docker.io/sameersbn/gitlab:17.4.3 linux/amd64

docker.io/sameersbn/gitlab:17.4.3 - Trivy安全扫描结果 扫描时间: 2024-10-27 10:43
全部漏洞信息
低危漏洞:61 中危漏洞:50 高危漏洞:17 严重漏洞:4

系统OS: ubuntu 20.04 扫描引擎: Trivy 扫描时间: 2024-10-27 10:43

docker.io/sameersbn/gitlab:17.4.3 (ubuntu 20.04) (ubuntu)
低危漏洞:53 中危漏洞:22 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
libgcrypt20 CVE-2024-2236 中危 1.8.5-5ubuntu1.1 libgcrypt: vulnerable to Marvin Attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2236

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2024-03-06 22:15 修改: 2024-09-14 04:15

libgssapi-krb5-2 CVE-2024-26462 中危 1.17-6ubuntu4.7 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libimage-exiftool-perl CVE-2022-23935 中危 11.88-1ubuntu0.1 lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ / ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23935

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2022-01-25 06:15 修改: 2023-08-08 14:21

libk5crypto3 CVE-2024-26462 中危 1.17-6ubuntu4.7 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkrb5-3 CVE-2024-26462 中危 1.17-6ubuntu4.7 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkrb5support0 CVE-2024-26462 中危 1.17-6ubuntu4.7 krb5: Memory leak at /krb5/src/kdc/ndr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26462

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

redis-tools CVE-2020-14147 中危 5:5.0.7-2ubuntu0.1 redis: integer overflow in the getnum function in lua_struct.c could lead to a DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14147

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2020-06-15 18:15 修改: 2021-07-30 13:59

redis-tools CVE-2021-32626 中危 5:5.0.7-2ubuntu0.1 redis: Lua scripts can overflow the heap-based Lua stack

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32626

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35

redis-tools CVE-2021-32627 中危 5:5.0.7-2ubuntu0.1 redis: Integer overflow issue with Streams

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32627

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35

redis-tools CVE-2021-32628 中危 5:5.0.7-2ubuntu0.1 redis: Integer overflow bug in the ziplist data structure

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32628

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35

redis-tools CVE-2021-32672 中危 5:5.0.7-2ubuntu0.1 redis: Out of bounds read in lua debugger protocol parser

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32672

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35

redis-tools CVE-2021-32675 中危 5:5.0.7-2ubuntu0.1 redis: Denial of service via Redis Standard Protocol (RESP) request

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32675

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35

redis-tools CVE-2021-32687 中危 5:5.0.7-2ubuntu0.1 redis: Integer overflow issue with intsets

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32687

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:35

redis-tools CVE-2021-41099 中危 5:5.0.7-2ubuntu0.1 redis: Integer overflow issue with strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41099

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2021-10-04 18:15 修改: 2023-11-07 03:38

redis-tools CVE-2022-24736 中危 5:5.0.7-2ubuntu0.1 redis: Malformed Lua script can crash Redis

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24736

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2022-04-27 20:15 修改: 2023-11-07 03:44

redis-tools CVE-2022-24834 中危 5:5.0.7-2ubuntu0.1 redis: heap overflow in the lua cjson and cmsgpack libraries

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24834

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2023-07-13 15:15 修改: 2023-08-14 19:15

redis-tools CVE-2022-35977 中危 5:5.0.7-2ubuntu0.1 redis: Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands may result with false OOM panic

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35977

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2023-01-20 19:15 修改: 2023-02-02 14:28

redis-tools CVE-2022-36021 中危 5:5.0.7-2ubuntu0.1 redis: Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36021

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2023-03-01 16:15 修改: 2023-11-07 03:49

redis-tools CVE-2023-25155 中危 5:5.0.7-2ubuntu0.1 redis: String matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25155

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2023-03-02 04:15 修改: 2023-03-10 05:02

redis-tools CVE-2023-28856 中危 5:5.0.7-2ubuntu0.1 redis: Insufficient validation of HINCRBYFLOAT command

