docker.io/qianmoq/datacap:latest linux/amd64

docker.io/qianmoq/datacap:latest - Trivy安全扫描结果 扫描时间: 2024-12-02 14:16
全部漏洞信息
低危漏洞:40 中危漏洞:43 高危漏洞:16 严重漏洞:7

系统OS: ubuntu 20.04 扫描引擎: Trivy 扫描时间: 2024-12-02 14:16

docker.io/qianmoq/datacap:latest (ubuntu 20.04) (ubuntu)
低危漏洞:40 中危漏洞:29 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
curl CVE-2024-7264 中危 7.68.0-1ubuntu2.22 7.68.0-1ubuntu2.23 curl: libcurl: ASN.1 date parser overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-07-31 08:15 修改: 2024-10-30 20:35

curl CVE-2024-8096 中危 7.68.0-1ubuntu2.22 7.68.0-1ubuntu2.24 curl: OCSP stapling bypass with GnuTLS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26

libcurl4 CVE-2024-7264 中危 7.68.0-1ubuntu2.22 7.68.0-1ubuntu2.23 curl: libcurl: ASN.1 date parser overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-07-31 08:15 修改: 2024-10-30 20:35

libcurl4 CVE-2024-8096 中危 7.68.0-1ubuntu2.22 7.68.0-1ubuntu2.24 curl: OCSP stapling bypass with GnuTLS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26

libexpat1 CVE-2024-45490 中危 2.2.9-1ubuntu0.6 2.2.9-1ubuntu0.7 libexpat: Negative Length Parsing Vulnerability in libexpat

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24

libexpat1 CVE-2024-45491 中危 2.2.9-1ubuntu0.6 2.2.9-1ubuntu0.7 libexpat: Integer Overflow or Wraparound

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

libexpat1 CVE-2024-45492 中危 2.2.9-1ubuntu0.6 2.2.9-1ubuntu0.7 libexpat: integer overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

libgssapi-krb5-2 CVE-2024-26462 中危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libgssapi-krb5-2 CVE-2024-37370 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48

libgssapi-krb5-2 CVE-2024-37371 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39

libk5crypto3 CVE-2024-26462 中危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libk5crypto3 CVE-2024-37370 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48

libk5crypto3 CVE-2024-37371 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39

libkrb5-3 CVE-2024-26462 中危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkrb5-3 CVE-2024-37370 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48

libkrb5-3 CVE-2024-37371 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39

libkrb5support0 CVE-2024-26462 中危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkrb5support0 CVE-2024-37370 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48

libkrb5support0 CVE-2024-37371 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39

libpam-modules CVE-2024-10041 中危 1.3.1-5ubuntu4.7 pam: libpam: Libpam vulnerable to read hashed password

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2024-10-23 14:15 修改: 2024-11-25 00:15

libpam-modules CVE-2024-10963 中危 1.3.1-5ubuntu4.7 pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15

libpam-modules-bin CVE-2024-10041 中危 1.3.1-5ubuntu4.7 pam: libpam: Libpam vulnerable to read hashed password

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2024-10-23 14:15 修改: 2024-11-25 00:15

libpam-modules-bin CVE-2024-10963 中危 1.3.1-5ubuntu4.7 pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15

libpam-runtime CVE-2024-10041 中危 1.3.1-5ubuntu4.7 pam: libpam: Libpam vulnerable to read hashed password

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2024-10-23 14:15 修改: 2024-11-25 00:15

libpam-runtime CVE-2024-10963 中危 1.3.1-5ubuntu4.7 pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15

libpam0g CVE-2024-10041 中危 1.3.1-5ubuntu4.7 pam: libpam: Libpam vulnerable to read hashed password

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2024-10-23 14:15 修改: 2024-11-25 00:15

libpam0g CVE-2024-10963 中危 1.3.1-5ubuntu4.7 pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15

wget CVE-2021-31879 中危 1.20.3-1ubuntu2 wget: authorization header disclosure on redirect

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31879

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2021-04-29 05:15 修改: 2022-05-13 20:52

wget CVE-2024-38428 中危 1.20.3-1ubuntu2 1.20.3-1ubuntu2.1 wget: Misinterpretation of input may lead to improper behavior

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38428

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-06-16 03:15 修改: 2024-10-28 21:35

libgcrypt20 CVE-2024-2236 低危 1.8.5-5ubuntu1.1 libgcrypt: vulnerable to Marvin Attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2236

