docker.io/rayproject/ray:2.10.0-py38 linux/amd64

docker.io/rayproject/ray:2.10.0-py38 - Trivy安全扫描结果 扫描时间: 2025-01-06 16:32
全部漏洞信息
低危漏洞:61 中危漏洞:87 高危漏洞:14 严重漏洞:2

系统OS: ubuntu 20.04 扫描引擎: Trivy 扫描时间: 2025-01-06 16:32

docker.io/rayproject/ray:2.10.0-py38 (ubuntu 20.04) (ubuntu)
低危漏洞:56 中危漏洞:63 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
bsdutils CVE-2024-28085 中危 1:2.34-0.1ubuntu9.4 2.34-0.1ubuntu9.5 util-linux: CVE-2024-28085: wall: escape sequence injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35

fdisk CVE-2024-28085 中危 2.34-0.1ubuntu9.4 2.34-0.1ubuntu9.5 util-linux: CVE-2024-28085: wall: escape sequence injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35

git CVE-2024-32002 中危 1:2.25.1-1ubuntu3.11 1:2.25.1-1ubuntu3.13 git: Recursive clones RCE

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32002

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15

git CVE-2024-32004 中危 1:2.25.1-1ubuntu3.11 1:2.25.1-1ubuntu3.12 git: RCE while cloning local repos

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32004

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15

git CVE-2024-32020 中危 1:2.25.1-1ubuntu3.11 1:2.25.1-1ubuntu3.12 git: insecure hardlinks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32020

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-05-14 19:15 修改: 2024-06-10 18:15

git CVE-2024-32021 中危 1:2.25.1-1ubuntu3.11 1:2.25.1-1ubuntu3.12 git: symlink bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32021

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15

git CVE-2024-32465 中危 1:2.25.1-1ubuntu3.11 1:2.25.1-1ubuntu3.12 git: additional local RCE

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32465

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15

git-man CVE-2024-32002 中危 1:2.25.1-1ubuntu3.11 1:2.25.1-1ubuntu3.13 git: Recursive clones RCE

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32002

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15

git-man CVE-2024-32004 中危 1:2.25.1-1ubuntu3.11 1:2.25.1-1ubuntu3.12 git: RCE while cloning local repos

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32004

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15

git-man CVE-2024-32020 中危 1:2.25.1-1ubuntu3.11 1:2.25.1-1ubuntu3.12 git: insecure hardlinks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32020

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-05-14 19:15 修改: 2024-06-10 18:15

git-man CVE-2024-32021 中危 1:2.25.1-1ubuntu3.11 1:2.25.1-1ubuntu3.12 git: symlink bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32021

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15

git-man CVE-2024-32465 中危 1:2.25.1-1ubuntu3.11 1:2.25.1-1ubuntu3.12 git: additional local RCE

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32465

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15

krb5-locales CVE-2024-26462 中危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

krb5-locales CVE-2024-37370 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48

krb5-locales CVE-2024-37371 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39

less CVE-2024-32487 中危 551-1ubuntu0.2 551-1ubuntu0.3 less: OS command injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32487

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-04-13 15:15 修改: 2024-07-08 14:18

libblkid1 CVE-2024-28085 中危 2.34-0.1ubuntu9.4 2.34-0.1ubuntu9.5 util-linux: CVE-2024-28085: wall: escape sequence injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35

libc-bin CVE-2024-2961 中危 2.31-0ubuntu9.14 2.31-0ubuntu9.15 glibc: Out of bounds write in iconv may lead to remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15

libc-bin CVE-2024-33599 中危 2.31-0ubuntu9.14 2.31-0ubuntu9.16 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc-bin CVE-2024-33600 中危 2.31-0ubuntu9.14 2.31-0ubuntu9.16 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc-bin CVE-2024-33601 中危 2.31-0ubuntu9.14 2.31-0ubuntu9.16 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc-bin CVE-2024-33602 中危 2.31-0ubuntu9.14 2.31-0ubuntu9.16 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc6 CVE-2024-2961 中危 2.31-0ubuntu9.14 2.31-0ubuntu9.15 glibc: Out of bounds write in iconv may lead to remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15

libc6 CVE-2024-33599 中危 2.31-0ubuntu9.14 2.31-0ubuntu9.16 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc6 CVE-2024-33600 中危 2.31-0ubuntu9.14 2.31-0ubuntu9.16 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc6 CVE-2024-33601 中危 2.31-0ubuntu9.14 2.31-0ubuntu9.16 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc6 CVE-2024-33602 中危 2.31-0ubuntu9.14 2.31-0ubuntu9.16 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libcurl3-gnutls CVE-2024-2398 中危 7.68.0-1ubuntu2.21 7.68.0-1ubuntu2.22 curl: HTTP/2 push headers memory-leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2398

