docker.io/shuiche/mind-map:latest linux/amd64

docker.io/shuiche/mind-map:latest - Trivy安全扫描结果 扫描时间: 2024-10-27 08:12
全部漏洞信息
低危漏洞:2 中危漏洞:21 高危漏洞:2 严重漏洞:1

系统OS: alpine 3.20.0 扫描引擎: Trivy 扫描时间: 2024-10-27 08:12

docker.io/shuiche/mind-map:latest (alpine 3.20.0) (alpine)
低危漏洞:2 中危漏洞:12 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
busybox CVE-2023-42364 中危 1.36.1-r28 1.36.1-r29 busybox: use-after-free

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42364

镜像层: sha256:02f2bcb26af5ea6d185dcf509dc795746d907ae10c53918b6944ac85447a0c72

发布日期: 2023-11-27 23:15 修改: 2024-10-11 21:36

busybox CVE-2023-42365 中危 1.36.1-r28 1.36.1-r29 busybox: use-after-free

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42365

镜像层: sha256:02f2bcb26af5ea6d185dcf509dc795746d907ae10c53918b6944ac85447a0c72

发布日期: 2023-11-27 23:15 修改: 2023-11-30 05:08

busybox-binsh CVE-2023-42364 中危 1.36.1-r28 1.36.1-r29 busybox: use-after-free

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42364

镜像层: sha256:02f2bcb26af5ea6d185dcf509dc795746d907ae10c53918b6944ac85447a0c72

发布日期: 2023-11-27 23:15 修改: 2024-10-11 21:36

busybox-binsh CVE-2023-42365 中危 1.36.1-r28 1.36.1-r29 busybox: use-after-free

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42365

镜像层: sha256:02f2bcb26af5ea6d185dcf509dc795746d907ae10c53918b6944ac85447a0c72

发布日期: 2023-11-27 23:15 修改: 2023-11-30 05:08

libcrypto3 CVE-2024-4741 中危 3.3.0-r2 3.3.0-r3 openssl: Use After Free with SSL_free_buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741

镜像层: sha256:02f2bcb26af5ea6d185dcf509dc795746d907ae10c53918b6944ac85447a0c72

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

libcrypto3 CVE-2024-5535 中危 3.3.0-r2 3.3.1-r1 openssl: SSL_select_next_proto buffer overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535

镜像层: sha256:02f2bcb26af5ea6d185dcf509dc795746d907ae10c53918b6944ac85447a0c72

发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15

libcrypto3 CVE-2024-6119 中危 3.3.0-r2 3.3.2-r0 openssl: Possible denial of service in X.509 name checks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119

镜像层: sha256:02f2bcb26af5ea6d185dcf509dc795746d907ae10c53918b6944ac85447a0c72

发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35

libssl3 CVE-2024-4741 中危 3.3.0-r2 3.3.0-r3 openssl: Use After Free with SSL_free_buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741

镜像层: sha256:02f2bcb26af5ea6d185dcf509dc795746d907ae10c53918b6944ac85447a0c72

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

libssl3 CVE-2024-5535 中危 3.3.0-r2 3.3.1-r1 openssl: SSL_select_next_proto buffer overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535

镜像层: sha256:02f2bcb26af5ea6d185dcf509dc795746d907ae10c53918b6944ac85447a0c72

发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15

libssl3 CVE-2024-6119 中危 3.3.0-r2 3.3.2-r0 openssl: Possible denial of service in X.509 name checks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119

镜像层: sha256:02f2bcb26af5ea6d185dcf509dc795746d907ae10c53918b6944ac85447a0c72

发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35

ssl_client CVE-2023-42364 中危 1.36.1-r28 1.36.1-r29 busybox: use-after-free

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42364

镜像层: sha256:02f2bcb26af5ea6d185dcf509dc795746d907ae10c53918b6944ac85447a0c72

发布日期: 2023-11-27 23:15 修改: 2024-10-11 21:36

ssl_client CVE-2023-42365 中危 1.36.1-r28 1.36.1-r29 busybox: use-after-free

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42365

镜像层: sha256:02f2bcb26af5ea6d185dcf509dc795746d907ae10c53918b6944ac85447a0c72

发布日期: 2023-11-27 23:15 修改: 2023-11-30 05:08

libcrypto3 CVE-2024-9143 低危 3.3.0-r2 3.3.2-r1 openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143