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2024-03-06 22:15 修改: 2024-11-12 18:15

libkrb5support0 CVE-2024-26458 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkrb5support0 CVE-2024-26461 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

libncurses6 CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15

libncurses6 CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libncursesw6 CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15

libncursesw6 CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

gpgv CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

libk5crypto3 CVE-2024-26458 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libk5crypto3 CVE-2024-26461 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

libc-bin CVE-2016-20013 低危 2.31-0ubuntu9.16

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-20013

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2022-02-19 05:15 修改: 2022-03-03 16:43

libc6 CVE-2016-20013 低危 2.31-0ubuntu9.16

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-20013

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2022-02-19 05:15 修改: 2022-03-03 16:43

libgssapi-krb5-2 CVE-2024-26458 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkrb5-3 CVE-2024-26458 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkrb5-3 CVE-2024-26461 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

libpcre2-8-0 CVE-2022-41409 低危 10.34-7ubuntu0.1 pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2023-07-18 14:15 修改: 2023-07-27 03:46

libpcre3 CVE-2017-11164 低危 2:8.39-12ubuntu0.1 pcre: OP_KETRMAX feature in the match function in pcre_exec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38

libssl1.1 CVE-2024-2511 低危 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23 openssl: Unbounded memory growth with session handling in TLSv1.3

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15

libssl1.1 CVE-2024-4741 低危 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23 openssl: Use After Free with SSL_free_buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01

libssl1.1 CVE-2024-5535 低危 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23 openssl: SSL_select_next_proto buffer overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15

libsystemd0 CVE-2023-26604 低危 245.4-4ubuntu3.23 systemd: privilege escalation via the less pager

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26604

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2023-03-03 16:15 修改: 2023-11-07 04:09

libsystemd0 CVE-2023-7008 低危 245.4-4ubuntu3.23 systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15

libtinfo6 CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15

libtinfo6 CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libudev1 CVE-2023-26604 低危 245.4-4ubuntu3.23 systemd: privilege escalation via the less pager

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26604

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2023-03-03 16:15 修改: 2023-11-07 04:09

libudev1 CVE-2023-7008 低危 245.4-4ubuntu3.23 systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15

locales CVE-2016-20013 低危 2.31-0ubuntu9.16

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-20013

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2022-02-19 05:15 修改: 2022-03-03 16:43

login CVE-2013-4235 低危 1:4.8.1-1ubuntu5.20.04.5 shadow-utils: TOCTOU race conditions by copying and removing directory trees

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4235

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2019-12-03 15:15 修改: 2023-02-13 00:28

login CVE-2023-29383 低危 1:4.8.1-1ubuntu5.20.04.5 shadow: Improper input validation in shadow-utils package utility chfn

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05

ncurses-base CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15

ncurses-base CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

ncurses-bin CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15

ncurses-bin CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

openssl CVE-2024-2511 低危 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23 openssl: Unbounded memory growth with session handling in TLSv1.3

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15

openssl CVE-2024-4741 低危 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23 openssl: Use After Free with SSL_free_buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01

openssl CVE-2024-5535 低危 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23 openssl: SSL_select_next_proto buffer overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15

passwd CVE-2013-4235 低危 1:4.8.1-1ubuntu5.20.04.5 shadow-utils: TOCTOU race conditions by copying and removing directory trees

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4235

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2019-12-03 15:15 修改: 2023-02-13 00:28

passwd CVE-2023-29383 低危 1:4.8.1-1ubuntu5.20.04.5 shadow: Improper input validation in shadow-utils package utility chfn

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05

libgssapi-krb5-2 CVE-2024-26461 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:8cdab93a842f1ebf4bfcd2da131a8b77a3d34a77c27fc239e0c0ef1803705f6d

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

coreutils CVE-2016-2781 低危 8.30-3ubuntu2 coreutils: Non-privileged session can escape to the parent session in chroot

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2781

镜像层: sha256:3ec3ded77c0ce89e931f92aed086b2a2c774a6fbd51617853decc8afa4e1087a

发布日期: 2017-02-07 15:59 修改: 2023-11-07 02:32

Java (jar)
低危漏洞:0 中危漏洞:14 高危漏洞:16 严重漏洞:7
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
dom4j:dom4j CVE-2020-10683 严重 1.6.1 dom4j: XML External Entity vulnerability in default SAX parser