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-03-27 08:15 修改: 2024-07-30 02:15

libcurl3-gnutls CVE-2024-7264 中危 7.68.0-1ubuntu2.21 7.68.0-1ubuntu2.23 curl: libcurl: ASN.1 date parser overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-07-31 08:15 修改: 2024-10-30 20:35

libcurl3-gnutls CVE-2024-8096 中危 7.68.0-1ubuntu2.21 7.68.0-1ubuntu2.24 curl: OCSP stapling bypass with GnuTLS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26

libexpat1 CVE-2024-45490 中危 2.2.9-1ubuntu0.6 2.2.9-1ubuntu0.7 libexpat: Negative Length Parsing Vulnerability in libexpat

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24

libexpat1 CVE-2024-45491 中危 2.2.9-1ubuntu0.6 2.2.9-1ubuntu0.7 libexpat: Integer Overflow or Wraparound

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

libexpat1 CVE-2024-45492 中危 2.2.9-1ubuntu0.6 2.2.9-1ubuntu0.7 libexpat: integer overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

libfdisk1 CVE-2024-28085 中危 2.34-0.1ubuntu9.4 2.34-0.1ubuntu9.5 util-linux: CVE-2024-28085: wall: escape sequence injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35

libgnutls30 CVE-2024-28834 中危 3.6.13-2ubuntu1.10 3.6.13-2ubuntu1.11 gnutls: vulnerable to Minerva side-channel information leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28834

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-03-21 14:15 修改: 2024-11-21 21:15

libgssapi-krb5-2 CVE-2024-26462 中危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libgssapi-krb5-2 CVE-2024-37370 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48

libgssapi-krb5-2 CVE-2024-37371 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39

libk5crypto3 CVE-2024-26462 中危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libk5crypto3 CVE-2024-37370 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48

libk5crypto3 CVE-2024-37371 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39

libkrb5-3 CVE-2024-26462 中危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkrb5-3 CVE-2024-37370 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48

libkrb5-3 CVE-2024-37371 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39

libkrb5support0 CVE-2024-26462 中危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkrb5support0 CVE-2024-37370 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37370

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-28 22:15 修改: 2024-08-27 17:48

libkrb5support0 CVE-2024-37371 中危 1.17-6ubuntu4.4 1.17-6ubuntu4.6 krb5: GSS message token handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37371

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-28 23:15 修改: 2024-09-18 12:39

libmount1 CVE-2024-28085 中危 2.34-0.1ubuntu9.4 2.34-0.1ubuntu9.5 util-linux: CVE-2024-28085: wall: escape sequence injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35

libnghttp2-14 CVE-2024-28182 中危 1.40.0-1ubuntu0.2 1.40.0-1ubuntu0.3 nghttp2: CONTINUATION frames DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28182

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-04-04 15:15 修改: 2024-05-01 18:15

libpam-modules CVE-2024-10041 中危 1.3.1-5ubuntu4.7 pam: libpam: Libpam vulnerable to read hashed password

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15

libpam-modules CVE-2024-10963 中危 1.3.1-5ubuntu4.7 pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15

libpam-modules-bin CVE-2024-10041 中危 1.3.1-5ubuntu4.7 pam: libpam: Libpam vulnerable to read hashed password

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15

libpam-modules-bin CVE-2024-10963 中危 1.3.1-5ubuntu4.7 pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15

libpam-runtime CVE-2024-10041 中危 1.3.1-5ubuntu4.7 pam: libpam: Libpam vulnerable to read hashed password

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15

libpam-runtime CVE-2024-10963 中危 1.3.1-5ubuntu4.7 pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15

libpam0g CVE-2024-10041 中危 1.3.1-5ubuntu4.7 pam: libpam: Libpam vulnerable to read hashed password