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28856

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2023-04-18 21:15 修改: 2023-06-01 14:15

redis-tools CVE-2023-45145 中危 5:5.0.7-2ubuntu0.1 redis: possible bypass of Unix socket permissions on startup

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45145

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2023-10-18 21:15 修改: 2024-01-21 02:30

wget CVE-2021-31879 中危 1.20.3-1ubuntu2.1 wget: authorization header disclosure on redirect

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31879

镜像层: sha256:6b7ce9024a84c5be40d9eed7bac68a554a5498fe58880c4291ec58beaa4a2420

发布日期: 2021-04-29 05:15 修改: 2022-05-13 20:52

gnupg CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:6b7ce9024a84c5be40d9eed7bac68a554a5498fe58880c4291ec58beaa4a2420

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

gnupg-l10n CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:6b7ce9024a84c5be40d9eed7bac68a554a5498fe58880c4291ec58beaa4a2420

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

libk5crypto3 CVE-2024-26458 低危 1.17-6ubuntu4.7 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libk5crypto3 CVE-2024-26461 低危 1.17-6ubuntu4.7 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

gnupg-utils CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:6b7ce9024a84c5be40d9eed7bac68a554a5498fe58880c4291ec58beaa4a2420

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

libkrb5-3 CVE-2024-26458 低危 1.17-6ubuntu4.7 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkrb5-3 CVE-2024-26461 低危 1.17-6ubuntu4.7 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

gnupg2 CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:6b7ce9024a84c5be40d9eed7bac68a554a5498fe58880c4291ec58beaa4a2420

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

libkrb5support0 CVE-2024-26458 低危 1.17-6ubuntu4.7 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkrb5support0 CVE-2024-26461 低危 1.17-6ubuntu4.7 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

libncurses5 CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15

libncurses5 CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libncurses6 CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15

libncurses6 CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libncursesw6 CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15

libncursesw6 CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libpcre2-8-0 CVE-2022-41409 低危 10.34-7ubuntu0.1 pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2023-07-18 14:15 修改: 2023-07-27 03:46

libpcre3 CVE-2017-11164 低危 2:8.39-12ubuntu0.1 pcre: OP_KETRMAX feature in the match function in pcre_exec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-11164

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2017-07-11 03:29 修改: 2023-11-07 02:38

libpng16-16 CVE-2022-3857 低危 1.6.37-2 libpng: Null pointer dereference leads to segmentation fault

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3857

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2023-03-06 23:15 修改: 2024-10-09 04:15

libsystemd0 CVE-2023-26604 低危 245.4-4ubuntu3.24 systemd: privilege escalation via the less pager

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26604

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2023-03-03 16:15 修改: 2023-11-07 04:09

libsystemd0 CVE-2023-7008 低危 245.4-4ubuntu3.24 systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2023-12-23 13:15 修改: 2024-09-16 17:16

libtiff5 CVE-2024-6716 低危 4.1.0+git191117-2ubuntu0.20.04.14

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6716

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-07-15 15:15 修改: 2024-09-04 14:15

libtinfo5 CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15

libtinfo5 CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libtinfo6 CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15

libtinfo6 CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

libudev1 CVE-2023-26604 低危 245.4-4ubuntu3.24 systemd: privilege escalation via the less pager

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26604

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2023-03-03 16:15 修改: 2023-11-07 04:09

libudev1 CVE-2023-7008 低危 245.4-4ubuntu3.24 systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7008

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2023-12-23 13:15 修改: 2024-09-16 17:16

locales CVE-2016-20013 低危 2.31-0ubuntu9.16

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-20013

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2022-02-19 05:15 修改: 2022-03-03 16:43

login CVE-2013-4235 低危 1:4.8.1-1ubuntu5.20.04.5 shadow-utils: TOCTOU race conditions by copying and removing directory trees

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4235

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2019-12-03 15:15 修改: 2023-02-13 00:28

login CVE-2023-29383 低危 1:4.8.1-1ubuntu5.20.04.5 shadow: Improper input validation in shadow-utils package utility chfn