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10683

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2020-05-01 19:15 修改: 2023-11-07 03:14

org.apache.bcel:bcel CVE-2022-42920 严重 6.0-SNAPSHOT 6.6.0 Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42920

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2022-11-07 13:15 修改: 2024-01-17 15:15

org.apache.commons:commons-text CVE-2022-42889 严重 1.8 1.10.0 apache-commons-text: variable interpolation RCE

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42889

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2022-10-13 13:15 修改: 2024-01-19 16:15

org.springframework.security:spring-security-config CVE-2023-34034 严重 5.7.3 5.6.12, 5.7.10, 5.8.5, 6.0.5, 6.1.2 spring-security-webflux: path wildcard leads to security bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34034

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2023-07-19 15:15 修改: 2024-10-28 15:35

org.springframework.security:spring-security-core CVE-2022-31692 严重 5.7.3 5.7.5, 5.6.9 spring-security: Authorization rules can be bypassed via forward or include dispatcher types in Spring Security

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31692

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2022-10-31 20:15 修改: 2023-08-08 14:22

org.springframework.security:spring-security-web CVE-2024-38821 严重 5.7.3 5.7.13, 5.8.15, 6.2.7, 6.0.13, 6.1.11, 6.3.4 Spring-WebFlux: Authorization Bypass of Static Resources in WebFlux Applications

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38821

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2024-10-28 07:15 修改: 2024-10-28 13:58

org.springframework:spring-web CVE-2016-1000027 严重 5.3.23 6.0.0 spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000027

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2020-01-02 23:15 修改: 2023-04-20 09:15

org.apache.tomcat.embed:tomcat-embed-core CVE-2022-42252 高危 9.0.65 8.5.83, 9.0.68, 10.0.27, 10.1.1 tomcat: request smuggling

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42252

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2022-11-01 09:15 修改: 2023-05-30 06:15

org.apache.tomcat.embed:tomcat-embed-core CVE-2022-45143 高危 9.0.65 8.5.84, 9.0.69, 10.1.2 tomcat: JsonErrorReportValve injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45143

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2023-01-03 19:15 修改: 2023-06-27 13:15

org.apache.tomcat.embed:tomcat-embed-core CVE-2023-24998 高危 9.0.65 10.1.5, 11.0.0-M5, 8.5.88, 9.0.71 FileUpload: FileUpload DoS with excessive parts

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11

org.apache.tomcat.embed:tomcat-embed-core CVE-2023-46589 高危 9.0.65 11.0.0-M11, 10.1.16, 9.0.83, 8.5.96 tomcat: HTTP request smuggling via malformed trailer headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46589

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2023-11-28 16:15 修改: 2024-07-12 16:11

org.apache.tomcat.embed:tomcat-embed-core CVE-2024-34750 高危 9.0.65 11.0.0-M21, 10.1.25, 9.0.90 tomcat: Improper Handling of Exceptional Conditions

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34750

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2024-07-03 20:15 修改: 2024-07-09 16:22

org.springframework.boot:spring-boot-autoconfigure CVE-2023-20883 高危 2.7.4 3.0.7, 2.7.12, 2.6.15, 2.5.15 spring-boot: Spring Boot Welcome Page DoS Vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20883

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2023-05-26 17:15 修改: 2023-07-03 16:15

com.google.protobuf:protobuf-java CVE-2022-3509 高危 3.19.4 3.16.3, 3.19.6, 3.20.3, 3.21.7 protobuf-java: Textformat parsing issue leads to DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57

dom4j:dom4j CVE-2018-1000632 高危 1.6.1 dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000632

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2018-08-20 19:31 修改: 2023-11-07 02:51

org.springframework.security:spring-security-core CVE-2024-22257 高危 5.7.3 5.7.12, 5.8.11, 6.1.8, 6.2.3 spring-security: Broken Access Control With Direct Use of AuthenticatedVoter

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22257

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2024-03-18 15:15 修改: 2024-11-12 16:35

com.google.protobuf:protobuf-java CVE-2022-3510 高危 3.19.4 3.16.3, 3.19.6, 3.20.3, 3.21.7 protobuf-java: Message-Type Extensions parsing issue leads to DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51

org.springframework:spring-expression CVE-2023-20863 高危 5.3.23 6.0.8, 5.3.27, 5.2.24.RELEASE springframework: Spring Expression DoS Vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20863