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10041

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-10-23 14:15 修改: 2024-12-18 10:15

libpam0g CVE-2024-10963 中危 1.3.1-5ubuntu4.7 pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-11-07 16:15 修改: 2024-11-11 18:15

libsmartcols1 CVE-2024-28085 中危 2.34-0.1ubuntu9.4 2.34-0.1ubuntu9.5 util-linux: CVE-2024-28085: wall: escape sequence injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35

libuuid1 CVE-2024-28085 中危 2.34-0.1ubuntu9.4 2.34-0.1ubuntu9.5 util-linux: CVE-2024-28085: wall: escape sequence injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35

mount CVE-2024-28085 中危 2.34-0.1ubuntu9.4 2.34-0.1ubuntu9.5 util-linux: CVE-2024-28085: wall: escape sequence injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35

util-linux CVE-2024-28085 中危 2.34-0.1ubuntu9.4 2.34-0.1ubuntu9.5 util-linux: CVE-2024-28085: wall: escape sequence injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28085

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-03-27 19:15 修改: 2024-08-26 21:35

wget CVE-2021-31879 中危 1.20.3-1ubuntu2 wget: authorization header disclosure on redirect

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31879

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2021-04-29 05:15 修改: 2022-05-13 20:52

wget CVE-2024-38428 中危 1.20.3-1ubuntu2 1.20.3-1ubuntu2.1 wget: Misinterpretation of input may lead to improper behavior

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38428

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-16 03:15 修改: 2024-10-28 21:35

libk5crypto3 CVE-2024-26458 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15

libk5crypto3 CVE-2024-26461 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

gpgsm CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

gpgv CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

git CVE-2018-1000021 低危 1:2.25.1-1ubuntu3.11 git: client prints server-sent ANSI escape codes to the terminal, allowing for unverified messages to potentially execute arbitrary commands

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000021

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2018-02-09 23:29 修改: 2024-10-24 17:58

libkrb5-3 CVE-2024-26458 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15

libkrb5-3 CVE-2024-26461 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

libc6 CVE-2016-20013 低危 2.31-0ubuntu9.14

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-20013

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2022-02-19 05:15 修改: 2022-03-03 16:43

coreutils CVE-2016-2781 低危 8.30-3ubuntu2 coreutils: Non-privileged session can escape to the parent session in chroot

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2781

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2017-02-07 15:59 修改: 2023-11-07 02:32

dirmngr CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

libkrb5support0 CVE-2024-26458 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15

libkrb5support0 CVE-2024-26461 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

krb5-locales CVE-2024-26458 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15

libncurses6 CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15

libncurses6 CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libncursesw6 CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15

libncursesw6 CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libcurl3-gnutls CVE-2024-11053 低危 7.68.0-1ubuntu2.21 7.68.0-1ubuntu2.25 curl: curl netrc password leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-12-11 08:15 修改: 2024-12-15 17:15

krb5-locales CVE-2024-26461 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

git-man CVE-2018-1000021 低危 1:2.25.1-1ubuntu3.11 git: client prints server-sent ANSI escape codes to the terminal, allowing for unverified messages to potentially execute arbitrary commands

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000021

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2018-02-09 23:29 修改: 2024-10-24 17:58

gnupg CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

gnupg-l10n CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

libgcrypt20 CVE-2024-2236 低危 1.8.5-5ubuntu1.1 libgcrypt: vulnerable to Marvin Attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2236

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-03-06 22:15 修改: 2024-11-12 18:15

gnupg-utils CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

gpg CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

gpg-agent CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

libpcre2-8-0 CVE-2022-41409 低危 10.34-7ubuntu0.1 pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2023-07-18 14:15 修改: 2023-07-27 03:46

libpcre3 CVE-2017-11164 低危 2:8.39-12ubuntu0.1 pcre: OP_KETRMAX feature in the match function in pcre_exec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38

gpg-wks-client CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

libssl1.1 CVE-2024-2511 低危 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23 openssl: Unbounded memory growth with session handling in TLSv1.3

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15

libssl1.1 CVE-2024-4741 低危 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23 openssl: Use After Free with SSL_free_buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01

libssl1.1 CVE-2024-5535 低危 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23 openssl: SSL_select_next_proto buffer overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15

libsystemd0 CVE-2023-26604 低危 245.4-4ubuntu3.23 systemd: privilege escalation via the less pager