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05

ncurses-base CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15

ncurses-base CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

ncurses-bin CVE-2023-45918 低危 6.2-0ubuntu2.1 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2024-02-16 22:15 修改: 2024-03-15 11:15

ncurses-bin CVE-2023-50495 低危 6.2-0ubuntu2.1 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

passwd CVE-2013-4235 低危 1:4.8.1-1ubuntu5.20.04.5 shadow-utils: TOCTOU race conditions by copying and removing directory trees

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4235

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2019-12-03 15:15 修改: 2023-02-13 00:28

passwd CVE-2023-29383 低危 1:4.8.1-1ubuntu5.20.04.5 shadow: Improper input validation in shadow-utils package utility chfn

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29383

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2023-04-14 22:15 修改: 2023-04-24 18:05

gpg CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:6b7ce9024a84c5be40d9eed7bac68a554a5498fe58880c4291ec58beaa4a2420

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

gpg-agent CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:6b7ce9024a84c5be40d9eed7bac68a554a5498fe58880c4291ec58beaa4a2420

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

gpg-wks-client CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:6b7ce9024a84c5be40d9eed7bac68a554a5498fe58880c4291ec58beaa4a2420

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

gpg-wks-server CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:6b7ce9024a84c5be40d9eed7bac68a554a5498fe58880c4291ec58beaa4a2420

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

gpgconf CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:6b7ce9024a84c5be40d9eed7bac68a554a5498fe58880c4291ec58beaa4a2420

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

gpgsm CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:6b7ce9024a84c5be40d9eed7bac68a554a5498fe58880c4291ec58beaa4a2420

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

gpgv CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

graphicsmagick CVE-2017-13736 低危 1.4+really1.3.35-1ubuntu0.1 There are lots of memory leaks in the GMCommand function in magick/com ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13736

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38

libc-bin CVE-2016-20013 低危 2.31-0ubuntu9.16

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-20013

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2022-02-19 05:15 修改: 2022-03-03 16:43

libc6 CVE-2016-20013 低危 2.31-0ubuntu9.16

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-20013

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2022-02-19 05:15 修改: 2022-03-03 16:43

coreutils CVE-2016-2781 低危 8.30-3ubuntu2 coreutils: Non-privileged session can escape to the parent session in chroot

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2781

镜像层: sha256:fffe76c64ef2dee2d80a8bb3ad13d65d596d04a45510b1956a976a69215dae92

发布日期: 2017-02-07 15:59 修改: 2023-11-07 02:32

libgd3 CVE-2021-40812 低危 2.2.5-5.2ubuntu2.1 The GD Graphics Library (aka LibGD) through 2.3.2 has an out-of-bounds ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40812

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2021-09-08 21:15 修改: 2024-04-07 01:17

libgraphicsmagick-q16-3 CVE-2017-13736 低危 1.4+really1.3.35-1ubuntu0.1 There are lots of memory leaks in the GMCommand function in magick/com ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13736

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2017-08-29 06:29 修改: 2023-11-07 02:38

dirmngr CVE-2022-3219 低危 2.2.19-3ubuntu2.2 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:6b7ce9024a84c5be40d9eed7bac68a554a5498fe58880c4291ec58beaa4a2420

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

libgssapi-krb5-2 CVE-2024-26458 低危 1.17-6ubuntu4.7 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libgssapi-krb5-2 CVE-2024-26461 低危 1.17-6ubuntu4.7 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:ee276732341e20f9c07a136eabcd1e6066534c7687f58ea15f9dd6eb5dab8e45

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

Java (jar)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
Node.js (node-pkg)
低危漏洞:2 中危漏洞:5 高危漏洞:13 严重漏洞:3
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
handlebars CVE-2019-19919 严重 1.0.0 4.3.0, 3.0.8 nodejs-handlebars: prototype pollution leading to remote code execution via crafted payloads

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19919

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2019-12-20 23:15 修改: 2022-06-03 18:48

handlebars CVE-2021-23369 严重 1.0.0 4.7.7 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23369

