docker.io/opensearchproject/opensearch:2.17.1 linux/arm64

docker.io/opensearchproject/opensearch:2.17.1 - Trivy安全扫描结果 扫描时间: 2026-01-23 11:53 温馨提示: 这是一个 linux/arm64 系统架构镜像
全部漏洞信息
低危漏洞:11 中危漏洞:126 高危漏洞:80 严重漏洞:1

系统OS: amazon 2023.6.20241010 (Amazon Linux) 扫描引擎: Trivy 扫描时间: 2026-01-23 11:53

docker.io/opensearchproject/opensearch:2.17.1 (amazon 2023.6.20241010 (Amazon Linux)) (amazon)
低危漏洞:5 中危漏洞:82 高危漏洞:59 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
expat CVE-2023-52425 高危 2.5.0-1.amzn2023.0.4 2.6.3-1.amzn2023.0.1 expat: parsing large tokens can trigger a denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-02-04 20:15 修改: 2025-11-04 19:16

expat CVE-2024-45490 高危 2.5.0-1.amzn2023.0.4 2.6.3-1.amzn2023.0.1 libexpat: Negative Length Parsing Vulnerability in libexpat

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-08-30 03:15 修改: 2025-11-04 17:16

expat CVE-2025-59375 高危 2.5.0-1.amzn2023.0.4 2.6.3-1.amzn2023.0.3 expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-59375

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-09-15 03:15 修改: 2025-11-04 22:16

glib2 CVE-2025-13601 高危 2.74.7-689.amzn2023.0.2 2.82.2-767.amzn2023 glib: Integer overflow in in g_escape_uri_string()

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13601

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-11-26 15:15 修改: 2025-12-01 15:39

glib2 CVE-2025-14087 高危 2.74.7-689.amzn2023.0.2 2.82.2-769.amzn2023 glib: GLib: Buffer underflow in GVariant parser leads to heap corruption

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14087

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-12-10 09:15 修改: 2025-12-12 15:18

glib2 CVE-2025-3360 高危 2.74.7-689.amzn2023.0.2 2.82.2-766.amzn2023 glibc: GLib prior to 2.82.5 is vulnerable to integer overflow and buffer under-read when parsing a very long invalid ISO 8601 timestamp with g_date_time_new_from_iso8601().

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3360

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-04-07 13:15 修改: 2025-04-14 12:15

glib2 CVE-2025-6052 高危 2.74.7-689.amzn2023.0.2 2.82.2-766.amzn2023 glib: Integer overflow in g_string_maybe_expand() leading to potential buffer overflow in GLib GString

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6052

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-13 16:15 修改: 2025-08-20 17:27

glibc CVE-2025-4802 高危 2.34-52.amzn2023.0.11 2.34-196.amzn2023.0.1 glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4802

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-05-16 20:15 修改: 2025-11-03 20:19

glibc-common CVE-2025-4802 高危 2.34-52.amzn2023.0.11 2.34-196.amzn2023.0.1 glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4802

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-05-16 20:15 修改: 2025-11-03 20:19

glibc-minimal-langpack CVE-2025-4802 高危 2.34-52.amzn2023.0.11 2.34-196.amzn2023.0.1 glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4802

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-05-16 20:15 修改: 2025-11-03 20:19

libarchive CVE-2024-48957 高危 3.7.4-2.amzn2023.0.1 3.7.4-2.amzn2023.0.2 libarchive: Out-of-bounds access in libarchive's archive file handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48957

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-10-10 02:15 修改: 2025-09-29 21:35

libarchive CVE-2024-48958 高危 3.7.4-2.amzn2023.0.1 3.7.4-2.amzn2023.0.2 libarchive: Out-of-bounds access in libarchive's RAR file handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48958

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-10-10 02:15 修改: 2025-11-03 21:16

libarchive CVE-2025-5914 高危 3.7.4-2.amzn2023.0.1 3.7.4-2.amzn2023.0.3 libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5914

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-09 20:15 修改: 2026-01-21 15:16

libcap CVE-2025-1390 高危 2.48-2.amzn2023.0.3 2.48-2.amzn2023.0.4 libcap: pam_cap: Fix potential configuration parsing error

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1390

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-18 03:15 修改: 2025-02-18 03:15

libcap CVE-2025-22874 高危 2.48-2.amzn2023.0.3 2.73-1.amzn2023.0.3 crypto/x509: Usage of ExtKeyUsageAny disables policy validation in crypto/x509

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22874

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-11 17:15 修改: 2025-06-12 16:06

libcap CVE-2025-4673 高危 2.48-2.amzn2023.0.3 2.73-1.amzn2023.0.3 net/http: Sensitive headers not cleared on cross-origin redirect in net/http

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4673

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-11 17:15 修改: 2025-06-12 16:06

libcap CVE-2025-47912 高危 2.48-2.amzn2023.0.3 2.73-1.amzn2023.0.4 net/url: Insufficient validation of bracketed IPv6 hostnames in net/url

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47912

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16

libcap CVE-2025-58183 高危 2.48-2.amzn2023.0.3 2.73-1.amzn2023.0.4 golang: archive/tar: Unbounded allocation when parsing GNU sparse map

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58183

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16

libcap CVE-2025-58185 高危 2.48-2.amzn2023.0.3 2.73-1.amzn2023.0.4 encoding/asn1: Parsing DER payload can cause memory exhaustion in encoding/asn1

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58185

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16

libcap CVE-2025-58186 高危 2.48-2.amzn2023.0.3 2.73-1.amzn2023.0.4 golang.org/net/http: Lack of limit when parsing cookies can cause memory exhaustion in net/http

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58186

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16

libcap CVE-2025-58187 高危 2.48-2.amzn2023.0.3 2.73-1.amzn2023.0.4 crypto/x509: Quadratic complexity when checking name constraints in crypto/x509

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58187

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-10-29 23:16 修改: 2025-11-20 23:15

libcap CVE-2025-58188 高危 2.48-2.amzn2023.0.3 2.73-1.amzn2023.0.4 crypto/x509: golang: Panic when validating certificates with DSA public keys in crypto/x509

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58188

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16

libcap CVE-2025-58189 高危 2.48-2.amzn2023.0.3 2.73-1.amzn2023.0.4 crypto/tls: go crypto/tls ALPN negotiation error contains attacker controlled information

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58189

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16

libcap CVE-2025-61723 高危 2.48-2.amzn2023.0.3 2.73-1.amzn2023.0.4 encoding/pem: Quadratic complexity when parsing some invalid inputs in encoding/pem