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26604

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2023-03-03 16:15 修改: 2023-11-07 04:09

libsystemd0 CVE-2023-7008 低危 245.4-4ubuntu3.23 systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15

libtinfo6 CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15

libtinfo6 CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libudev1 CVE-2023-26604 低危 245.4-4ubuntu3.23 systemd: privilege escalation via the less pager

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26604

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2023-03-03 16:15 修改: 2023-11-07 04:09

libudev1 CVE-2023-7008 低危 245.4-4ubuntu3.23 systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2023-12-23 13:15 修改: 2024-11-22 12:15

libgssapi-krb5-2 CVE-2024-26458 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-12-06 21:15

login CVE-2013-4235 低危 1:4.8.1-1ubuntu5.20.04.5 shadow-utils: TOCTOU race conditions by copying and removing directory trees

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4235

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2019-12-03 15:15 修改: 2023-02-13 00:28

login CVE-2023-29383 低危 1:4.8.1-1ubuntu5.20.04.5 shadow: Improper input validation in shadow-utils package utility chfn

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05

libgssapi-krb5-2 CVE-2024-26461 低危 1.17-6ubuntu4.4 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

ncurses-base CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15

ncurses-base CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

ncurses-bin CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15

ncurses-bin CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

openssl CVE-2024-2511 低危 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23 openssl: Unbounded memory growth with session handling in TLSv1.3

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15

openssl CVE-2024-4741 低危 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23 openssl: Use After Free with SSL_free_buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01

openssl CVE-2024-5535 低危 1.1.1f-1ubuntu2.22 1.1.1f-1ubuntu2.23 openssl: SSL_select_next_proto buffer overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15

passwd CVE-2013-4235 低危 1:4.8.1-1ubuntu5.20.04.5 shadow-utils: TOCTOU race conditions by copying and removing directory trees

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4235

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2019-12-03 15:15 修改: 2023-02-13 00:28

passwd CVE-2023-29383 低危 1:4.8.1-1ubuntu5.20.04.5 shadow: Improper input validation in shadow-utils package utility chfn

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05

patch CVE-2018-6952 低危 2.7.6-6 patch: Double free of memory in pch.c:another_hunk() causes a crash

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6952

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2018-02-13 19:29 修改: 2019-04-17 20:29

patch CVE-2021-45261 低危 2.7.6-6 patch: Invalid Pointer via another_hunk function

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45261

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2021-12-22 18:15 修改: 2021-12-28 14:24

libc-bin CVE-2016-20013 低危 2.31-0ubuntu9.14

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-20013

镜像层: sha256:5faf9c0a9efe4675ecd21a4ec417d51077d5e75da9e673161a94e7d6cd43f92c

发布日期: 2022-02-19 05:15 修改: 2022-03-03 16:43

gpg-wks-server CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

gpgconf CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

Java (jar)
低危漏洞:0 中危漏洞:0 高危漏洞:1 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
commons-io:commons-io CVE-2024-47554 高危 2.7 2.14.0 apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15

Python (python-pkg)
低危漏洞:5 中危漏洞:24 高危漏洞:13 严重漏洞:2
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
Pillow CVE-2023-50447 严重 9.2.0 10.2.0 pillow: Arbitrary Code Execution via the environment parameter

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50447

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-01-19 20:15 修改: 2024-08-01 13:45

pyarrow CVE-2023-47248 严重 12.0.1 14.0.1 PyArrow: Arbitrary code execution when loading a malicious data file

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47248

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2023-11-09 09:15 修改: 2023-11-29 03:15

Pillow CVE-2023-44271 高危 9.2.0 10.0.0 python-pillow: uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44271

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2023-11-03 05:15 修改: 2024-03-22 11:15

Pillow CVE-2023-4863 高危 9.2.0 10.0.1 libwebp: Heap buffer overflow in WebP Codec

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4863

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2023-09-12 15:15 修改: 2024-12-20 19:00

Pillow CVE-2024-28219 高危 9.2.0 10.3.0 python-pillow: buffer overflow in _imagingcms.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28219

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-04-03 03:15 修改: 2024-08-20 20:35

Pillow GHSA-56pw-mpj4-fxww 高危 9.2.0 10.0.1 Bundled libwebp in Pillow vulnerable

漏洞详情: https://github.com/advisories/GHSA-56pw-mpj4-fxww

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

aiohttp CVE-2024-23334 高危 3.8.6 3.9.2 aiohttp: follow_symlinks directory traversal vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23334

