github.com/docker/docker |
CVE-2024-41110 |
严重 |
v20.10.27+incompatible |
23.0.15, 26.1.5, 27.1.1, 25.0.6 |
moby: Authz zero length regression
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41110
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 2024-07-24 17:15 修改: 2024-07-30 20:15
|
github.com/rancher/rancher |
CVE-2023-32197 |
严重 |
v2.9.2 |
2.8.9, 2.9.3 |
Rancher allows privilege escalation in Windows nodes due to Insecure Access Control Lists
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32197
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
github.com/rancher/rancher |
CVE-2024-22036 |
严重 |
v2.9.2 |
2.7.16, 2.8.9, 2.9.3 |
Rancher Remote Code Execution via Cluster/Node Drivers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22036
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
golang.org/x/crypto |
CVE-2024-45337 |
严重 |
v0.27.0 |
0.31.0 |
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45337
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 2024-12-12 02:02 修改: 2024-12-12 21:15
|
github.com/rancher/rancher |
CVE-2024-52281 |
高危 |
v2.9.2 |
2.9.4 |
Rancher UI has Stored Cross-site Scripting vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52281
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
github.com/rancher/steve |
CVE-2024-52280 |
高危 |
v0.0.0-20240911190153-79304d93b49b |
0.0.0-20241029132712-2175e090fe4b |
github.com/rancher/steve's users can issue watch commands for arbitrary resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52280
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
github.com/rancher/rancher |
CVE-2022-45157 |
高危 |
v2.9.2 |
2.9.3, 2.8.9 |
Exposure of vSphere's CPI and CSI credentials in Rancher
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45157
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 2024-11-13 14:15 修改: 2024-11-13 17:01
|
golang.org/x/net |
CVE-2024-45338 |
高危 |
v0.29.0 |
0.33.0 |
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45338
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 2024-12-18 21:15 修改: 2024-12-31 20:16
|
k8s.io/kubernetes |
CVE-2024-10220 |
高危 |
v1.30.1 |
1.28.12, 1.29.7, 1.30.3 |
kubernetes: Arbitrary command execution through gitRepo volume
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10220
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 2024-11-22 17:15 修改: 2024-11-22 17:15
|
k8s.io/kubernetes |
CVE-2024-5321 |
高危 |
v1.30.1 |
1.27.16, 1.28.12, 1.29.7, 1.30.3 |
kubelet: Incorrect permissions on Windows containers logs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5321
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 2024-07-18 19:15 修改: 2024-07-19 13:01
|
github.com/docker/docker |
CVE-2024-24557 |
中危 |
v20.10.27+incompatible |
24.0.9, 25.0.2 |
moby: classic builder cache poisoning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24557
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 2024-02-01 17:15 修改: 2024-02-09 20:21
|
github.com/docker/docker |
CVE-2024-29018 |
中危 |
v20.10.27+incompatible |
26.0.0-rc3, 25.0.5, 23.0.11 |
moby: external DNS requests from 'internal' networks could lead to data exfiltration
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29018
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 2024-03-20 21:15 修改: 2024-03-21 12:58
|
github.com/go-jose/go-jose/v3 |
CVE-2024-28180 |
中危 |
v3.0.1 |
3.0.3 |
jose-go: improper handling of highly compressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28180
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 2024-03-09 01:15 修改: 2024-06-12 02:15
|
github.com/opencontainers/runc |
CVE-2024-45310 |
中危 |
v1.1.12 |
1.1.14, 1.2.0-rc.3 |
runc: runc can be tricked into creating empty files/directories on host
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45310
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 2024-09-03 19:15 修改: 2024-09-03 19:40
|
github.com/rancher/rancher |
CVE-2024-52282 |
中危 |
v2.9.2 |
2.8.10, 2.9.4 |
Rancher Helm Applications may have sensitive values leaked
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52282
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
github.com/golang-jwt/jwt/v4 |
CVE-2024-51744 |
低危 |
v4.5.0 |
4.5.1 |
golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-51744
镜像层: sha256:4e2478445ce9c83363a8d7073851068691e4e5c367bdb13eed600744e00914ea
发布日期: 2024-11-04 22:15 修改: 2024-11-05 16:04
|