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61723

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16

libcap CVE-2025-61724 高危 2.48-2.amzn2023.0.3 2.73-1.amzn2023.0.4 net/textproto: Excessive CPU consumption in Reader.ReadResponse in net/textproto

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61724

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16

libcap CVE-2025-61725 高危 2.48-2.amzn2023.0.3 2.73-1.amzn2023.0.4 net/mail: Excessive CPU consumption in ParseAddress in net/mail

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61725

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-10-29 23:16 修改: 2025-12-09 18:15

libcap CVE-2025-61727 高危 2.48-2.amzn2023.0.3 2.73-1.amzn2023.0.5 golang: crypto/x509: excluded subdomain constraint does not restrict wildcard SANs

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61727

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-12-03 20:16 修改: 2025-12-18 20:15

libcap CVE-2025-61729 高危 2.48-2.amzn2023.0.3 2.73-1.amzn2023.0.5 crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61729

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-12-02 19:15 修改: 2025-12-19 18:25

libxml2 CVE-2022-49043 高危 2.10.4-1.amzn2023.0.6 2.10.4-1.amzn2023.0.8 libxml: use-after-free in xmlXIncludeAddNode

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49043

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-01-26 06:15 修改: 2025-11-03 21:15

libxml2 CVE-2024-56171 高危 2.10.4-1.amzn2023.0.6 2.10.4-1.amzn2023.0.9 libxml2: Use-After-Free in libxml2

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56171

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-18 22:15 修改: 2025-11-03 21:17

libxml2 CVE-2025-24928 高危 2.10.4-1.amzn2023.0.6 2.10.4-1.amzn2023.0.9 libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24928

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-18 23:15 修改: 2025-11-03 22:18

libxml2 CVE-2025-27113 高危 2.10.4-1.amzn2023.0.6 2.10.4-1.amzn2023.0.9 libxml2: NULL Pointer Dereference in libxml2 xmlPatMatch

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-27113

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-18 23:15 修改: 2025-11-03 22:18

libxml2 CVE-2025-49794 高危 2.10.4-1.amzn2023.0.6 2.10.4-1.amzn2023.0.12 libxml: Heap use after free (UAF) leads to Denial of service (DoS)

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-49794

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-16 16:15 修改: 2025-11-22 03:15

libxml2 CVE-2025-49795 高危 2.10.4-1.amzn2023.0.6 2.10.4-1.amzn2023.0.12 libxml: Null pointer dereference leads to Denial of service (DoS)

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-49795

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-16 16:15 修改: 2025-10-27 18:15

libxml2 CVE-2025-49796 高危 2.10.4-1.amzn2023.0.6 2.10.4-1.amzn2023.0.12 libxml: Type confusion leads to Denial of service (DoS)

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-49796

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-16 16:15 修改: 2025-11-22 03:15

libxml2 CVE-2025-6021 高危 2.10.4-1.amzn2023.0.6 2.10.4-1.amzn2023.0.11 libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6021

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-12 13:15 修改: 2025-11-29 01:16

libxml2 CVE-2025-7425 高危 2.10.4-1.amzn2023.0.6 2.10.4-1.amzn2023.0.13 libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7425

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-07-10 14:15 修改: 2025-11-22 03:15

python3 CVE-2023-27043 高危 3.9.16-1.amzn2023.0.9 3.9.20-1.amzn2023.0.2 python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2023-04-19 00:15 修改: 2025-12-17 22:15

python3 CVE-2024-12718 高危 3.9.16-1.amzn2023.0.9 3.9.23-1.amzn2023.0.1 cpython: python: Bypass extraction filter to modify file metadata outside extraction directory

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12718

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-03 13:15 修改: 2025-07-24 16:15

python3 CVE-2024-6232 高危 3.9.16-1.amzn2023.0.9 3.9.20-1.amzn2023.0.2 python: cpython: tarfile: ReDos via excessive backtracking while parsing header values

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-09-03 13:15 修改: 2025-11-03 23:17

python3 CVE-2024-8088 高危 3.9.16-1.amzn2023.0.9 3.9.20-1.amzn2023.0.2 python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-08-22 19:15 修改: 2025-11-03 23:17

python3 CVE-2025-4138 高危 3.9.16-1.amzn2023.0.9 3.9.23-1.amzn2023.0.1 cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4138

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15

python3 CVE-2025-4330 高危 3.9.16-1.amzn2023.0.9 3.9.23-1.amzn2023.0.1 cpython: python: Extraction filter bypass for linking outside extraction directory

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4330

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15

python3 CVE-2025-4435 高危 3.9.16-1.amzn2023.0.9 3.9.23-1.amzn2023.0.1 cpython: Tarfile extracts filtered members when errorlevel=0

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4435

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-03 13:15 修改: 2025-06-04 14:54

python3 CVE-2025-4516 高危 3.9.16-1.amzn2023.0.9 3.9.22-1.amzn2023.0.2 cpython: python: CPython DecodeError Handling Vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4516

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-05-15 14:15 修改: 2025-06-03 14:15

python3 CVE-2025-4517 高危 3.9.16-1.amzn2023.0.9 3.9.23-1.amzn2023.0.1 python: cpython: Arbitrary writes via tarfile realpath overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4517

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15

python3 CVE-2025-8194 高危 3.9.16-1.amzn2023.0.9 3.9.23-1.amzn2023.0.3 cpython: Cpython infinite loop when parsing a tarfile

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8194

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-07-28 19:15 修改: 2025-11-04 22:16

python3-libs CVE-2023-27043 高危 3.9.16-1.amzn2023.0.9 3.9.20-1.amzn2023.0.2 python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2023-04-19 00:15 修改: 2025-12-17 22:15

python3-libs CVE-2024-12718 高危 3.9.16-1.amzn2023.0.9 3.9.23-1.amzn2023.0.1 cpython: python: Bypass extraction filter to modify file metadata outside extraction directory

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12718

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-03 13:15 修改: 2025-07-24 16:15

python3-libs CVE-2024-6232 高危 3.9.16-1.amzn2023.0.9 3.9.20-1.amzn2023.0.2 python: cpython: tarfile: ReDos via excessive backtracking while parsing header values

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-09-03 13:15 修改: 2025-11-03 23:17

python3-libs CVE-2024-8088 高危 3.9.16-1.amzn2023.0.9 3.9.20-1.amzn2023.0.2 python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-08-22 19:15 修改: 2025-11-03 23:17

python3-libs CVE-2025-4138 高危 3.9.16-1.amzn2023.0.9 3.9.23-1.amzn2023.0.1 cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4138