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2021-04-12 14:15 修改: 2021-06-08 13:54

handlebars CVE-2021-23383 严重 1.0.0 4.7.7 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23383

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2021-05-04 09:15 修改: 2021-12-03 19:59

diff GHSA-h6ch-v84p-w6p9 高危 1.0.0 3.5.0 Regular Expression Denial of Service (ReDoS)

漏洞详情: https://github.com/advisories/GHSA-h6ch-v84p-w6p9

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

handlebars CVE-2019-20920 高危 1.0.0 3.0.8, 4.5.3 nodejs-handlebars: lookup helper fails to properly validate templates allowing for arbitrary JavaScript execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20920

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2020-09-30 18:15 修改: 2020-10-15 17:35

handlebars GHSA-2cf5-4w76-r9qv 高危 1.0.0 3.0.8, 4.5.2 Arbitrary Code Execution in handlebars

漏洞详情: https://github.com/advisories/GHSA-2cf5-4w76-r9qv

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

handlebars GHSA-g9r4-xpmj-mj65 高危 1.0.0 3.0.8, 4.5.3 Prototype Pollution in handlebars

漏洞详情: https://github.com/advisories/GHSA-g9r4-xpmj-mj65

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

handlebars GHSA-q2c6-c6pm-g3gh 高危 1.0.0 3.0.8, 4.5.3 Arbitrary Code Execution in handlebars

漏洞详情: https://github.com/advisories/GHSA-q2c6-c6pm-g3gh

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

handlebars GHSA-q42p-pg8m-cqh6 高危 1.0.0 4.1.2, 4.0.14, 3.0.7 Prototype Pollution in handlebars

漏洞详情: https://github.com/advisories/GHSA-q42p-pg8m-cqh6

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

ini CVE-2020-7788 高危 1.0.0 1.3.6 nodejs-ini: Prototype pollution via malicious INI file

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-7788

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2020-12-11 11:15 修改: 2022-12-02 19:40

json CVE-2020-7712 高危 1.0.0 10.0.0 trentm/json vulnerable to command injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-7712

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2020-08-30 08:15 修改: 2023-11-07 03:26

npm CVE-2018-7408 高危 1.0.1 5.7.1 Incorrect Permission Assignment for Critical Resource in NPM

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7408

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2018-02-22 18:29 修改: 2019-10-03 00:03

npm CVE-2019-16775 高危 1.0.1 6.13.3 npm: Symlink reference outside of node_modules folder through the bin field upon installation

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16775

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2019-12-13 01:15 修改: 2023-11-07 03:05

npm CVE-2019-16776 高危 1.0.1 6.13.3 npm: Arbitrary file write via constructed entry in the package.json bin field

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16776

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2019-12-13 01:15 修改: 2023-11-07 03:05

npm CVE-2019-16777 高危 1.0.1 6.13.4 npm: Global node_modules Binary Overwrite

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16777

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2019-12-13 01:15 修改: 2023-11-07 03:05

pug CVE-2021-21353 高危 1.0.0 3.0.1 pug: user provided objects as input to pug templates can achieve remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21353

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2021-03-03 02:15 修改: 2021-03-09 15:35

handlebars NSWG-ECO-519 中危 1.0.0 >=4.6.0 Denial of Service

漏洞详情: https://hackerone.com/reports/726364

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

npm CVE-2016-3956 中危 1.0.1 >= 2.15.1 <= 3.0.0, >= 3.8.3 npm: bearer token leak to non-registry hosts

漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3956

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2016-07-02 14:59 修改: 2021-06-15 16:30

npm CVE-2020-15095 中危 1.0.1 6.14.6 npm: sensitive information exposure through logs

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15095

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2020-07-07 19:15 修改: 2023-11-07 03:17

handlebars CVE-2015-8861 中危 1.0.0 >=4.0.0 The handlebars package before 4.0.0 for Node.js allows remote attacker ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8861

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2017-01-23 21:59 修改: 2020-04-22 12:54

pug CVE-2024-36361 中危 1.0.0 3.0.3 Pug allows JavaScript code execution if an application accepts untrusted input

