| github.com/docker/docker |
CVE-2024-41110 |
严重 |
v20.10.27+incompatible |
23.0.15, 26.1.5, 27.1.1, 25.0.6 |
moby: Authz zero length regression
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41110
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2024-07-24 17:15 修改: 2026-04-15 00:35
|
| github.com/rancher/rancher |
CVE-2023-32197 |
严重 |
v2.9.0 |
2.8.9, 2.9.3 |
Rancher allows privilege escalation in Windows nodes due to Insecure Access Control Lists
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32197
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-04-16 09:15 修改: 2026-04-15 00:35
|
| github.com/rancher/rancher |
CVE-2024-22036 |
严重 |
v2.9.0 |
2.7.16, 2.8.9, 2.9.3 |
Rancher Remote Code Execution via Cluster/Node Drivers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22036
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-04-16 09:15 修改: 2026-04-15 00:35
|
| github.com/rancher/rancher |
CVE-2025-23391 |
严重 |
v2.9.0 |
2.8.14, 2.9.8, 2.10.4 |
Rancher: Restricted Administrator can change Administrator's passwords
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23391
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-04-11 11:15 修改: 2026-04-15 00:35
|
| golang.org/x/crypto |
CVE-2024-45337 |
严重 |
v0.25.0 |
0.31.0 |
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45337
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2024-12-12 02:02 修改: 2026-04-15 00:35
|
| google.golang.org/grpc |
CVE-2026-33186 |
严重 |
v1.59.0 |
1.79.3 |
google.golang.org/grpc/grpc-go: google.golang.org/grpc/authz: gRPC-Go: Authorization bypass due to improper HTTP/2 path validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33186
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-03-20 23:16 修改: 2026-04-10 20:49
|
| stdlib |
CVE-2025-68121 |
严重 |
v1.22.5 |
1.24.13, 1.25.7, 1.26.0-rc.3 |
crypto/tls: crypto/tls: Incorrect certificate validation during TLS session resumption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68121
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-02-05 18:16 修改: 2026-04-29 14:16
|
| github.com/golang-jwt/jwt/v5 |
CVE-2025-30204 |
高危 |
v5.2.1 |
5.2.2 |
golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-30204
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-03-21 22:15 修改: 2026-04-15 00:35
|
| github.com/microsoft/kiota-http-go |
CVE-2026-44503 |
高危 |
v1.0.0 |
1.5.5 |
Kiota abstractions RedirectHandler leaks Cookie/Proxy-Authorization headers on cross-host redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-44503
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| github.com/moby/spdystream |
CVE-2026-35469 |
高危 |
v0.2.0 |
0.5.1 |
Kubelet: CRI-O: kube-apiserver: Kubelet, CRI-O, kube-apiserver: Denial of Service via SPDY streaming code
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-35469
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-04-16 22:16 修改: 2026-04-29 21:04
|
| github.com/opencontainers/runc |
CVE-2025-31133 |
高危 |
v1.1.12 |
1.2.8, 1.3.3, 1.4.0-rc.3 |
runc: container escape via 'masked path' abuse due to mount race conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-31133
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-11-06 19:15 修改: 2025-12-03 18:30
|
| github.com/opencontainers/runc |
CVE-2025-52565 |
高危 |
v1.1.12 |
1.2.8, 1.3.3, 1.4.0-rc.3 |
runc: container escape with malicious config due to /dev/console mount and related races
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-52565
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-11-06 20:15 修改: 2025-12-03 18:33
|
| github.com/opencontainers/runc |
CVE-2025-52881 |
高危 |
v1.1.12 |
1.2.8, 1.3.3, 1.4.0-rc.3 |
runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-52881
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-11-06 21:15 修改: 2025-12-03 18:37
|
| github.com/docker/cli |
CVE-2025-15558 |
高危 |
v25.0.3+incompatible |
29.2.0 |
docker/cli: Docker CLI for Windows: Privilege escalation via malicious plugin binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15558
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-03-04 17:16 修改: 2026-03-09 17:38
|
| github.com/containerd/containerd |
CVE-2024-25621 |
高危 |
v1.6.27 |
1.7.29 |
