com.h2database:h2 |
CVE-2021-42392 |
严重 |
1.4.199 |
2.0.206 |
h2: Remote Code Execution in Console
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42392
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-01-10 14:10 修改: 2023-02-24 22:15
|
com.h2database:h2 |
CVE-2022-23221 |
严重 |
1.4.199 |
2.1.210 |
h2: Loading of custom classes from remote servers through JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23221
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-01-19 17:15 修改: 2023-08-18 14:15
|
com.hazelcast:hazelcast |
CVE-2022-36437 |
严重 |
4.2 |
3.12.13, 4.1.10, 4.2.6, 5.0.4, 5.1.3 |
hazelcast: Hazelcast connection caching
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36437
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-12-29 23:15 修改: 2023-01-09 18:33
|
com.hazelcast:hazelcast |
GHSA-v57x-gxfj-484q |
严重 |
4.2 |
5.0.2, 4.0.5, 4.1.8, 4.2.4 |
Security Advisory for "Log4Shell"
漏洞详情: https://github.com/advisories/GHSA-v57x-gxfj-484q
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
org.postgresql:postgresql |
CVE-2024-1597 |
严重 |
42.3.3 |
42.2.28, 42.3.9, 42.4.4, 42.5.5, 42.6.1, 42.7.2 |
pgjdbc: PostgreSQL JDBC Driver allows attacker to inject SQL if using PreferQueryMode=SIMPLE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1597
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-02-19 13:15 修改: 2024-06-10 17:16
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.13.2.2 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.dataformat:jackson-dataformat-cbor |
CVE-2020-28491 |
高危 |
2.10.4 |
2.11.4, 2.12.1 |
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28491
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2021-02-18 16:15 修改: 2022-12-06 21:44
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.6.2 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.6.2 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.7 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.7 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.code.gson:gson |
CVE-2022-25647 |
高危 |
2.8.6 |
2.8.9 |
com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
3.11.4 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
3.11.4 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
3.11.4 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
3.11.4 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
3.11.4 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
3.21.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
3.21.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
3.21.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
3.21.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
3.21.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
3.21.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
3.8.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22569 |
高危 |
3.8.0 |
3.16.1, 3.18.2, 3.19.2 |
protobuf-java: potential DoS in the parsing procedure for binary data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
3.8.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2021-22570 |
高危 |
3.8.0 |
3.15.0 |
protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
3.8.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3509 |
高危 |
3.8.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Textformat parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
3.8.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2022-3510 |
高危 |
3.8.0 |
3.16.3, 3.19.6, 3.20.3, 3.21.7 |
protobuf-java: Message-Type Extensions parsing issue leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
3.8.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
3.8.0 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
ch.qos.logback:logback-classic |
CVE-2023-6378 |
高危 |
1.2.3 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
ch.qos.logback:logback-classic |
CVE-2023-6378 |
高危 |
1.2.3 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
com.h2database:h2 |
CVE-2021-23463 |
高危 |
1.4.199 |
2.0.202 |
h2database: XXE injection vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23463
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2021-12-10 20:15 修改: 2023-08-18 14:15
|
com.h2database:h2 |
CVE-2022-45868 |
高危 |
1.4.199 |
2.2.220 |
The web-based admin console in H2 Database Engine before 2.2.220 can b ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45868
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-11-23 21:15 修改: 2024-08-03 15:15
|
ch.qos.logback:logback-core |
CVE-2023-6378 |
高危 |
1.2.3 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
ch.qos.logback:logback-core |
CVE-2023-6378 |
高危 |
1.2.3 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-11-29 12:15 修改: 2024-11-29 12:15
|
com.hazelcast:hazelcast |
CVE-2023-33265 |
高危 |
4.2 |
5.2.4, 5.1.7, 5.0.5 |
Hazelcast Executor Services don't check client permissions properly
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33265
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-07-18 16:15 修改: 2023-07-28 13:20
|
com.hazelcast:hazelcast |
CVE-2023-45859 |
高危 |
4.2 |
5.2.5, 5.3.5 |
Missing permission checks on Hazelcast client protocol
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45859
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-02-28 22:15 修改: 2024-11-29 17:15
|
com.hazelcast:hazelcast |
CVE-2023-45860 |
高危 |
4.2 |
5.3.5, 5.2.5 |
Hazelcast: Permission checking in CSV File Source connector
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45860
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-02-16 10:15 修改: 2024-11-06 17:35
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.8.0 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.8.0 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.8.0 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.8.0 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.8.0 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-10-03 12:15 修改: 2024-12-04 15:15