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15

python3-libs CVE-2025-4330 高危 3.9.16-1.amzn2023.0.9 3.9.23-1.amzn2023.0.1 cpython: python: Extraction filter bypass for linking outside extraction directory

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4330

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15

python3-libs CVE-2025-4435 高危 3.9.16-1.amzn2023.0.9 3.9.23-1.amzn2023.0.1 cpython: Tarfile extracts filtered members when errorlevel=0

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4435

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-03 13:15 修改: 2025-06-04 14:54

python3-libs CVE-2025-4516 高危 3.9.16-1.amzn2023.0.9 3.9.22-1.amzn2023.0.2 cpython: python: CPython DecodeError Handling Vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4516

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-05-15 14:15 修改: 2025-06-03 14:15

python3-libs CVE-2025-4517 高危 3.9.16-1.amzn2023.0.9 3.9.23-1.amzn2023.0.1 python: cpython: Arbitrary writes via tarfile realpath overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4517

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-03 13:15 修改: 2025-06-05 14:15

python3-libs CVE-2025-8194 高危 3.9.16-1.amzn2023.0.9 3.9.23-1.amzn2023.0.3 cpython: Cpython infinite loop when parsing a tarfile

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8194

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-07-28 19:15 修改: 2025-11-04 22:16

python3-setuptools-wheel CVE-2025-47273 高危 59.6.0-2.amzn2023.0.5 59.6.0-2.amzn2023.0.6 setuptools: Path Traversal Vulnerability in setuptools PackageIndex

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47273

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-05-17 16:15 修改: 2025-06-12 16:29

sqlite-libs CVE-2022-46908 高危 3.40.0-1.amzn2023.0.4 3.40.0-1.amzn2023.0.5 sqlite: safe mode authorizer callback allows disallowed UDFs

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46908

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2022-12-12 06:15 修改: 2025-05-05 16:15

curl-minimal CVE-2025-10148 中危 8.5.0-1.amzn2023.0.4 8.15.0-4.amzn2023.0.1 curl: predictable WebSocket mask

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10148

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:55

curl-minimal CVE-2025-10966 中危 8.5.0-1.amzn2023.0.4 8.15.0-4.amzn2023.0.1 curl: Curl missing SFTP host verification with wolfSSH backend

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10966

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-11-07 08:15 修改: 2026-01-20 14:57

curl-minimal CVE-2025-11563 中危 8.5.0-1.amzn2023.0.4 8.11.1-4.amzn2023.0.3

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11563

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

curl-minimal CVE-2025-9086 中危 8.5.0-1.amzn2023.0.4 8.15.0-4.amzn2023.0.1 curl: libcurl: Curl out of bounds read for cookie path

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58

glibc CVE-2021-43396 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43396

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2021-11-04 20:15 修改: 2024-11-21 06:29

glibc CVE-2024-33599 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:56

glibc CVE-2024-33600 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:50

glibc CVE-2024-33601 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-05-06 20:15 修改: 2025-08-01 01:56

glibc CVE-2024-33602 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:40

libcurl-minimal CVE-2024-11053 中危 8.5.0-1.amzn2023.0.4 8.15.0-4.amzn2023.0.1 curl: curl netrc password leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-12-11 08:15 修改: 2025-11-03 21:16

libcurl-minimal CVE-2024-9681 中危 8.5.0-1.amzn2023.0.4 8.11.1-4.amzn2023.0.1 curl: HSTS subdomain overwrites parent cache entry

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-11-06 08:15 修改: 2025-11-03 21:18

libcurl-minimal CVE-2025-0167 中危 8.5.0-1.amzn2023.0.4 8.15.0-4.amzn2023.0.1 When asked to use a `.netrc` file for credentials **and** to follow HT ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0167

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-05 10:15 修改: 2025-07-30 19:41

libcurl-minimal CVE-2025-10148 中危 8.5.0-1.amzn2023.0.4 8.15.0-4.amzn2023.0.1 curl: predictable WebSocket mask

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10148

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:55

libcurl-minimal CVE-2025-10966 中危 8.5.0-1.amzn2023.0.4 8.15.0-4.amzn2023.0.1 curl: Curl missing SFTP host verification with wolfSSH backend

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10966

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-11-07 08:15 修改: 2026-01-20 14:57

libcurl-minimal CVE-2025-11563 中危 8.5.0-1.amzn2023.0.4 8.11.1-4.amzn2023.0.3

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11563

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

libcurl-minimal CVE-2025-9086 中危 8.5.0-1.amzn2023.0.4 8.15.0-4.amzn2023.0.1 curl: libcurl: Curl out of bounds read for cookie path

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58

libtasn1 CVE-2024-12133 中危 4.19.0-1.amzn2023.0.4 4.19.0-1.amzn2023.0.5 libtasn1: Inefficient DER Decoding in libtasn1 Leading to Potential Remote DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12133

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-10 16:15 修改: 2025-10-06 02:15

glibc CVE-2025-0395 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: buffer overflow in the GNU C Library's assert()

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0395

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-01-22 13:15 修改: 2025-04-30 05:15

glibc CVE-2025-8058 中危 2.34-52.amzn2023.0.11 2.34-231.amzn2023.0.1 glibc: Double free in glibc

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8058

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-07-23 20:15 修改: 2025-11-04 22:16

elfutils-default-yama-scope CVE-2025-1352 中危 0.188-3.amzn2023.0.2 0.188-3.amzn2023.0.3 elfutils: GNU elfutils eu-readelf libdw_alloc.c __libdw_thread_tail memory corruption

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1352

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-16 15:15 修改: 2025-11-03 20:34

glibc-common CVE-2021-43396 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43396

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2021-11-04 20:15 修改: 2024-11-21 06:29

glibc-common CVE-2024-33599 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:56

glibc-common CVE-2024-33600 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:50

glibc-common CVE-2024-33601 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-05-06 20:15 修改: 2025-08-01 01:56

glibc-common CVE-2024-33602 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:40

glibc-common CVE-2025-0395 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: buffer overflow in the GNU C Library's assert()

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0395

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-01-22 13:15 修改: 2025-04-30 05:15

libxml2 CVE-2024-34459 中危 2.10.4-1.amzn2023.0.6 2.10.4-1.amzn2023.0.7 libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-05-14 15:39 修改: 2025-11-04 22:16

libxml2 CVE-2025-32414 中危 2.10.4-1.amzn2023.0.6 2.10.4-1.amzn2023.0.10 libxml2: Out-of-Bounds Read in libxml2