github.com/containerd/containerd: containerd local privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25621
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-11-06 19:15 修改: 2025-12-31 02:29
|
| github.com/docker/docker |
CVE-2026-34040 |
高危 |
v20.10.27+incompatible |
29.3.1 |
Moby: Moby: Authorization bypass vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34040
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-03-31 03:15 修改: 2026-04-03 16:51
|
| github.com/rancher/rancher |
CVE-2022-45157 |
高危 |
v2.9.0 |
2.9.3, 2.8.9 |
Exposure of vSphere's CPI and CSI credentials in Rancher
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45157
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2024-11-13 14:15 修改: 2026-04-15 00:35
|
| github.com/rancher/rancher |
CVE-2024-22030 |
高危 |
v2.9.0 |
2.7.15, 2.8.8, 2.9.2 |
Rancher agents can be hijacked by taking over the Rancher Server URL
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22030
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2024-10-16 14:15 修改: 2026-04-15 00:35
|
| github.com/rancher/rancher |
CVE-2024-22031 |
高危 |
v2.9.0 |
2.9.9, 2.10.5, 2.11.1 |
Rancher users who can create Projects can gain access to arbitrary projects
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22031
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
| github.com/rancher/rancher |
CVE-2024-52281 |
高危 |
v2.9.0 |
2.9.4 |
Rancher UI has Stored Cross-site Scripting vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52281
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-04-16 09:15 修改: 2026-04-15 00:35
|
| github.com/rancher/rancher |
CVE-2024-58259 |
高危 |
v2.9.0 |
2.12.1, 2.11.5, 2.10.9, 2.9.11, 0.0.0-20250813072957-aee95d4e2a41 |
Rancher affected by unauthenticated Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58259
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-09-02 12:15 修改: 2026-04-15 00:35
|
| github.com/rancher/rancher |
CVE-2024-58260 |
高危 |
v2.9.0 |
2.12.2, 2.11.6, 2.10.10, 2.9.12 |
Rancher update on users can deny the service to the admin
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58260
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-10-02 12:15 修改: 2026-04-15 00:35
|
| github.com/rancher/rancher |
CVE-2024-58267 |
高危 |
v2.9.0 |
2.12.2, 2.11.6, 2.10.10, 2.9.12 |
Rancher CLI SAML authentication is vulnerable to phishing attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58267
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-10-02 12:15 修改: 2026-04-15 00:35
|
| github.com/rancher/rancher |
CVE-2025-23388 |
高危 |
v2.9.0 |
2.8.13, 2.9.7, 2.10.3 |
Rancher allows an unauthenticated stack overflow in /v3-public/authproviders API
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23388
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-04-11 11:15 修改: 2026-04-15 00:35
|
| github.com/rancher/rancher |
CVE-2025-23389 |
高危 |
v2.9.0 |
2.8.13, 2.9.7, 2.10.3 |
Rancher does not Properly Validate Account Bindings in SAML Authentication Enables User Impersonation on First Login
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23389
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-04-11 11:15 修改: 2026-04-15 00:35
|
| github.com/rancher/steve |
CVE-2024-52280 |
高危 |
v0.0.0-20240709130809-47871606146c |
0.0.0-20241029132712-2175e090fe4b |
github.com/rancher/steve's users can issue watch commands for arbitrary resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52280
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-04-11 12:15 修改: 2026-04-15 00:35
|
| github.com/russellhaering/goxmldsig |
CVE-2026-33487 |
高危 |
v1.3.0 |
1.6.0 |
github.com/russellhaering/goxmldsig: goxmlsig: Integrity bypass due to incorrect XML Digital Signature validation via loop variable capture issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33487
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-03-26 18:16 修改: 2026-04-20 14:15
|
| go.opentelemetry.io/otel/sdk |
CVE-2026-39883 |
高危 |
v1.19.0 |
1.43.0 |
opentelemetry-go: BSD kenv command not using absolute path enables PATH hijacking
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39883
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-04-08 21:17 修改: 2026-04-10 21:16
