expat |
CVE-2023-52425 |
高危 |
2.5.0-1.amzn2023.0.4 |
2.6.3-1.amzn2023.0.1 |
expat: parsing large tokens can trigger a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-02-04 20:15 修改: 2024-08-26 20:35
|
expat |
CVE-2024-45490 |
高危 |
2.5.0-1.amzn2023.0.4 |
2.6.3-1.amzn2023.0.1 |
libexpat: Negative Length Parsing Vulnerability in libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24
|
java-17-amazon-corretto |
CVE-2024-21208 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: HTTP client improper handling of maxHeaderSize (8328286)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21208
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-31 13:35
|
java-17-amazon-corretto |
CVE-2024-21210 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: Array indexing integer overflow (8328544)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21210
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-31 13:35
|
java-17-amazon-corretto |
CVE-2024-21217 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: Unbounded allocation leads to out-of-memory error (8331446)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21217
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-18 18:29
|
java-17-amazon-corretto |
CVE-2024-21235 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: Integer conversion error leads to incorrect range check (8332644)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21235
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-18 18:30
|
java-17-amazon-corretto-devel |
CVE-2024-21208 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: HTTP client improper handling of maxHeaderSize (8328286)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21208
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-31 13:35
|
java-17-amazon-corretto-devel |
CVE-2024-21210 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: Array indexing integer overflow (8328544)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21210
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-31 13:35
|
java-17-amazon-corretto-devel |
CVE-2024-21217 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: Unbounded allocation leads to out-of-memory error (8331446)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21217
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-18 18:29
|
java-17-amazon-corretto-devel |
CVE-2024-21235 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: Integer conversion error leads to incorrect range check (8332644)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21235
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-18 18:30
|
java-17-amazon-corretto-headless |
CVE-2024-21208 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: HTTP client improper handling of maxHeaderSize (8328286)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21208
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-31 13:35
|
java-17-amazon-corretto-headless |
CVE-2024-21210 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: Array indexing integer overflow (8328544)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21210
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-31 13:35
|
java-17-amazon-corretto-headless |
CVE-2024-21217 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: Unbounded allocation leads to out-of-memory error (8331446)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21217
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-18 18:29
|
java-17-amazon-corretto-headless |
CVE-2024-21235 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: Integer conversion error leads to incorrect range check (8332644)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21235
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-18 18:30
|
java-17-amazon-corretto-jmods |
CVE-2024-21208 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: HTTP client improper handling of maxHeaderSize (8328286)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21208
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-31 13:35
|
java-17-amazon-corretto-jmods |
CVE-2024-21210 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: Array indexing integer overflow (8328544)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21210
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-31 13:35
|
java-17-amazon-corretto-jmods |
CVE-2024-21217 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: Unbounded allocation leads to out-of-memory error (8331446)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21217
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-18 18:29
|
java-17-amazon-corretto-jmods |
CVE-2024-21235 |
高危 |
1:17.0.12+7-1.amzn2023.1 |
1:17.0.13+11-1.amzn2023.1 |
JDK: Integer conversion error leads to incorrect range check (8332644)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21235
镜像层: sha256:2bcd07fc97ace4b6dc77d1b8d335da6e04a4619c1366ecd3376c6b19bde2fe1a
发布日期: 2024-10-15 20:15 修改: 2024-10-18 18:30
|
libarchive |