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36361

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-05-24 06:15 修改: 2024-08-02 04:17

markdown GHSA-wx77-rp39-c6vg 低危 1.0.0 Regular Expression Denial of Service in markdown

漏洞详情: https://github.com/advisories/GHSA-wx77-rp39-c6vg

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

npm CVE-2013-4116 低危 1.0.1 >=1.3.3 npm: Insecure temporary directory generation

漏洞详情: https://avd.aquasec.com/nvd/cve-2013-4116

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2014-04-22 14:23 修改: 2020-10-14 13:21

Ruby (gemspec)
低危漏洞:5 中危漏洞:18 高危漏洞:3 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
google-protobuf CVE-2024-7254 高危 3.25.4 ~> 3.25.5, ~> 4.27.5, >= 4.28.2 protobuf: StackOverflow vulnerability in Protocol Buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-09-19 01:15 修改: 2024-09-20 12:30

webrick CVE-2024-47220 高危 1.8.1 >= 1.8.2 WEBrick: HTTP request smuggling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47220

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-09-22 01:15 修改: 2024-09-26 13:32

webrick CVE-2024-47220 高危 1.8.1 >= 1.8.2 WEBrick: HTTP request smuggling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47220

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-09-22 01:15 修改: 2024-09-26 13:32

fugit CVE-2024-43380 中危 1.8.1 >= 1.11.1 fugit: Improper input validation in "natural" parser may lead to DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43380

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-08-19 15:15 修改: 2024-08-21 12:38

carrierwave CVE-2023-49090 中危 1.3.4 ~> 2.2.5, >= 3.0.5 CarrierWave is a solution for file uploads for Rails, Sinatra and othe ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49090

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2023-11-29 15:15 修改: 2023-12-05 16:25

nokogiri GHSA-vcc3-rw6f-jv97 中危 1.16.0 1.15.6, 1.16.2 Use-after-free in libxml2 via Nokogiri::XML::Reader

漏洞详情: https://github.com/advisories/GHSA-vcc3-rw6f-jv97

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

nokogiri GHSA-xc9x-jj77-9p9j 中危 1.16.0 ~> 1.15.6, >= 1.16.2 Use-after-free in libxml2 via Nokogiri::XML::Reader

漏洞详情: https://github.com/advisories/GHSA-xc9x-jj77-9p9j

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

puma CVE-2024-21647 中危 6.4.0 ~> 5.6.8, >= 6.4.2 rubygem-puma: HTTP request smuggling when parsing chunked Transfer-Encoding Bodies

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21647

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-01-08 14:15 修改: 2024-01-11 17:31

puma CVE-2024-45614 中危 6.4.0 ~> 5.6.9, >= 6.4.3 rubygem-puma: Header normalization allows for client to clobber proxy set headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45614

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-09-19 23:15 修改: 2024-09-26 13:28

rexml CVE-2024-39908 中危 3.3.1 >= 3.3.2 rexml: DoS vulnerability in REXML

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39908

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-07-16 18:15 修改: 2024-07-17 13:34

rexml CVE-2024-41123 中危 3.3.1 >= 3.3.3 rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]>

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41123

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-08-01 15:15 修改: 2024-10-10 12:56

rexml CVE-2024-41946 中危 3.3.1 >= 3.3.3 rexml: DoS vulnerability in REXML

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41946

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-08-01 15:15 修改: 2024-09-05 16:09

rexml CVE-2024-43398 中危 3.3.1 >= 3.3.6 rexml: DoS vulnerability in REXML

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43398

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-08-22 15:15 修改: 2024-08-23 16:18

rexml CVE-2024-41123 中危 3.3.2 >= 3.3.3 rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]>

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41123

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-08-01 15:15 修改: 2024-10-10 12:56

rexml CVE-2024-41123 中危 3.3.2 >= 3.3.3 rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]>