|
| github.com/go-jose/go-jose/v3 |
CVE-2026-34986 |
高危 |
v3.0.1 |
3.0.5 |
github.com/go-jose/go-jose/v3: github.com/go-jose/go-jose/v4: Go JOSE: Denial of Service via crafted JSON Web Encryption (JWE) object
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-34986
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-04-06 17:17 修改: 2026-05-04 15:20
|
| golang.org/x/crypto |
CVE-2025-22869 |
高危 |
v0.25.0 |
0.35.0 |
golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22869
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-02-26 08:14 修改: 2025-05-01 19:28
|
| golang.org/x/oauth2 |
CVE-2025-22868 |
高危 |
v0.21.0 |
0.27.0 |
golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22868
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-02-26 08:14 修改: 2025-05-01 19:27
|
| github.com/golang-jwt/jwt |
CVE-2025-30204 |
高危 |
v3.2.1+incompatible |
|
golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-30204
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-03-21 22:15 修改: 2026-04-15 00:35
|
| k8s.io/kubernetes |
CVE-2024-10220 |
高危 |
v1.30.1 |
1.28.12, 1.29.7, 1.30.3 |
kubernetes: Arbitrary command execution through gitRepo volume
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10220
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2024-11-22 17:15 修改: 2026-04-15 00:35
|
| k8s.io/kubernetes |
CVE-2024-5321 |
高危 |
v1.30.1 |
1.27.16, 1.28.12, 1.29.7, 1.30.3 |
kubelet: Incorrect permissions on Windows containers logs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5321
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2024-07-18 19:15 修改: 2026-04-15 00:35
|
| github.com/golang-jwt/jwt/v4 |
CVE-2025-30204 |
高危 |
v4.5.0 |
4.5.2 |
golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-30204
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-03-21 22:15 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2024-34156 |
高危 |
v1.22.5 |
1.22.7, 1.23.1 |
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2024-09-06 21:15 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2025-47907 |
高危 |
v1.22.5 |
1.23.12, 1.24.6 |
database/sql: Postgres Scan Race Condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47907
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-08-07 16:15 修改: 2026-01-29 19:11
|
| stdlib |
CVE-2025-58183 |
高危 |
v1.22.5 |
1.24.8, 1.25.2 |
golang: archive/tar: Unbounded allocation when parsing GNU sparse map
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58183
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-10-29 23:16 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2025-61726 |
高危 |
v1.22.5 |
1.24.12, 1.25.6 |
golang: net/url: Memory exhaustion in query parameter parsing in net/url
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61726
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-01-28 20:16 修改: 2026-02-06 18:47
|
| stdlib |
CVE-2025-61728 |
高危 |
v1.22.5 |
1.24.12, 1.25.6 |
golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61728
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-01-28 20:16 修改: 2026-02-06 18:45
|
| stdlib |
CVE-2025-61729 |
高危 |
v1.22.5 |
1.24.11, 1.25.5 |
crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61729
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-12-02 19:15 修改: 2025-12-19 18:25
|
| stdlib |
CVE-2026-25679 |
高危 |
v1.22.5 |
1.25.8, 1.26.1 |
net/url: Incorrect parsing of IPv6 host literals in net/url
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-25679
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-03-06 22:16 修改: 2026-04-21 14:43
|
| stdlib |
CVE-2026-32280 |
高危 |
v1.22.5 |
1.25.9, 1.26.2 |
crypto/x509: crypto/tls: golang: Go: Denial of Service vulnerability in certificate chain building
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32280
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:16
|
| stdlib |
CVE-2026-32281 |
高危 |
v1.22.5 |
1.25.9, 1.26.2 |
crypto/x509: golang: Go crypto/x509: Denial of Service via inefficient certificate chain validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32281
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:15
|
| stdlib |
CVE-2026-32283 |
高危 |
v1.22.5 |
1.25.9, 1.26.2 |