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32414

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-04-08 03:15 修改: 2025-11-03 20:18

libxml2 CVE-2025-32415 中危 2.10.4-1.amzn2023.0.6 2.10.4-1.amzn2023.0.10 libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32415

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-04-17 17:15 修改: 2025-11-03 20:18

openssl-libs CVE-2024-13176 中危 1:3.0.8-1.amzn2023.0.16 1:3.0.8-1.amzn2023.0.19 openssl: Timing side-channel in ECDSA signature computation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-13176

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-01-20 14:15 修改: 2025-11-03 20:16

openssl-libs CVE-2025-9230 中危 1:3.0.8-1.amzn2023.0.16 1:3.2.2-1.amzn2023.0.2 openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9230

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-09-30 14:15 修改: 2025-11-04 22:16

openssl-libs CVE-2025-9231 中危 1:3.0.8-1.amzn2023.0.16 1:3.2.2-1.amzn2023.0.2 openssl: Timing side-channel in SM2 algorithm on 64 bit ARM

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9231

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-09-30 14:15 修改: 2025-11-04 22:16

glibc-common CVE-2025-8058 中危 2.34-52.amzn2023.0.11 2.34-231.amzn2023.0.1 glibc: Double free in glibc

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8058

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-07-23 20:15 修改: 2025-11-04 22:16

elfutils-default-yama-scope CVE-2025-1372 中危 0.188-3.amzn2023.0.2 0.188-3.amzn2023.0.3 elfutils: GNU elfutils eu-readelf readelf.c print_string_section buffer overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1372

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-17 03:15 修改: 2025-11-04 20:19

glibc-minimal-langpack CVE-2021-43396 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43396

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2021-11-04 20:15 修改: 2024-11-21 06:29

glibc-minimal-langpack CVE-2024-33599 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:56

glibc-minimal-langpack CVE-2024-33600 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:50

glibc-minimal-langpack CVE-2024-33601 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-05-06 20:15 修改: 2025-08-01 01:56

glibc-minimal-langpack CVE-2024-33602 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-05-06 20:15 修改: 2025-06-18 14:40

glibc-minimal-langpack CVE-2025-0395 中危 2.34-52.amzn2023.0.11 2.34-181.amzn2023.0.1 glibc: buffer overflow in the GNU C Library's assert()

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0395

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-01-22 13:15 修改: 2025-04-30 05:15

glibc-minimal-langpack CVE-2025-8058 中危 2.34-52.amzn2023.0.11 2.34-231.amzn2023.0.1 glibc: Double free in glibc

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8058

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-07-23 20:15 修改: 2025-11-04 22:16

krb5-libs CVE-2025-24528 中危 1.21.3-1.amzn2023.0.1 1.21.3-6.amzn2023.0.1 krb5: overflow when calculating ulog block size

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24528

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2026-01-16 18:16 修改: 2026-01-16 19:16

python3 CVE-2007-4559 中危 3.9.16-1.amzn2023.0.9 3.9.20-1.amzn2023.0.2 python: tarfile module directory traversal

漏洞详情: https://avd.aquasec.com/nvd/cve-2007-4559

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2007-08-28 01:17 修改: 2025-04-09 00:30

python3 CVE-2024-11168 中危 3.9.16-1.amzn2023.0.9 3.9.21-1.amzn2023.0.1 python: Improper validation of IPv6 and IPvFuture addresses

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-11-12 22:15 修改: 2025-11-03 22:16

python3 CVE-2024-4032 中危 3.9.16-1.amzn2023.0.9 3.9.20-1.amzn2023.0.2 python: incorrect IPv4 and IPv6 private ranges

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-06-17 15:15 修改: 2025-11-03 22:18

python3 CVE-2024-6923 中危 3.9.16-1.amzn2023.0.9 3.9.20-1.amzn2023.0.2 cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-08-01 14:15 修改: 2025-11-03 23:17

python3 CVE-2024-7592 中危 3.9.16-1.amzn2023.0.9 3.9.20-1.amzn2023.0.2 cpython: python: Uncontrolled CPU resource consumption when in http.cookies module

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-08-19 19:15 修改: 2025-11-03 23:17

python3 CVE-2024-9287 中危 3.9.16-1.amzn2023.0.9 3.9.21-1.amzn2023.0.1 python: Virtual environment (venv) activation scripts don't quote paths

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-10-22 17:15 修改: 2025-11-03 23:17

python3 CVE-2025-0938 中危 3.9.16-1.amzn2023.0.9 3.9.21-1.amzn2023.0.2 python: cpython: URL parser allowed square brackets in domain names

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0938

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-01-31 18:15 修改: 2025-11-03 21:18

python3 CVE-2025-12084 中危 3.9.16-1.amzn2023.0.9 3.9.25-1.amzn2023.0.2 cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-12084

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-12-03 19:15 修改: 2026-01-14 19:16

python3 CVE-2025-13837 中危 3.9.16-1.amzn2023.0.9 3.9.25-1.amzn2023.0.2 cpython: Out-of-memory when loading Plist

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13837

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-12-01 18:16 修改: 2026-01-15 19:08

python3 CVE-2025-6069 中危 3.9.16-1.amzn2023.0.9 3.9.23-1.amzn2023.0.2 cpython: Python HTMLParser quadratic complexity

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6069

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-17 14:15 修改: 2025-07-07 18:15

python3 CVE-2025-8291 中危 3.9.16-1.amzn2023.0.9 3.9.24-1.amzn2023.0.3 cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8291

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-10-07 18:16 修改: 2025-10-29 16:15

krb5-libs CVE-2025-3576 中危 1.21.3-1.amzn2023.0.1 1.21.3-6.amzn2023.0.1 krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3576

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-04-15 06:15 修改: 2025-09-02 10:15

elfutils-libelf CVE-2025-1352 中危 0.188-3.amzn2023.0.2 0.188-3.amzn2023.0.3 elfutils: GNU elfutils eu-readelf libdw_alloc.c __libdw_thread_tail memory corruption

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1352

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-16 15:15 修改: 2025-11-03 20:34

elfutils-libelf CVE-2025-1372 中危 0.188-3.amzn2023.0.2 0.188-3.amzn2023.0.3 elfutils: GNU elfutils eu-readelf readelf.c print_string_section buffer overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1372