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-01-29 23:15 修改: 2024-02-09 03:15

aiohttp CVE-2024-30251 高危 3.8.6 3.9.4 aiohttp: DoS when trying to parse malformed POST requests

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-30251

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-05-02 14:15 修改: 2024-05-02 18:00

aiohttp CVE-2024-30251 高危 3.9.3 3.9.4 aiohttp: DoS when trying to parse malformed POST requests

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-30251

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-05-02 14:15 修改: 2024-05-02 18:00

cryptography CVE-2023-0286 高危 38.0.1 39.0.1 openssl: X.400 address type confusion in X.509 GeneralName

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0286

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2023-02-08 20:15 修改: 2024-02-04 09:15

cryptography CVE-2023-50782 高危 38.0.1 42.0.0 python-cryptography: Bleichenbacher timing oracle attack against RSA decryption - incomplete fix for CVE-2020-25659

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50782

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-05 21:15 修改: 2024-09-27 19:15

cryptography CVE-2024-26130 高危 38.0.1 42.0.4 python-cryptography: NULL pointer dereference with pkcs12.serialize_key_and_certificates when called with a non-matching certificate and private key and an hmac_hash override

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26130

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-02-21 17:15 修改: 2024-02-22 19:07

Pillow CVE-2022-45199 高危 9.2.0 9.3.0 Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL.

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45199

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2022-11-14 07:15 修改: 2023-01-10 20:11

setuptools CVE-2024-6345 高危 68.2.2 70.0.0 pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00

starlette CVE-2024-47874 高危 0.36.3 0.40.0 starlette: Starlette Denial of service (DoS) via multipart/form-data

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47874

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-10-15 16:15 修改: 2024-10-16 16:38

Pygments CVE-2022-40896 中危 2.13.0 2.15.0 pygments: ReDoS in pygments

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40896

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2023-07-19 15:15 修改: 2024-03-28 03:15

aiohttp CVE-2024-27306 中危 3.9.3 3.9.4 aiohttp: XSS on index pages for static file handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27306

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-04-18 15:15 修改: 2024-05-02 03:15

aiohttp CVE-2024-42367 中危 3.9.3 3.10.2 aiohttp: python-aiohttp: Compressed files as symlinks are not protected from path traversal

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42367

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-08-12 13:38 修改: 2024-08-12 13:41

aiohttp CVE-2024-52304 中危 3.9.3 3.10.11 aiohttp: aiohttp vulnerable to request smuggling due to incorrect parsing of chunk extensions

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52304

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-11-18 21:15 修改: 2024-11-19 21:57

azure-identity CVE-2024-35255 中危 1.10.0 1.16.1 azure-identity: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/Azure/azure-sdk-for-go/sdk/azidentity

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35255

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-11 17:16 修改: 2024-06-20 16:31

aiohttp CVE-2023-49081 中危 3.8.6 3.9.0 aiohttp: HTTP request modification

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49081

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2023-11-30 07:15 修改: 2024-01-29 14:15

aiohttp CVE-2023-49082 中危 3.8.6 3.9.0 aiohttp: CRLF injection if user controls the HTTP method using aiohttp client

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49082

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2023-11-29 20:15 修改: 2024-01-29 14:15

aiohttp CVE-2024-23829 中危 3.8.6 3.9.2 python-aiohttp: http request smuggling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23829

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-01-29 23:15 修改: 2024-02-09 03:15

cryptography CVE-2023-23931 中危 38.0.1 39.0.1 python-cryptography: memory corruption via immutable objects

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23931

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2023-02-07 21:15 修改: 2024-09-05 16:09

cryptography CVE-2023-49083 中危 38.0.1 41.0.6 python-cryptography: NULL-dereference when loading PKCS7 certificates

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49083

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2023-11-29 19:15 修改: 2024-09-05 16:09

cryptography CVE-2024-0727 中危 38.0.1 42.0.2 openssl: denial of service via null dereference

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15

cryptography GHSA-39hc-v87j-747x 中危 38.0.1 38.0.3 Vulnerable OpenSSL included in cryptography wheels