crypto/tls: golang: Go crypto/tls: Denial of Service via multiple TLS 1.3 key update messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32283
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:12
|
| stdlib |
CVE-2026-33811 |
高危 |
v1.22.5 |
1.25.10, 1.26.3 |
When using LookupCNAME with the cgo DNS resolver, a very long CNAME re ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33811
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-05-07 20:16 修改: 2026-05-12 20:23
|
| stdlib |
CVE-2026-33814 |
高危 |
v1.22.5 |
1.25.10, 1.26.3 |
When processing HTTP/2 SETTINGS frames, transport will enter an infini ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33814
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-05-07 20:16 修改: 2026-05-08 19:16
|
| stdlib |
CVE-2026-39820 |
高危 |
v1.22.5 |
1.25.10, 1.26.3 |
Well-crafted inputs reaching ParseAddress, ParseAddressList, and Parse ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39820
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-05-07 20:16 修改: 2026-05-08 15:16
|
| stdlib |
CVE-2026-39836 |
高危 |
v1.22.5 |
1.25.10, 1.26.3 |
Panic in Dial and LookupPort when handling NUL byte on Windows in net
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39836
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-05-07 20:16 修改: 2026-05-08 22:16
|
| stdlib |
CVE-2026-42499 |
高危 |
v1.22.5 |
1.25.10, 1.26.3 |
Pathological inputs could cause DoS through consumePhrase when parsing ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-42499
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-05-07 20:16 修改: 2026-05-08 22:16
|
| k8s.io/kubernetes |
CVE-2024-9042 |
中危 |
v1.30.1 |
1.29.13, 1.30.9, 1.31.5, 1.32.1 |
kubelet: Command Injection affecting Windows nodes via nodes/*/logs/query API
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9042
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-03-13 17:15 修改: 2026-04-15 00:35
|
| k8s.io/kubernetes |
CVE-2025-0426 |
中危 |
v1.30.1 |
1.32.2, 1.31.6, 1.30.10, 1.29.14 |
k8s.io/kubernetes: kubelet: node denial of service via kubelet checkpoint API
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0426
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-02-13 16:16 修改: 2026-04-15 00:35
|
| k8s.io/kubernetes |
CVE-2025-13281 |
中危 |
v1.30.1 |
1.32.10, 1.33.6, 1.34.2 |
kube-controller-manager: Portworx Half-Blind SSRF in kube-controller-manager
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13281
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-12-14 22:15 修改: 2026-04-15 00:35
|
| k8s.io/kubernetes |
CVE-2025-1767 |
中危 |
v1.30.1 |
|
kubelet: GitRepo Volume Inadvertent Local Repository Access
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1767
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-03-13 17:15 修改: 2026-04-15 00:35
|
| k8s.io/kubernetes |
CVE-2025-5187 |
中危 |
v1.30.1 |
1.31.12, 1.32.8, 1.33.4 |
kubernetes: kube-apiserver: Nodes can delete themselves by adding an OwnerReference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5187
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-08-27 17:15 修改: 2026-04-15 00:35
|
| github.com/rancher/rancher |
CVE-2024-52282 |
中危 |
v2.9.0 |
2.8.10, 2.9.4 |
Rancher Helm Applications may have sensitive values leaked
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52282
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-04-11 11:15 修改: 2026-04-15 00:35
|
| github.com/rancher/rancher |
CVE-2025-23387 |
中危 |
v2.9.0 |
2.8.13, 2.9.7, 2.10.3 |
Rancher's SAML-based login via CLI can be denied by unauthenticated users
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23387
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-04-11 11:15 修改: 2026-04-15 00:35
|
| github.com/rancher/rancher |
CVE-2025-54468 |
中危 |
v2.9.0 |
2.12.2, 2.11.6, 2.10.10, 2.9.12 |
Rancher sends sensitive information to external services through the `/meta/proxy` endpoint
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-54468
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-10-02 10:15 修改: 2026-04-15 00:35
|
| github.com/docker/docker |
CVE-2024-29018 |
中危 |
v20.10.27+incompatible |
26.0.0-rc3, 25.0.5, 23.0.11 |
moby: external DNS requests from 'internal' networks could lead to data exfiltration