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41123

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-08-01 15:15 修改: 2024-10-10 12:56

rexml CVE-2024-41946 中危 3.3.2 >= 3.3.3 rexml: DoS vulnerability in REXML

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41946

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-08-01 15:15 修改: 2024-09-05 16:09

rexml CVE-2024-41946 中危 3.3.2 >= 3.3.3 rexml: DoS vulnerability in REXML

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41946

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-08-01 15:15 修改: 2024-09-05 16:09

rexml CVE-2024-43398 中危 3.3.2 >= 3.3.6 rexml: DoS vulnerability in REXML

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43398

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-08-22 15:15 修改: 2024-08-23 16:18

rexml CVE-2024-43398 中危 3.3.2 >= 3.3.6 rexml: DoS vulnerability in REXML

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43398

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-08-22 15:15 修改: 2024-08-23 16:18

carrierwave CVE-2024-29034 中危 1.3.4 ~> 2.2.6, >= 3.0.7 CarrierWave content-Type allowlist bypass vulnerability which possibly leads to XSS remained

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29034

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-03-24 20:15 修改: 2024-03-25 01:51

devise-two-factor CVE-2024-8796 中危 4.1.1 >= 6.0.0 Under the default configuration, Devise-Two-Factor versions >= 2.2.0 & ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8796

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-09-17 18:15 修改: 2024-09-30 14:10

nokogiri GHSA-r95h-9x8f-r3f7 低危 1.16.0 >= 1.16.5 Nokogiri updates packaged libxml2 to v2.12.7 to resolve CVE-2024-34459

漏洞详情: https://github.com/advisories/GHSA-r95h-9x8f-r3f7

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

actiontext CVE-2024-47888 低危 7.0.8.4 ~> 6.1.7.9, ~> 7.0.8.5, ~> 7.1.4.1, >= 7.2.1.1 rubygem-actiontext: Possible ReDoS vulnerability in plain_text_for_blockquote_node in Action Text

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47888

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-10-16 21:15 修改: 2024-10-18 12:53

actionmailer CVE-2024-47889 低危 7.0.8.4 ~> 6.1.7.9, ~> 7.0.8.5, ~> 7.1.4.1, >= 7.2.1.1 rubygem-actionmailer: Possible ReDoS vulnerability in block_format in Action Mailer

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47889

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-10-16 21:15 修改: 2024-10-18 12:53

actionpack CVE-2024-41128 低危 7.0.8.4 ~> 6.1.7.9, ~> 7.0.8.5, ~> 7.1.4.1, >= 7.2.1.1 rubygem-actionpack: Possible ReDoS vulnerability in query parameter filtering in Action Dispatch

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41128

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-10-16 18:15 修改: 2024-10-18 12:53

actionpack CVE-2024-47887 低危 7.0.8.4 ~> 6.1.7.9, ~> 7.0.8.5, ~> 7.1.4.1, >= 7.2.1.1 rubygem-actionpack: Possible ReDoS vulnerability in HTTP Token authentication in Action Controller

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47887

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-10-16 20:15 修改: 2024-10-18 12:53

home/git/gitlab-shell/bin/gitlab-shell (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
home/git/gitlab-shell/bin/gitlab-shell-authorized-keys-check (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
home/git/gitlab-shell/bin/gitlab-shell-authorized-principals-check (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
home/git/gitlab-shell/bin/gitlab-shell-check (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
home/git/gitlab-shell/bin/gitlab-sshd (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
home/git/gitlab/vendor/bundle/ruby/3.2.0/gems/devfile-0.0.28.pre.alpha1-x86_64-linux/bin/devfile (gobinary)
低危漏洞:0 中危漏洞:5 高危漏洞:1 严重漏洞:1
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
github.com/docker/docker CVE-2024-41110 严重 v25.0.1+incompatible 23.0.15, 26.1.5, 27.1.1, 25.0.6 moby: Authz zero length regression

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41110

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-07-24 17:15 修改: 2024-07-30 20:15

stdlib CVE-2024-34156 高危 1.22.5 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

github.com/docker/docker CVE-2024-29018 中危 v25.0.1+incompatible 26.0.0-rc3, 25.0.5, 23.0.11 moby: external DNS requests from 'internal' networks could lead to data exfiltration