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-17 03:15 修改: 2025-11-04 20:19

elfutils-libs CVE-2025-1352 中危 0.188-3.amzn2023.0.2 0.188-3.amzn2023.0.3 elfutils: GNU elfutils eu-readelf libdw_alloc.c __libdw_thread_tail memory corruption

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1352

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-16 15:15 修改: 2025-11-03 20:34

libarchive CVE-2025-5915 中危 3.7.4-2.amzn2023.0.1 3.7.4-2.amzn2023.0.4 libarchive: Heap buffer over read in copy_from_lzss_window() at archive_read_support_format_rar.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5915

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-09 20:15 修改: 2026-01-08 04:15

libarchive CVE-2025-5917 中危 3.7.4-2.amzn2023.0.1 3.7.4-2.amzn2023.0.4 libarchive: Off by one error in build_ustar_entry_name() at archive_write_set_format_pax.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5917

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-09 20:15 修改: 2025-12-12 01:15

elfutils-libs CVE-2025-1372 中危 0.188-3.amzn2023.0.2 0.188-3.amzn2023.0.3 elfutils: GNU elfutils eu-readelf readelf.c print_string_section buffer overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1372

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-17 03:15 修改: 2025-11-04 20:19

coreutils-single CVE-2025-5278 中危 8.32-30.amzn2023.0.3 8.32-30.amzn2023.0.4 coreutils: Heap Buffer Under-Read in GNU Coreutils sort via Key Specification

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5278

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-05-27 21:15 修改: 2025-10-22 20:15

curl-minimal CVE-2024-11053 中危 8.5.0-1.amzn2023.0.4 8.15.0-4.amzn2023.0.1 curl: curl netrc password leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-12-11 08:15 修改: 2025-11-03 21:16

curl-minimal CVE-2024-9681 中危 8.5.0-1.amzn2023.0.4 8.11.1-4.amzn2023.0.1 curl: HSTS subdomain overwrites parent cache entry

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-11-06 08:15 修改: 2025-11-03 21:18

python3-libs CVE-2007-4559 中危 3.9.16-1.amzn2023.0.9 3.9.20-1.amzn2023.0.2 python: tarfile module directory traversal

漏洞详情: https://avd.aquasec.com/nvd/cve-2007-4559

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2007-08-28 01:17 修改: 2025-04-09 00:30

python3-libs CVE-2024-11168 中危 3.9.16-1.amzn2023.0.9 3.9.21-1.amzn2023.0.1 python: Improper validation of IPv6 and IPvFuture addresses

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-11-12 22:15 修改: 2025-11-03 22:16

python3-libs CVE-2024-4032 中危 3.9.16-1.amzn2023.0.9 3.9.20-1.amzn2023.0.2 python: incorrect IPv4 and IPv6 private ranges

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-06-17 15:15 修改: 2025-11-03 22:18

python3-libs CVE-2024-6923 中危 3.9.16-1.amzn2023.0.9 3.9.20-1.amzn2023.0.2 cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-08-01 14:15 修改: 2025-11-03 23:17

python3-libs CVE-2024-7592 中危 3.9.16-1.amzn2023.0.9 3.9.20-1.amzn2023.0.2 cpython: python: Uncontrolled CPU resource consumption when in http.cookies module

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-08-19 19:15 修改: 2025-11-03 23:17

python3-libs CVE-2024-9287 中危 3.9.16-1.amzn2023.0.9 3.9.21-1.amzn2023.0.1 python: Virtual environment (venv) activation scripts don't quote paths

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-10-22 17:15 修改: 2025-11-03 23:17

python3-libs CVE-2025-0938 中危 3.9.16-1.amzn2023.0.9 3.9.21-1.amzn2023.0.2 python: cpython: URL parser allowed square brackets in domain names

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0938

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-01-31 18:15 修改: 2025-11-03 21:18

python3-libs CVE-2025-12084 中危 3.9.16-1.amzn2023.0.9 3.9.25-1.amzn2023.0.2 cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-12084

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-12-03 19:15 修改: 2026-01-14 19:16

python3-libs CVE-2025-13837 中危 3.9.16-1.amzn2023.0.9 3.9.25-1.amzn2023.0.2 cpython: Out-of-memory when loading Plist

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13837

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-12-01 18:16 修改: 2026-01-15 19:08

python3-libs CVE-2025-6069 中危 3.9.16-1.amzn2023.0.9 3.9.23-1.amzn2023.0.2 cpython: Python HTMLParser quadratic complexity

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6069

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-17 14:15 修改: 2025-07-07 18:15

python3-libs CVE-2025-8291 中危 3.9.16-1.amzn2023.0.9 3.9.24-1.amzn2023.0.3 cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8291

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-10-07 18:16 修改: 2025-10-29 16:15

python3-pip-wheel CVE-2007-4559 中危 21.3.1-2.amzn2023.0.8 21.3.1-2.amzn2023.0.11 python: tarfile module directory traversal

漏洞详情: https://avd.aquasec.com/nvd/cve-2007-4559

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2007-08-28 01:17 修改: 2025-04-09 00:30

python3-pip-wheel CVE-2024-35195 中危 21.3.1-2.amzn2023.0.8 21.3.1-2.amzn2023.0.10 requests: subsequent requests to the same host ignore cert verification

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35195

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-05-20 21:15 修改: 2024-11-21 09:19

python3-pip-wheel CVE-2024-3651 中危 21.3.1-2.amzn2023.0.8 21.3.1-2.amzn2023.0.9 python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-07-07 18:15 修改: 2025-11-04 22:16

python3-pip-wheel CVE-2025-50181 中危 21.3.1-2.amzn2023.0.8 21.3.1-2.amzn2023.0.13 urllib3: urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-50181

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-06-19 01:15 修改: 2025-12-22 19:15

python3-pip-wheel CVE-2025-8869 中危 21.3.1-2.amzn2023.0.8 21.3.1-2.amzn2023.0.14 pip: pip missing checks on symbolic link extraction

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8869

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-09-24 15:15 修改: 2025-11-03 18:17

expat CVE-2024-50602 中危 2.5.0-1.amzn2023.0.4 2.6.3-1.amzn2023.0.2 libexpat: expat: DoS via XML_ResumeParser

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2024-10-27 05:15 修改: 2025-10-15 17:54

curl-minimal CVE-2025-0167 中危 8.5.0-1.amzn2023.0.4 8.15.0-4.amzn2023.0.1 When asked to use a `.netrc` file for credentials **and** to follow HT ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0167