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29018
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2024-03-20 21:15 修改: 2025-04-09 15:40
|
| github.com/docker/docker |
CVE-2026-33997 |
中危 |
v20.10.27+incompatible |
29.3.1 |
moby: docker: github.com/moby/moby: Moby: Privilege validation bypass during plugin installation
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-33997
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-03-31 03:15 修改: 2026-04-03 17:23
|
| github.com/Azure/go-ntlmssp |
CVE-2026-32952 |
中危 |
v0.0.0-20200615164410-66371956d46c |
0.1.1 |
go-ntlmssp: go-ntlmssp: Denial of Service via malicious NTLM challenge
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32952
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-04-24 03:16 修改: 2026-04-24 14:50
|
| github.com/go-jose/go-jose/v3 |
CVE-2024-28180 |
中危 |
v3.0.1 |
3.0.3 |
jose-go: improper handling of highly compressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28180
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2024-03-09 01:15 修改: 2025-12-03 20:29
|
| github.com/go-jose/go-jose/v3 |
CVE-2025-27144 |
中危 |
v3.0.1 |
3.0.4 |
go-jose: Go JOSE's Parsing Vulnerable to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-27144
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-02-24 23:15 修改: 2026-04-15 00:35
|
| golang.org/x/crypto |
CVE-2025-47914 |
中危 |
v0.25.0 |
0.45.0 |
golang.org/x/crypto/ssh/agent: SSH Agent servers: Denial of Service due to malformed messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47914
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-11-19 21:15 修改: 2025-12-11 19:36
|
| golang.org/x/crypto |
CVE-2025-58181 |
中危 |
v0.25.0 |
0.45.0 |
golang.org/x/crypto/ssh: golang.org/x/crypto/ssh: Denial of Service via unbounded memory consumption in GSSAPI authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58181
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-11-19 21:15 修改: 2025-12-11 19:29
|
| golang.org/x/net |
CVE-2025-22870 |
中危 |
v0.27.0 |
0.36.0 |
golang.org/x/net/proxy: golang.org/x/net/http/httpproxy: HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22870
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-03-12 19:15 修改: 2026-04-16 23:16
|
| golang.org/x/net |
CVE-2025-22872 |
中危 |
v0.27.0 |
0.38.0 |
golang.org/x/net/html: Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22872
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-04-16 18:16 修改: 2026-04-15 00:35
|
| github.com/opencontainers/runc |
CVE-2024-45310 |
中危 |
v1.1.12 |
1.1.14, 1.2.0-rc.3 |
runc: runc can be tricked into creating empty files/directories on host
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45310
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2024-09-03 19:15 修改: 2025-11-25 14:07
|
| github.com/containerd/containerd |
CVE-2024-40635 |
中危 |
v1.6.27 |
1.7.27, 1.6.38 |
containerd: containerd has an integer overflow in User ID handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40635
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-03-17 22:15 修改: 2025-10-02 01:51
|
| github.com/containerd/containerd |
CVE-2025-64329 |
中危 |
v1.6.27 |
1.7.29 |
github.com/containerd/containerd: containerd: Memory exhaustion via CRI Attach implementation goroutine leaks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-64329
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-11-07 05:16 修改: 2025-12-31 18:34
|
| github.com/docker/docker |
CVE-2024-24557 |
中危 |
v20.10.27+incompatible |
24.0.9, 25.0.2 |
moby: classic builder cache poisoning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24557
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2024-02-01 17:15 修改: 2024-11-21 08:59
|
| stdlib |
CVE-2024-34155 |
中危 |
v1.22.5 |
1.22.7, 1.23.1 |
go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2024-09-06 21:15 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2024-34158 |
中危 |
v1.22.5 |
1.22.7, 1.23.1 |
go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2024-09-06 21:15 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2024-45336 |
中危 |
v1.22.5 |
1.22.11, 1.23.5, 1.24.0-rc.2 |
golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45336