漏洞详情: https://github.com/advisories/GHSA-39hc-v87j-747x

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

cryptography GHSA-h4gh-qq45-vh27 中危 38.0.1 43.0.1 pyca/cryptography has a vulnerable OpenSSL included in cryptography wheels

漏洞详情: https://github.com/advisories/GHSA-h4gh-qq45-vh27

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

cryptography GHSA-h4gh-qq45-vh27 中危 42.0.5 43.0.1 pyca/cryptography has a vulnerable OpenSSL included in cryptography wheels

漏洞详情: https://github.com/advisories/GHSA-h4gh-qq45-vh27

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

idna CVE-2024-3651 中危 3.6 3.7 python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-07-07 18:15 修改: 2024-07-11 14:58

idna CVE-2024-3651 中危 3.6 3.7 python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-07-07 18:15 修改: 2024-07-11 14:58

paramiko CVE-2023-48795 中危 2.12.0 3.4.0 ssh: Prefix truncation attack on Binary Packet Protocol (BPP)

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48795

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2023-12-18 16:15 修改: 2024-12-02 14:54

aiohttp CVE-2024-27306 中危 3.8.6 3.9.4 aiohttp: XSS on index pages for static file handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27306

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-04-18 15:15 修改: 2024-05-02 03:15

requests CVE-2024-35195 中危 2.31.0 2.32.0 requests: subsequent requests to the same host ignore cert verification

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35195

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-05-20 21:15 修改: 2024-06-10 17:16

aiohttp CVE-2024-42367 中危 3.8.6 3.10.2 aiohttp: python-aiohttp: Compressed files as symlinks are not protected from path traversal

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42367

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-08-12 13:38 修改: 2024-08-12 13:41

aiohttp CVE-2024-52304 中危 3.8.6 3.10.11 aiohttp: aiohttp vulnerable to request smuggling due to incorrect parsing of chunk extensions

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52304

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-11-18 21:15 修改: 2024-11-19 21:57

urllib3 CVE-2024-37891 中危 1.26.18 1.26.19, 2.2.2 urllib3: proxy-authorization request header is not stripped during cross-origin redirects

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37891

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44

urllib3 CVE-2024-37891 中危 2.1.0 1.26.19, 2.2.2 urllib3: proxy-authorization request header is not stripped during cross-origin redirects

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37891

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44

zipp CVE-2024-5569 中危 3.17.0 3.19.1 github.com/jaraco/zipp: Denial of Service (infinite loop) via crafted zip file in jaraco/zipp

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5569

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-07-09 00:15 修改: 2024-07-09 18:19

cryptography GHSA-v8gr-m533-ghj9 低危 38.0.1 41.0.4 Vulnerable OpenSSL included in cryptography wheels

漏洞详情: https://github.com/advisories/GHSA-v8gr-m533-ghj9

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

tqdm CVE-2024-34062 低危 4.65.0 4.66.3 python-tqdm: non-boolean CLI arguments may lead to local code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34062

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 2024-05-03 10:15 修改: 2024-06-10 17:16

certifi CVE-2024-39689 低危 2023.11.17 2024.07.04 python-certifi: Remove root certificates from `GLOBALTRUST` from the root store

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39689

镜像层: sha256:007b0c4b3150a5a73851423b09661b6444f039a7c99f360715293bc96b91ac53

发布日期: 2024-07-05 19:15 修改: 2024-12-06 14:15

cryptography GHSA-5cpq-8wj7-hf2v 低危 38.0.1 41.0.0 Vulnerable OpenSSL included in cryptography wheels

漏洞详情: https://github.com/advisories/GHSA-5cpq-8wj7-hf2v

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

cryptography GHSA-jm77-qphf-c4w8 低危 38.0.1 41.0.3 pyca/cryptography's wheels include vulnerable OpenSSL

漏洞详情: https://github.com/advisories/GHSA-jm77-qphf-c4w8

镜像层: sha256:d599c7e505a9c497618f988bbd2ecb18a2efc605d36da143b40f79ee04eb9e3d

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

/home/ray/anaconda3/lib/python3.8/site-packages/PyJWT-2.8.0.dist-info/METADATA ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/ray/anaconda3/lib/python3.8/site-packages/google/auth/crypt/__pycache__/_python_rsa.cpython-38.pyc ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/ray/anaconda3/lib/python3.8/site-packages/skimage/data/_fetchers.py ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息