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29018

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-03-20 21:15 修改: 2024-03-21 12:58

golang.org/x/net CVE-2023-45288 中危 v0.22.0 0.23.0 golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45288

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-04-04 21:15 修改: 2024-08-26 21:35

github.com/docker/docker CVE-2024-24557 中危 v25.0.1+incompatible 24.0.9, 25.0.2 moby: classic builder cache poisoning

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24557

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-02-01 17:15 修改: 2024-02-09 20:21

stdlib CVE-2024-34155 中危 1.22.5 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-09-06 21:15 修改: 2024-09-09 13:03

stdlib CVE-2024-34158 中危 1.22.5 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35

home/git/gitlab/vendor/bundle/ruby/3.2.0/gems/gitlab-glfm-markdown-0.0.20-x86_64-linux/Cargo.lock (cargo)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
home/git/gitlab/vendor/bundle/ruby/3.2.0/gems/prometheus-client-mmap-1.1.1-x86_64-linux/ext/fast_mmaped_file_rs/Cargo.lock (cargo)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
usr/local/bin/gitaly (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
usr/local/bin/gitaly-backup (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
usr/local/bin/gitaly-blackbox (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
usr/local/bin/gitaly-debug (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
usr/local/bin/gitaly-wrapper (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
usr/local/bin/gitlab-pages (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
usr/local/bin/gitlab-resize-image (gobinary)
低危漏洞:1 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
github.com/disintegration/imaging CVE-2023-36308 低危 v1.6.2 disintegration Imaging 1.6.2 allows attackers to cause a panic (becaus ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36308

镜像层: sha256:68fbbff7cd8c742a904b1d73afa4cfad8404256673efa4c3c5834316d4ac1297

发布日期: 2023-09-05 04:15 修改: 2024-08-02 17:16

usr/local/bin/gitlab-workhorse (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
usr/local/bin/gitlab-zip-cat (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
usr/local/bin/gitlab-zip-metadata (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
usr/local/bin/praefect (gobinary)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/config/secrets.yml ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/qa/tls_certificates/authority/ca.key ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/lib/gitlab/middleware/handle_malformed_strings_spec.rb ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/app/models/integrations/diffblue_cover.rb ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/gems/gitlab-secret_detection/spec/lib/gitlab/secret_detection/scan_spec.rb ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/fixtures/ssl_key.pem ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/frontend/diffs/store/actions_spec.js ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/lib/json_web_token/rsa_token_spec.rb ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/etc/ssh/ssh_host_rsa_key ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/qa/tls_certificates/client/client.key ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/models/integrations/prometheus_spec.rb ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/etc/ssh/ssh_host_ed25519_key ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/lib/api/helpers/integrations_helpers.rb ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/qa/tls_certificates/authority/ca.pem ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/frontend/lib/utils/mock_data.js ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/frontend/notes/components/comment_form_spec.js ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/app/models/integrations/prometheus.rb ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/factories/integrations.rb ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/features/projects/integrations/user_activates_slack_notifications_spec.rb ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/fixtures/service_account.json ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/frontend/lib/utils/secret_detection_spec.js ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/frontend/notes/components/noteable_note_spec.js ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/models/integrations/diffblue_cover_spec.rb ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/config/gitleaks.toml ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/doc/api/openapi/openapi_v2.yaml ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/factories/pages_domains.rb ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/fixtures/clusters/sample_key.key ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/fixtures/x509_certificate_pk.key ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/frontend/issuable/issuable_form_spec.js ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/features/profiles/user_edit_profile_spec.rb ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/frontend/diffs/stores/legacy_diffs/actions_spec.js ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/frontend/issues/show/components/app_spec.js ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/lib/gitlab/auth/ldap/config_spec.rb ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/etc/ssh/ssh_host_ecdsa_key ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/etc/ssl/private/ssl-cert-snakeoil.key ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/qa/tls_certificates/client/client.pem ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/fixtures/auth_key.p8 ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
/home/git/gitlab/spec/support/helpers/gpg_helpers.rb ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息