|
io.netty:netty-codec |
CVE-2021-37136 |
高危 |
4.1.66.Final |
4.1.68.Final |
netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
io.netty:netty-codec |
CVE-2021-37137 |
高危 |
4.1.66.Final |
4.1.68.Final |
netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.20 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.20 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.20 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.eclipse.jgit:org.eclipse.jgit |
CVE-2023-4759 |
高危 |
5.9.0.202009080501-r |
6.6.1.202309021850-r, 5.13.3.202401111512-r |
jgit: arbitrary file overwrite
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4759
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-09-12 10:15 修改: 2024-08-07 17:30
|
org.elasticsearch:elasticsearch |
CVE-2023-31418 |
高危 |
7.16.2 |
7.17.13, 8.9.0 |
elasticsearch: uncontrolled resource consumption
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31418
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-10-26 18:15 修改: 2023-11-30 22:15
|
org.json:json |
CVE-2022-45688 |
高危 |
20201115 |
20230227 |
json stack overflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16
|
org.json:json |
CVE-2023-5072 |
高危 |
20201115 |
20231013 |
JSON-java: parser confusion leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5072
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-10-12 17:15 修改: 2024-06-21 19:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.13.2.2 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
org.postgresql:postgresql |
CVE-2022-31197 |
高危 |
42.3.3 |
42.2.26, 42.4.1, 42.3.7 |
postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31197
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-08-03 19:15 修改: 2023-11-07 03:47
|
org.yaml:snakeyaml |
CVE-2022-1471 |
高危 |
1.26 |
2.0 |
SnakeYaml: Constructor Deserialization Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15
|
org.yaml:snakeyaml |
CVE-2022-25857 |
高危 |
1.26 |
1.31 |
snakeyaml: Denial of Service due to missing nested depth limitation for collections
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25857
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-08-30 05:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-1471 |
高危 |
1.33 |
2.0 |
SnakeYaml: Constructor Deserialization Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
6.2.6 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
ch.qos.logback:logback-core |
CVE-2024-12798 |
中危 |
1.2.3 |
1.5.13, 1.3.15 |
logback-core: arbitrary code execution via JaninoEventEvaluator
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12798
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-12-19 16:15 修改: 2025-01-03 14:15
|
ch.qos.logback:logback-core |
CVE-2021-42550 |
中危 |
1.2.3 |
1.2.9 |
logback: remote code execution through JNDI call from within its configuration file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42550
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2021-12-16 19:15 修改: 2022-12-12 21:13
|
com.hazelcast:hazelcast |
CVE-2023-33264 |
中危 |
4.2 |
5.3.0 |
hazelcast: Improper password mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33264
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-05-22 01:15 修改: 2023-06-02 17:41
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.17.2 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.17.2 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
ch.qos.logback:logback-core |
CVE-2021-42550 |
中危 |
1.2.3 |
1.2.9 |
logback: remote code execution through JNDI call from within its configuration file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42550
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2021-12-16 19:15 修改: 2022-12-12 21:13
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
3.21.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
3.21.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
ch.qos.logback:logback-core |
CVE-2024-12798 |
中危 |
1.2.3 |
1.5.13, 1.3.15 |
logback-core: arbitrary code execution via JaninoEventEvaluator
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12798
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-12-19 16:15 修改: 2025-01-03 14:15
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.2.0 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
10.0.1 |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
28.2-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
io.netty:netty-codec-http |
CVE-2021-43797 |
中危 |
4.1.66.Final |
4.1.71.Final |
netty: control chars in header names may lead to HTTP request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47
|
io.netty:netty-codec-http |
CVE-2022-24823 |
中危 |
4.1.66.Final |
4.1.77.Final |
netty: world readable temporary file containing sensitive data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24823
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-05-06 12:15 修改: 2022-12-03 14:25
|
io.netty:netty-codec-http |
CVE-2024-29025 |
中危 |
4.1.66.Final |
4.1.108.Final |
netty-codec-http: Allocation of Resources Without Limits or Throttling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29025
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-03-25 20:15 修改: 2024-06-21 22:15
|
io.netty:netty-common |
CVE-2024-47535 |
中危 |
4.1.66.Final |
4.1.115 |
netty: Denial of Service attack on windows app using Netty
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01
|
io.netty:netty-handler |
CVE-2023-34462 |
中危 |
4.1.66.Final |
4.1.94.Final |
netty: SniHandler 16MB allocation leads to OOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34462
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-06-22 23:15 修改: 2024-06-21 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
28.2-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
30.1.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