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-05 10:15 修改: 2025-07-30 19:41

sqlite-libs CVE-2025-6965 中危 3.40.0-1.amzn2023.0.4 3.40.0-1.amzn2023.0.6 sqlite: Integer Truncation in SQLite

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6965

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-07-15 14:15 修改: 2025-11-04 22:16

python3-libs CVE-2025-1795 低危 3.9.16-1.amzn2023.0.9 3.9.21-1.amzn2023.0.3 python: Mishandling of comma during folding and unicode-encoding of email headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1795

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-28 19:15 修改: 2025-11-03 21:18

python3-libs CVE-2025-6075 低危 3.9.16-1.amzn2023.0.9 3.9.25-1.amzn2023.0.1 python: Quadratic complexity in os.path.expandvars() with user-controlled template

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6075

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-10-31 17:15 修改: 2025-12-01 19:15

gnupg2-minimal CVE-2025-30258 低危 2.3.7-1.amzn2023.0.4 2.3.7-1.amzn2023.0.5 gnupg: verification DoS due to a malicious subkey in the keyring

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-30258

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-03-19 20:15 修改: 2025-10-16 16:53

python3 CVE-2025-1795 低危 3.9.16-1.amzn2023.0.9 3.9.21-1.amzn2023.0.3 python: Mishandling of comma during folding and unicode-encoding of email headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1795

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-02-28 19:15 修改: 2025-11-03 21:18

python3 CVE-2025-6075 低危 3.9.16-1.amzn2023.0.9 3.9.25-1.amzn2023.0.1 python: Quadratic complexity in os.path.expandvars() with user-controlled template

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6075

镜像层: sha256:2e2bb084042e0fc1a9cb957f7b58ec85c216817ccb6ba6e4169b32ed001f0057

发布日期: 2025-10-31 17:15 修改: 2025-12-01 19:15

Java (jar)
低危漏洞:6 中危漏洞:44 高危漏洞:21 严重漏洞:1
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
ai.djl:api CVE-2025-0851 严重 0.28.0 0.31.1 Deep Java Library path traversal issue

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0851

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-01-29 22:15 修改: 2025-10-14 19:15

com.google.protobuf:protobuf-java CVE-2024-7254 高危 3.22.1 3.25.5, 4.27.5, 4.28.2 protobuf: StackOverflow vulnerability in Protocol Buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2024-09-19 01:15 修改: 2025-09-26 17:10

com.google.protobuf:protobuf-java CVE-2024-7254 高危 3.22.1 3.25.5, 4.27.5, 4.28.2 protobuf: StackOverflow vulnerability in Protocol Buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2024-09-19 01:15 修改: 2025-09-26 17:10

commons-beanutils:commons-beanutils CVE-2025-48734 高危 1.9.4 1.11.0 commons-beanutils: Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum's declaredClass property by default

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48734

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-05-28 14:15 修改: 2025-11-03 20:19

commons-beanutils:commons-beanutils CVE-2025-48734 高危 1.9.4 1.11.0 commons-beanutils: Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum's declaredClass property by default

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48734

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-05-28 14:15 修改: 2025-11-03 20:19

commons-beanutils:commons-beanutils CVE-2025-48734 高危 1.9.4 1.11.0 commons-beanutils: Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum's declaredClass property by default

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48734

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-05-28 14:15 修改: 2025-11-03 20:19

commons-io:commons-io CVE-2024-47554 高危 2.7 2.14.0 apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2024-10-03 12:15 修改: 2025-07-10 21:10

commons-io:commons-io CVE-2024-47554 高危 2.8.0 2.14.0 apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2024-10-03 12:15 修改: 2025-07-10 21:10

io.netty:netty-codec-http2 CVE-2025-55163 高危 4.1.108.Final 4.2.4.Final, 4.1.124.Final netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-55163

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-08-13 15:15 修改: 2025-11-04 22:16

io.netty:netty-codec-http2 CVE-2025-55163 高危 4.1.108.Final 4.2.4.Final, 4.1.124.Final netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-55163

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-08-13 15:15 修改: 2025-11-04 22:16

io.netty:netty-codec-http2 CVE-2025-55163 高危 4.1.112.Final 4.2.4.Final, 4.1.124.Final netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-55163

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-08-13 15:15 修改: 2025-11-04 22:16

io.netty:netty-codec-http2 CVE-2025-55163 高危 4.1.112.Final 4.2.4.Final, 4.1.124.Final netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-55163

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-08-13 15:15 修改: 2025-11-04 22:16

io.netty:netty-handler CVE-2025-24970 高危 4.1.108.Final 4.1.118.Final io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24970

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-02-10 22:15 修改: 2025-09-05 17:20

io.netty:netty-handler CVE-2025-24970 高危 4.1.108.Final 4.1.118.Final io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24970

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-02-10 22:15 修改: 2025-09-05 17:20

io.netty:netty-handler CVE-2025-24970 高危 4.1.112.Final 4.1.118.Final io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24970

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-02-10 22:15 修改: 2025-09-05 17:20

io.netty:netty-handler CVE-2025-24970 高危 4.1.112.Final 4.1.118.Final io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24970

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-02-10 22:15 修改: 2025-09-05 17:20

io.netty:netty-handler CVE-2025-24970 高危 4.1.112.Final 4.1.118.Final io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24970

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-02-10 22:15 修改: 2025-09-05 17:20

io.netty:netty-handler CVE-2025-24970 高危 4.1.112.Final 4.1.118.Final io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-24970

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-02-10 22:15 修改: 2025-09-05 17:20

net.minidev:json-smart CVE-2024-57699 高危 2.5.0 2.5.2 json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57699

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-02-05 22:15 修改: 2025-02-06 16:15

org.lz4:lz4-java CVE-2025-12183 高危 1.8.0 1.8.1 lz4-java: lz4-java: Out-of-bounds memory operations lead to denial of service and information disclosure

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-12183

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-11-28 16:15 修改: 2025-12-29 13:15

org.lz4:lz4-java CVE-2025-66566 高危 1.8.0 lz4-java: lz4-java: Information Disclosure via Insufficient Output Buffer Clearing

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66566

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-12-05 18:15 修改: 2025-12-08 18:26

org.opensearch:opensearch-common CVE-2025-9624 高危 2.17.1 3.3.0, 2.19.4 OpenSearch is vulnerable to DoS via complex query_string inputs

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9624

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-11-25 20:16 修改: 2025-12-15 14:15

io.netty:netty-codec-http CVE-2025-67735 中危 4.1.112.Final 4.2.8.Final, 4.1.129.Final netty-codec-http: Netty (netty-codec-http): Request Smuggling via CRLF Injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-67735

