |
中危 |
v1.24.6 |
1.24.8, 1.25.2 |
net/mail: Excessive CPU consumption in ParseAddress in net/mail
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61725
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-10-29 23:16 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2025-61727 |
中危 |
v1.24.6 |
1.24.11, 1.25.5 |
golang: crypto/x509: excluded subdomain constraint does not restrict wildcard SANs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61727
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2025-12-03 20:16 修改: 2025-12-18 20:15
|
| stdlib |
CVE-2025-61730 |
中危 |
v1.24.6 |
1.24.12, 1.25.6 |
During the TLS 1.3 handshake if multiple messages are sent in records ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61730
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-01-28 20:16 修改: 2026-02-03 20:36
|
| stdlib |
CVE-2026-27142 |
中危 |
v1.24.6 |
1.25.8, 1.26.1 |
html/template: URLs in meta content attribute actions are not escaped in html/template
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27142
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-03-06 22:16 修改: 2026-04-21 14:30
|
| stdlib |
CVE-2026-32282 |
中危 |
v1.24.6 |
1.25.9, 1.26.2 |
golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32282
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:15
|
| stdlib |
CVE-2026-32288 |
中危 |
v1.24.6 |
1.25.9, 1.26.2 |
archive/tar: golang: Go's archive/tar package: Denial of Service via maliciously-crafted archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32288
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:08
|
| stdlib |
CVE-2026-32289 |
中危 |
v1.24.6 |
1.25.9, 1.26.2 |
html/template: golang: html/template: Cross-Site Scripting (XSS) via improper context and brace depth tracking in JS template literals
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32289
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:06
|
| stdlib |
CVE-2026-39823 |
中危 |
v1.24.6 |
1.25.10, 1.26.3 |
CVE-2026-27142 fixed a vulnerability in which URLs were not correctly ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39823
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-05-07 20:16 修改: 2026-05-08 15:16
|
| stdlib |
CVE-2026-39825 |
中危 |
v1.24.6 |
1.25.10, 1.26.3 |
ReverseProxy can forward queries containing parameters not visible to ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39825
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-05-07 20:16 修改: 2026-05-08 22:16
|
| stdlib |
CVE-2026-39826 |
中危 |
v1.24.6 |
1.25.10, 1.26.3 |
If a trusted template author were to write a <script> tag containing a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39826
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-05-07 20:16 修改: 2026-05-08 15:16
|
| filippo.io/edwards25519 |
CVE-2026-26958 |
低危 |
v1.1.0 |
1.1.1 |
filippo.io/edwards25519: filippo.io/edwards25519: Cryptographic integrity bypass due to incorrect MultiScalarMult results
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-26958
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-02-19 23:16 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2026-27139 |
低危 |
v1.24.6 |
1.25.8, 1.26.1 |
os: FileInfo can escape from a Root in golang os module
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27139
镜像层: sha256:aa871aa04b16d6a44871115fcf3f71d55f1d93449a6c53051081d8ee1fcd046d
发布日期: 2026-03-06 22:16 修改: 2026-04-21 14:32
|