30.1.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
30.1.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.2.0 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
org.apache.httpcomponents:httpclient |
CVE-2020-13956 |
中危 |
4.5.10 |
4.5.13, 5.0.3 |
apache-httpclient: incorrect handling of malformed authority component in request URIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17
|
org.apache.logging.log4j:log4j-core |
CVE-2021-44832 |
中危 |
2.17.0 |
2.3.2, 2.12.4, 2.17.1 |
log4j-core: remote code execution via JDBC Appender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44832
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2021-12-28 20:15 修改: 2023-11-07 03:39
|
org.apache.santuario:xmlsec |
CVE-2023-44483 |
中危 |
2.2.3 |
2.3.4, 2.2.6, 3.0.3 |
santuario: Private Key disclosure in debug-log output
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44483
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-10-20 10:15 修改: 2023-10-27 18:49
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.2.0 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
3.8.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
org.elasticsearch:elasticsearch |
CVE-2022-23708 |
中危 |
7.16.2 |
7.17.1 |
elasticsearch: privilege escalation vulnerability (ESA-2022-02)
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23708
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-03-03 22:15 修改: 2023-07-03 20:34
|
org.elasticsearch:elasticsearch |
CVE-2023-31417 |
中危 |
7.16.2 |
7.17.13, 8.9.2 |
elasticsearch: Sensitive information in audit logs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31417
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-10-26 18:15 修改: 2024-01-03 19:02
|
org.elasticsearch:elasticsearch |
CVE-2023-31419 |
中危 |
7.16.2 |
7.17.13, 8.9.1 |
elasticsearch: StackOverflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31419
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-10-26 18:15 修改: 2024-02-01 02:16
|
org.elasticsearch:elasticsearch |
CVE-2023-46673 |
中危 |
7.16.2 |
7.17.14, 8.10.3 |
elasticsearch: Improper Handling of Exceptional Conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46673
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2023-11-22 10:15 修改: 2023-11-30 20:22
|
org.elasticsearch:elasticsearch |
CVE-2023-49921 |
中危 |
7.16.2 |
7.17.16, 8.11.2 |
elasticsearch: Insertion of Sensitive Information into Log File
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49921
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-07-26 05:15 修改: 2024-09-11 14:09
|
org.elasticsearch:elasticsearch |
CVE-2024-23444 |
中危 |
7.16.2 |
8.13.0, 7.17.23 |
Elasticsearch stores private key on disk unencrypted
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23444
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-07-31 18:15 修改: 2024-08-01 12:42
|
org.elasticsearch:elasticsearch |
CVE-2024-23450 |
中危 |
7.16.2 |
7.17.19, 8.13.0 |
elasticsearch: Possible denial of service when processing documents in a deeply nested pipeline
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23450
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-03-27 17:15 修改: 2024-06-10 17:16
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
3.8.0 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.2.0 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.2.0 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.2.0 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
org.postgresql:postgresql |
CVE-2022-41946 |
中危 |
42.3.3 |
42.2.27, 42.3.8, 42.4.3, 42.5.1 |
postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41946
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-11-23 20:15 修改: 2024-03-29 13:15
|
com.google.protobuf:protobuf-java |
CVE-2022-3171 |
中危 |
3.11.4 |
3.21.7, 3.20.3, 3.19.6, 3.16.3 |
protobuf-java: timeout in parser leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.2.0 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
org.yaml:snakeyaml |
CVE-2022-38749 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38749
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38750 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38750
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38751 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38751
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38752 |
中危 |
1.26 |
1.32 |
snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-41854 |
中危 |
1.26 |
1.32 |
dev-java/snakeyaml: DoS via stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15
|
com.fasterxml.woodstox:woodstox-core |
CVE-2022-40152 |
中危 |
5.2.1 |
6.4.0, 5.4.0 |
woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
28.2-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
28.2-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
10.0.1 |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
ch.qos.logback:logback-core |
CVE-2024-12801 |
低危 |
1.2.3 |
1.5.13, 1.3.15 |
logback-core: SaxEventRecorder vulnerable to Server-Side Request Forgery (SSRF) attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12801
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-12-19 17:15 修改: 2025-01-03 14:15
|
ch.qos.logback:logback-core |
CVE-2024-12801 |
低危 |
1.2.3 |
1.5.13, 1.3.15 |
logback-core: SaxEventRecorder vulnerable to Server-Side Request Forgery (SSRF) attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12801
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2024-12-19 17:15 修改: 2025-01-03 14:15
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
30.1.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
30.1.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
30.1.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:40806b8eefb3a8e2c4c1b5a82db2801a6859a188c8a702f0eb19bec30e0124fa
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|