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-12-16 01:15 修改: 2026-01-02 18:50

com.nimbusds:nimbus-jose-jwt CVE-2025-53864 中危 9.40 10.0.2, 9.37.4 com.nimbusds/nimbus-jose-jwt: Uncontrolled recursion in Connect2id Nimbus JOSE + JWT

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-53864

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-07-11 03:16 修改: 2025-09-23 19:15

commons-lang:commons-lang CVE-2025-48924 中危 2.6 commons-lang/commons-lang: org.apache.commons/commons-lang3: Uncontrolled Recursion vulnerability in Apache Commons Lang

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48924

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-07-11 15:15 修改: 2025-11-04 22:16

commons-lang:commons-lang CVE-2025-48924 中危 2.6 commons-lang/commons-lang: org.apache.commons/commons-lang3: Uncontrolled Recursion vulnerability in Apache Commons Lang

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48924

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-07-11 15:15 修改: 2025-11-04 22:16

io.netty:netty-codec CVE-2025-58057 中危 4.1.108.Final 4.1.125.Final netty-codec: netty-codec-compression: Netty's BrotliDecoder is vulnerable to DoS via zip bomb style attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58057

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-09-04 10:42 修改: 2025-09-08 16:45

io.netty:netty-common CVE-2024-47535 中危 4.1.108.Final 4.1.115.Final netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2024-11-12 16:15 修改: 2025-09-05 14:00

io.netty:netty-common CVE-2024-47535 中危 4.1.108.Final 4.1.115.Final netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2024-11-12 16:15 修改: 2025-09-05 14:00

io.netty:netty-common CVE-2025-25193 中危 4.1.108.Final 4.1.118.Final netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-25193

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-02-10 22:15 修改: 2025-06-11 15:36

io.netty:netty-common CVE-2025-25193 中危 4.1.108.Final 4.1.118.Final netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-25193

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-02-10 22:15 修改: 2025-06-11 15:36

io.netty:netty-common CVE-2024-47535 中危 4.1.112.Final 4.1.115.Final netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2024-11-12 16:15 修改: 2025-09-05 14:00

io.netty:netty-common CVE-2024-47535 中危 4.1.112.Final 4.1.115.Final netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2024-11-12 16:15 修改: 2025-09-05 14:00

io.netty:netty-common CVE-2024-47535 中危 4.1.112.Final 4.1.115.Final netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2024-11-12 16:15 修改: 2025-09-05 14:00

io.netty:netty-common CVE-2024-47535 中危 4.1.112.Final 4.1.115.Final netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2024-11-12 16:15 修改: 2025-09-05 14:00

io.netty:netty-common CVE-2025-25193 中危 4.1.112.Final 4.1.118.Final netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-25193

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-02-10 22:15 修改: 2025-06-11 15:36

io.netty:netty-common CVE-2025-25193 中危 4.1.112.Final 4.1.118.Final netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-25193

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-02-10 22:15 修改: 2025-06-11 15:36

io.netty:netty-common CVE-2025-25193 中危 4.1.112.Final 4.1.118.Final netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-25193

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-02-10 22:15 修改: 2025-06-11 15:36

io.netty:netty-common CVE-2025-25193 中危 4.1.112.Final 4.1.118.Final netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-25193

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-02-10 22:15 修改: 2025-06-11 15:36

io.netty:netty-codec CVE-2025-58057 中危 4.1.108.Final 4.1.125.Final netty-codec: netty-codec-compression: Netty's BrotliDecoder is vulnerable to DoS via zip bomb style attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58057

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-09-04 10:42 修改: 2025-09-08 16:45

io.netty:netty-codec CVE-2025-58057 中危 4.1.112.Final 4.1.125.Final netty-codec: netty-codec-compression: Netty's BrotliDecoder is vulnerable to DoS via zip bomb style attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58057

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-09-04 10:42 修改: 2025-09-08 16:45

io.netty:netty-codec CVE-2025-58057 中危 4.1.112.Final 4.1.125.Final netty-codec: netty-codec-compression: Netty's BrotliDecoder is vulnerable to DoS via zip bomb style attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58057

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-09-04 10:42 修改: 2025-09-08 16:45

io.netty:netty-codec CVE-2025-58057 中危 4.1.112.Final 4.1.125.Final netty-codec: netty-codec-compression: Netty's BrotliDecoder is vulnerable to DoS via zip bomb style attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58057

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-09-04 10:42 修改: 2025-09-08 16:45

io.netty:netty-codec CVE-2025-58057 中危 4.1.112.Final 4.1.125.Final netty-codec: netty-codec-compression: Netty's BrotliDecoder is vulnerable to DoS via zip bomb style attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58057

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-09-04 10:42 修改: 2025-09-08 16:45

io.netty:netty-codec-http CVE-2025-67735 中危 4.1.108.Final 4.2.8.Final, 4.1.129.Final netty-codec-http: Netty (netty-codec-http): Request Smuggling via CRLF Injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-67735

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-12-16 01:15 修改: 2026-01-02 18:50

io.netty:netty-codec-http CVE-2025-67735 中危 4.1.108.Final 4.2.8.Final, 4.1.129.Final netty-codec-http: Netty (netty-codec-http): Request Smuggling via CRLF Injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-67735

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-12-16 01:15 修改: 2026-01-02 18:50

org.apache.commons:commons-lang3 CVE-2025-48924 中危 3.10 3.18.0 commons-lang/commons-lang: org.apache.commons/commons-lang3: Uncontrolled Recursion vulnerability in Apache Commons Lang

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48924

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-07-11 15:15 修改: 2025-11-04 22:16

org.apache.commons:commons-lang3 CVE-2025-48924 中危 3.12.0 3.18.0 commons-lang/commons-lang: org.apache.commons/commons-lang3: Uncontrolled Recursion vulnerability in Apache Commons Lang

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48924

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-07-11 15:15 修改: 2025-11-04 22:16

org.apache.commons:commons-lang3 CVE-2025-48924 中危 3.13.0 3.18.0 commons-lang/commons-lang: org.apache.commons/commons-lang3: Uncontrolled Recursion vulnerability in Apache Commons Lang

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48924

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-07-11 15:15 修改: 2025-11-04 22:16

org.apache.commons:commons-lang3 CVE-2025-48924 中危 3.13.0 3.18.0 commons-lang/commons-lang: org.apache.commons/commons-lang3: Uncontrolled Recursion vulnerability in Apache Commons Lang