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2023-04-13 20:15 修改: 2024-06-10 17:16

com.google.protobuf:protobuf-java CVE-2024-7254 高危 3.19.4 3.25.5, 4.27.5, 4.28.2 protobuf: StackOverflow vulnerability in Protocol Buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2024-09-19 01:15 修改: 2024-09-20 12:30

org.springframework:spring-web CVE-2024-22243 高危 5.3.23 6.1.4, 6.0.17, 5.3.32 springframework: URL Parsing with Host Validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22243

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2024-02-23 05:15 修改: 2024-08-22 15:35

org.springframework:spring-web CVE-2024-22259 高危 5.3.23 6.1.5, 6.0.18, 5.3.33 springframework: URL Parsing with Host Validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47

org.springframework:spring-web CVE-2024-22262 高危 5.3.23 5.3.34, 6.0.19, 6.1.6 springframework: URL Parsing with Host Validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35

org.springframework:spring-webmvc CVE-2024-38816 高危 5.3.23 6.1.13 spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2024-09-13 06:15 修改: 2024-09-13 14:06

org.apache.tomcat.embed:tomcat-embed-core CVE-2023-42795 中危 9.0.65 11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 tomcat: improper cleaning of recycled objects could lead to information leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42795

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2023-10-10 18:15 修改: 2023-11-04 06:15

org.springframework.security:spring-security-core CVE-2023-20862 中危 5.7.3 5.7.8, 5.8.3, 6.0.3 spring-security: Empty SecurityContext Is Not Properly Saved Upon Logout

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20862

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2023-04-19 20:15 修改: 2023-08-23 18:34

org.apache.tomcat.embed:tomcat-embed-core CVE-2023-44487 中危 9.0.65 11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2023-10-10 14:15 修改: 2024-08-14 19:57

org.springframework:spring-context CVE-2024-38820 中危 5.3.23 6.1.14 The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2024-10-18 06:15 修改: 2024-11-05 21:35

org.apache.tomcat.embed:tomcat-embed-core CVE-2023-45648 中危 9.0.65 11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 tomcat: incorrectly parsed http trailer headers can cause request smuggling

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45648

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2023-10-10 19:15 修改: 2023-11-04 06:15

org.springframework:spring-expression CVE-2023-20861 中危 5.3.23 6.0.7, 5.3.26, 5.2.23.RELEASE springframework: Spring Expression DoS Vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20861

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2023-03-23 21:15 修改: 2023-04-20 09:15

org.springframework:spring-expression CVE-2024-38808 中危 5.3.23 5.3.39 spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38808

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2024-08-20 08:15 修改: 2024-10-30 19:35

org.apache.tomcat.embed:tomcat-embed-core CVE-2024-24549 中危 9.0.65 8.5.99, 9.0.86, 10.1.19, 11.0.0-M17 Tomcat: HTTP/2 header handling DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24549

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2024-03-13 16:15 修改: 2024-11-04 22:35

org.apache.tomcat.embed:tomcat-embed-websocket CVE-2024-23672 中危 9.0.65 11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 Tomcat: WebSocket DoS with incomplete closing handshake

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23672

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2024-03-13 16:15 修改: 2024-11-18 22:35

com.squareup.okio:okio CVE-2023-3635 中危 2.8.0 3.4.0, 1.17.6 okio: GzipSource class improper exception handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17

com.google.protobuf:protobuf-java CVE-2022-3171 中危 3.19.4 3.21.7, 3.20.3, 3.19.6, 3.16.3 protobuf-java: timeout in parser leads to DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50

org.springframework:spring-web CVE-2024-38809 中危 5.3.23 5.3.38, 6.0.23, 6.1.12 org.springframework:spring-web: Spring Framework DoS via conditional HTTP request

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45

org.apache.tomcat.embed:tomcat-embed-core CVE-2023-41080 中危 9.0.65 8.5.93, 9.0.80, 10.1.13, 11.0.0-M11 tomcat: Open Redirect vulnerability in FORM authentication

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41080

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2023-08-25 21:15 修改: 2023-11-03 19:00

org.springframework:spring-webmvc CVE-2024-38828 中危 5.3.23 6.0.0 org.springframework:spring-webmvc: DoS via Spring MVC controller method with byte[] parameter

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38828

镜像层: sha256:435d6c9aaea4bee399428fea22866a9e1b6880b77580ef13a8998a8974d76f67

发布日期: 2024-11-18 04:15 修改: 2024-11-18 17:11