镜像层: sha256:02f2bcb26af5ea6d185dcf509dc795746d907ae10c53918b6944ac85447a0c72

发布日期: 2024-10-16 17:15 修改: 2024-10-18 12:53

libssl3 CVE-2024-9143 低危 3.3.0-r2 3.3.2-r1 openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143

镜像层: sha256:02f2bcb26af5ea6d185dcf509dc795746d907ae10c53918b6944ac85447a0c72

发布日期: 2024-10-16 17:15 修改: 2024-10-18 12:53

app/server (gobinary)
低危漏洞:0 中危漏洞:9 高危漏洞:2 严重漏洞:1
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
stdlib CVE-2024-24790 严重 1.21.9 1.21.11, 1.22.4 golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24790

镜像层: sha256:fe524ded8b308142f5d2bd99ebadb96c8d4248b01021988db421794a3aba58ef

发布日期: 2024-06-05 16:15 修改: 2024-09-03 18:35

golang.org/x/net CVE-2023-39325 高危 v0.10.0 0.17.0 golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39325

镜像层: sha256:fe524ded8b308142f5d2bd99ebadb96c8d4248b01021988db421794a3aba58ef

发布日期: 2023-10-11 22:15 修改: 2024-04-28 04:15

stdlib CVE-2024-34156 高危 1.21.9 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:fe524ded8b308142f5d2bd99ebadb96c8d4248b01021988db421794a3aba58ef

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

golang.org/x/net CVE-2023-44487 中危 v0.10.0 0.17.0 HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487

镜像层: sha256:fe524ded8b308142f5d2bd99ebadb96c8d4248b01021988db421794a3aba58ef

发布日期: 2023-10-10 14:15 修改: 2024-08-14 19:57

golang.org/x/net CVE-2023-45288 中危 v0.10.0 0.23.0 golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45288

镜像层: sha256:fe524ded8b308142f5d2bd99ebadb96c8d4248b01021988db421794a3aba58ef

发布日期: 2024-04-04 21:15 修改: 2024-08-26 21:35

google.golang.org/protobuf CVE-2024-24786 中危 v1.30.0 1.33.0 golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24786

镜像层: sha256:fe524ded8b308142f5d2bd99ebadb96c8d4248b01021988db421794a3aba58ef

发布日期: 2024-03-05 23:15 修改: 2024-06-10 18:15

golang.org/x/crypto CVE-2023-48795 中危 v0.9.0 0.17.0 ssh: Prefix truncation attack on Binary Packet Protocol (BPP)

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48795

镜像层: sha256:fe524ded8b308142f5d2bd99ebadb96c8d4248b01021988db421794a3aba58ef

发布日期: 2023-12-18 16:15 修改: 2024-05-01 18:15

golang.org/x/net CVE-2023-3978 中危 v0.10.0 0.13.0 golang.org/x/net/html: Cross site scripting

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3978

镜像层: sha256:fe524ded8b308142f5d2bd99ebadb96c8d4248b01021988db421794a3aba58ef

发布日期: 2023-08-02 20:15 修改: 2023-11-07 04:20

stdlib CVE-2024-24789 中危 1.21.9 1.21.11, 1.22.4 golang: archive/zip: Incorrect handling of certain ZIP files

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24789

镜像层: sha256:fe524ded8b308142f5d2bd99ebadb96c8d4248b01021988db421794a3aba58ef

发布日期: 2024-06-05 16:15 修改: 2024-07-03 01:48

stdlib CVE-2024-24791 中危 1.21.9 1.21.12, 1.22.5 net/http: Denial of service due to improper 100-continue handling in net/http

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24791

镜像层: sha256:fe524ded8b308142f5d2bd99ebadb96c8d4248b01021988db421794a3aba58ef

发布日期: 2024-07-02 22:15 修改: 2024-07-08 14:17

stdlib CVE-2024-34155 中危 1.21.9 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:fe524ded8b308142f5d2bd99ebadb96c8d4248b01021988db421794a3aba58ef

发布日期: 2024-09-06 21:15 修改: 2024-09-09 13:03

stdlib CVE-2024-34158 中危 1.21.9 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:fe524ded8b308142f5d2bd99ebadb96c8d4248b01021988db421794a3aba58ef

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35