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-01-28 02:15 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2024-45341 |
中危 |
v1.22.5 |
1.22.11, 1.23.5, 1.24.0-rc.2 |
golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45341
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-01-28 02:15 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2025-0913 |
中危 |
v1.22.5 |
1.23.10, 1.24.4 |
Inconsistent handling of O_CREATE|O_EXCL on Unix and Windows in os in syscall
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0913
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-06-11 18:15 修改: 2025-08-08 14:53
|
| stdlib |
CVE-2025-22866 |
中危 |
v1.22.5 |
1.22.12, 1.23.6, 1.24.0-rc.3 |
crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22866
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-02-06 17:15 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2025-22870 |
中危 |
v1.22.5 |
1.23.7, 1.24.1 |
golang.org/x/net/proxy: golang.org/x/net/http/httpproxy: HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22870
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-03-12 19:15 修改: 2026-04-16 23:16
|
| stdlib |
CVE-2025-22871 |
中危 |
v1.22.5 |
1.23.8, 1.24.2 |
net/http: Request smuggling due to acceptance of invalid chunked data in net/http
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22871
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-04-08 20:15 修改: 2026-05-12 13:16
|
| stdlib |
CVE-2025-22873 |
中危 |
v1.22.5 |
1.23.9, 1.24.3 |
os: os: Information disclosure via path traversal using specially crafted filenames
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22873
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-02-04 23:15 修改: 2026-02-10 15:16
|
| stdlib |
CVE-2025-4673 |
中危 |
v1.22.5 |
1.23.10, 1.24.4 |
net/http: Sensitive headers not cleared on cross-origin redirect in net/http
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4673
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-06-11 17:15 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2025-47906 |
中危 |
v1.22.5 |
1.23.12, 1.24.6 |
os/exec: Unexpected paths returned from LookPath in os/exec
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47906
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-09-18 19:15 修改: 2026-01-27 19:56
|
| stdlib |
CVE-2025-47912 |
中危 |
v1.22.5 |
1.24.8, 1.25.2 |
net/url: Insufficient validation of bracketed IPv6 hostnames in net/url
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47912
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-10-29 23:16 修改: 2026-01-29 13:57
|
| stdlib |
CVE-2025-58185 |
中危 |
v1.22.5 |
1.24.8, 1.25.2 |
encoding/asn1: Parsing DER payload can cause memory exhaustion in encoding/asn1
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58185
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-10-29 23:16 修改: 2026-02-06 20:26
|
| stdlib |
CVE-2025-58186 |
中危 |
v1.22.5 |
1.24.8, 1.25.2 |
golang.org/net/http: Lack of limit when parsing cookies can cause memory exhaustion in net/http
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58186
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-10-29 23:16 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2025-58187 |
中危 |
v1.22.5 |
1.24.9, 1.25.3 |
crypto/x509: Quadratic complexity when checking name constraints in crypto/x509
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58187
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-10-29 23:16 修改: 2026-01-29 16:02
|
| stdlib |
CVE-2025-58188 |
中危 |
v1.22.5 |
1.24.8, 1.25.2 |
crypto/x509: golang: Panic when validating certificates with DSA public keys in crypto/x509
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58188
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-10-29 23:16 修改: 2026-01-29 15:55
|
| stdlib |
CVE-2025-58189 |
中危 |
v1.22.5 |
1.24.8, 1.25.2 |
crypto/tls: go crypto/tls ALPN negotiation error contains attacker controlled information
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58189
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-10-29 23:16 修改: 2026-01-29 15:49
|
| stdlib |
CVE-2025-61723 |
中危 |
v1.22.5 |
1.24.8, 1.25.2 |