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48924

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-07-11 15:15 修改: 2025-11-04 22:16

org.apache.commons:commons-lang3 CVE-2025-48924 中危 3.14.0 3.18.0 commons-lang/commons-lang: org.apache.commons/commons-lang3: Uncontrolled Recursion vulnerability in Apache Commons Lang

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48924

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-07-11 15:15 修改: 2025-11-04 22:16

org.apache.commons:commons-lang3 CVE-2025-48924 中危 3.14.0 3.18.0 commons-lang/commons-lang: org.apache.commons/commons-lang3: Uncontrolled Recursion vulnerability in Apache Commons Lang

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48924

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-07-11 15:15 修改: 2025-11-04 22:16

org.apache.commons:commons-lang3 CVE-2025-48924 中危 3.14.0 3.18.0 commons-lang/commons-lang: org.apache.commons/commons-lang3: Uncontrolled Recursion vulnerability in Apache Commons Lang

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48924

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-07-11 15:15 修改: 2025-11-04 22:16

org.apache.commons:commons-lang3 CVE-2025-48924 中危 3.14.0 3.18.0 commons-lang/commons-lang: org.apache.commons/commons-lang3: Uncontrolled Recursion vulnerability in Apache Commons Lang

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48924

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-07-11 15:15 修改: 2025-11-04 22:16

org.apache.commons:commons-lang3 CVE-2025-48924 中危 3.14.0 3.18.0 commons-lang/commons-lang: org.apache.commons/commons-lang3: Uncontrolled Recursion vulnerability in Apache Commons Lang

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48924

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-07-11 15:15 修改: 2025-11-04 22:16

org.apache.commons:commons-lang3 CVE-2025-48924 中危 3.16.0 3.18.0 commons-lang/commons-lang: org.apache.commons/commons-lang3: Uncontrolled Recursion vulnerability in Apache Commons Lang

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-48924

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-07-11 15:15 修改: 2025-11-04 22:16

org.apache.kafka:kafka-clients CVE-2025-27817 中危 3.7.1 3.9.1 org.apache.kafka: Kafka Client Arbitrary File Read SSRF

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-27817

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-06-10 08:15 修改: 2025-07-11 16:58

org.apache.logging.log4j:log4j-core CVE-2025-68161 中危 2.21.0 2.25.3 Apache Log4j: Apache Log4j Core: Missing TLS hostname verification in Socket appender

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68161

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-12-18 21:15 修改: 2026-01-20 01:15

org.apache.logging.log4j:log4j-core CVE-2025-68161 中危 2.21.0 2.25.3 Apache Log4j: Apache Log4j Core: Missing TLS hostname verification in Socket appender

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68161

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-12-18 21:15 修改: 2026-01-20 01:15

org.bouncycastle:bc-fips CVE-2025-8885 中危 2.0.0 1.0.2.6, 2.0.1 bouncycastle: Bouncy Castle denial of service parsing ASN.1 Object Identifiers

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8885

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-08-12 10:15 修改: 2025-09-12 12:15

org.bouncycastle:bcpkix-jdk15to18 CVE-2025-8916 中危 1.78.1 1.79 org.bouncycastle: BouncyCastle denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8916

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-08-13 10:15 修改: 2025-09-12 12:15

org.bouncycastle:bcpkix-jdk18on CVE-2025-8916 中危 1.78 1.79 org.bouncycastle: BouncyCastle denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8916

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-08-13 10:15 修改: 2025-09-12 12:15

org.bouncycastle:bcpkix-jdk18on CVE-2025-8916 中危 1.78.1 1.79 org.bouncycastle: BouncyCastle denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8916

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-08-13 10:15 修改: 2025-09-12 12:15

io.netty:netty-codec-http CVE-2025-67735 中危 4.1.112.Final 4.2.8.Final, 4.1.129.Final netty-codec-http: Netty (netty-codec-http): Request Smuggling via CRLF Injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-67735

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-12-16 01:15 修改: 2026-01-02 18:50

io.netty:netty-codec-http CVE-2025-67735 中危 4.1.112.Final 4.2.8.Final, 4.1.129.Final netty-codec-http: Netty (netty-codec-http): Request Smuggling via CRLF Injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-67735

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-12-16 01:15 修改: 2026-01-02 18:50

io.netty:netty-codec-http CVE-2025-67735 中危 4.1.112.Final 4.2.8.Final, 4.1.129.Final netty-codec-http: Netty (netty-codec-http): Request Smuggling via CRLF Injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-67735

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-12-16 01:15 修改: 2026-01-02 18:50

io.netty:netty-codec-http CVE-2025-58056 低危 4.1.108.Final 4.1.125.Final, 4.2.5.Final netty-codec-http: Netty is vulnerable to request smuggling due to incorrect parsing of chunk extensions

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58056

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-09-03 21:15 修改: 2025-09-08 16:46

io.netty:netty-codec-http CVE-2025-58056 低危 4.1.112.Final 4.1.125.Final, 4.2.5.Final netty-codec-http: Netty is vulnerable to request smuggling due to incorrect parsing of chunk extensions

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58056

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-09-03 21:15 修改: 2025-09-08 16:46

io.netty:netty-codec-http CVE-2025-58056 低危 4.1.112.Final 4.1.125.Final, 4.2.5.Final netty-codec-http: Netty is vulnerable to request smuggling due to incorrect parsing of chunk extensions

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58056

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-09-03 21:15 修改: 2025-09-08 16:46

io.netty:netty-codec-http CVE-2025-58056 低危 4.1.112.Final 4.1.125.Final, 4.2.5.Final netty-codec-http: Netty is vulnerable to request smuggling due to incorrect parsing of chunk extensions

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58056

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-09-03 21:15 修改: 2025-09-08 16:46

io.netty:netty-codec-http CVE-2025-58056 低危 4.1.112.Final 4.1.125.Final, 4.2.5.Final netty-codec-http: Netty is vulnerable to request smuggling due to incorrect parsing of chunk extensions

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58056

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-09-03 21:15 修改: 2025-09-08 16:46

io.netty:netty-codec-http CVE-2025-58056 低危 4.1.108.Final 4.1.125.Final, 4.2.5.Final netty-codec-http: Netty is vulnerable to request smuggling due to incorrect parsing of chunk extensions

漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58056

镜像层: sha256:26d2b17ed9084e45348b2dceb6ecd5d074bfdadc48b6753c8662fa743feea4cc

发布日期: 2025-09-03 21:15 修改: 2025-09-08 16:46