encoding/pem: Quadratic complexity when parsing some invalid inputs in encoding/pem
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61723
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-10-29 23:16 修改: 2026-01-29 15:49
|
| stdlib |
CVE-2025-61724 |
中危 |
v1.22.5 |
1.24.8, 1.25.2 |
net/textproto: Excessive CPU consumption in Reader.ReadResponse in net/textproto
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61724
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-10-29 23:16 修改: 2026-01-29 15:30
|
| stdlib |
CVE-2025-61725 |
中危 |
v1.22.5 |
1.24.8, 1.25.2 |
net/mail: Excessive CPU consumption in ParseAddress in net/mail
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61725
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-10-29 23:16 修改: 2026-04-15 00:35
|
| stdlib |
CVE-2025-61727 |
中危 |
v1.22.5 |
1.24.11, 1.25.5 |
golang: crypto/x509: excluded subdomain constraint does not restrict wildcard SANs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61727
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-12-03 20:16 修改: 2025-12-18 20:15
|
| stdlib |
CVE-2025-61730 |
中危 |
v1.22.5 |
1.24.12, 1.25.6 |
During the TLS 1.3 handshake if multiple messages are sent in records ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61730
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-01-28 20:16 修改: 2026-02-03 20:36
|
| stdlib |
CVE-2026-27142 |
中危 |
v1.22.5 |
1.25.8, 1.26.1 |
html/template: URLs in meta content attribute actions are not escaped in html/template
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27142
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-03-06 22:16 修改: 2026-04-21 14:30
|
| stdlib |
CVE-2026-32282 |
中危 |
v1.22.5 |
1.25.9, 1.26.2 |
golang: internal/syscall/unix: Root.Chmod can follow symlinks out of the root
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32282
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:15
|
| stdlib |
CVE-2026-32288 |
中危 |
v1.22.5 |
1.25.9, 1.26.2 |
archive/tar: golang: Go's archive/tar package: Denial of Service via maliciously-crafted archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32288
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:08
|
| stdlib |
CVE-2026-32289 |
中危 |
v1.22.5 |
1.25.9, 1.26.2 |
html/template: golang: html/template: Cross-Site Scripting (XSS) via improper context and brace depth tracking in JS template literals
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-32289
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-04-08 02:16 修改: 2026-04-16 19:06
|
| stdlib |
CVE-2026-39823 |
中危 |
v1.22.5 |
1.25.10, 1.26.3 |
CVE-2026-27142 fixed a vulnerability in which URLs were not correctly ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39823
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-05-07 20:16 修改: 2026-05-08 15:16
|
| stdlib |
CVE-2026-39825 |
中危 |
v1.22.5 |
1.25.10, 1.26.3 |
ReverseProxy can forward queries containing parameters not visible to ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39825
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-05-07 20:16 修改: 2026-05-08 22:16
|
| stdlib |
CVE-2026-39826 |
中危 |
v1.22.5 |
1.25.10, 1.26.3 |
If a trusted template author were to write a <script> tag containing a ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-39826
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-05-07 20:16 修改: 2026-05-08 15:16
|
| github.com/golang-jwt/jwt/v4 |
CVE-2024-51744 |
低危 |
v4.5.0 |
4.5.1 |
golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-51744
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2024-11-04 22:15 修改: 2026-04-15 00:35
|
| github.com/docker/docker |
CVE-2025-54410 |
低危 |
v20.10.27+incompatible |
25.0.13, 28.0.0 |
github.com/moby/moby: Moby's Firewalld reload removes bridge network isolation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-54410
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2025-07-30 14:15 修改: 2025-08-22 17:27
|
| stdlib |
CVE-2026-27139 |
低危 |
v1.22.5 |
1.25.8, 1.26.1 |
os: FileInfo can escape from a Root in golang os module
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-27139
镜像层: sha256:0b4b01726b313c12fc32e731c5ea81f03b28d0b8c3e9646ee8bc3839b50a7dab
发布日期: 2026-03-06 22:16 修改: 2026-04-21 14:32
|