CVE-2024-48957 |
高危 |
3.7.4-2.amzn2023.0.1 |
3.7.4-2.amzn2023.0.2 |
libarchive: Out-of-bounds access in libarchive's archive file handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48957
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-10-10 02:15 修改: 2024-12-02 14:58
|
libarchive |
CVE-2024-48958 |
高危 |
3.7.4-2.amzn2023.0.1 |
3.7.4-2.amzn2023.0.2 |
libarchive: Out-of-bounds access in libarchive's RAR file handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48958
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-10-10 02:15 修改: 2024-12-02 14:58
|
python3 |
CVE-2024-4032 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: incorrect IPv4 and IPv6 private ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35
|
python3 |
CVE-2024-6232 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15
|
python3 |
CVE-2024-6923 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-08-01 14:15 修改: 2025-01-11 15:15
|
python3 |
CVE-2024-7592 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
cpython: python: Uncontrolled CPU resource consumption when in http.cookies module
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-08-19 19:15 修改: 2024-09-04 21:15
|
python3 |
CVE-2024-8088 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15
|
python3-libs |
CVE-2024-4032 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: incorrect IPv4 and IPv6 private ranges
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35
|
python3-libs |
CVE-2024-6232 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15
|
python3-libs |
CVE-2024-6923 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-08-01 14:15 修改: 2025-01-11 15:15
|
python3-libs |
CVE-2024-7592 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
cpython: python: Uncontrolled CPU resource consumption when in http.cookies module
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-08-19 19:15 修改: 2024-09-04 21:15
|
python3-libs |
CVE-2024-8088 |
高危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: cpython: Iterating over a malicious ZIP file may lead to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8088
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-08-22 19:15 修改: 2024-09-04 23:15
|
nodejs-libs |
CVE-2024-28863 |
中危 |
1:18.20.2-1.amzn2023.0.1 |
1:18.20.4-1.amzn2023.0.1 |
node-tar: denial of service while parsing a tar file due to lack of folders depth validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863
镜像层: sha256:a0c41c4fc2fb65dceba6735befd36289590f382e8363e9082542f7562129e631
发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16
|
nodejs-npm |
CVE-2024-21538 |
中危 |
1:10.5.0-1.18.20.2.1.amzn2023.0.1 |
1:10.8.2-1.18.20.5.1.amzn2023.0.1 |
cross-spawn: regular expression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538
镜像层: sha256:a0c41c4fc2fb65dceba6735befd36289590f382e8363e9082542f7562129e631
发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15
|
nodejs-npm |
CVE-2024-28863 |
中危 |
1:10.5.0-1.18.20.2.1.amzn2023.0.1 |
1:10.7.0-1.18.20.4.1.amzn2023.0.1 |
node-tar: denial of service while parsing a tar file due to lack of folders depth validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863
镜像层: sha256:a0c41c4fc2fb65dceba6735befd36289590f382e8363e9082542f7562129e631
发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16
|
openssl |
CVE-2024-41996 |
中危 |
1:3.0.8-1.amzn2023.0.14 |
1:3.0.8-1.amzn2023.0.16 |
openssl: remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41996
镜像层: sha256:a0c41c4fc2fb65dceba6735befd36289590f382e8363e9082542f7562129e631
发布日期: 2024-08-26 06:15 修改: 2024-08-26 16:35
|
openssl |
CVE-2024-6119 |
中危 |
1:3.0.8-1.amzn2023.0.14 |
1:3.0.8-1.amzn2023.0.15 |
openssl: Possible denial of service in X.509 name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119
镜像层: sha256:a0c41c4fc2fb65dceba6735befd36289590f382e8363e9082542f7562129e631
发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35
|
openssl-libs |
CVE-2024-41996 |
中危 |
1:3.0.8-1.amzn2023.0.14 |
1:3.0.8-1.amzn2023.0.16 |
openssl: remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41996
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-08-26 06:15 修改: 2024-08-26 16:35
|
openssl-libs |
CVE-2024-6119 |
中危 |
1:3.0.8-1.amzn2023.0.14 |
1:3.0.8-1.amzn2023.0.15 |
openssl: Possible denial of service in X.509 name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35
|
expat |
CVE-2024-50602 |
中危 |
2.5.0-1.amzn2023.0.4 |
2.6.3-1.amzn2023.0.2 |
libexpat: expat: DoS via XML_ResumeParser
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-10-27 05:15 修改: 2024-10-30 18:35
|
libgcrypt |
CVE-2024-2236 |
中危 |
1.10.2-1.amzn2023.0.1 |
1.10.2-1.amzn2023.0.2 |
libgcrypt: vulnerable to Marvin Attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2236
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-03-06 22:15 修改: 2024-11-12 18:15
|
libxml2 |
CVE-2024-34459 |
中危 |
2.10.4-1.amzn2023.0.6 |
2.10.4-1.amzn2023.0.7 |
libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-05-14 15:39 修改: 2024-08-22 18:35
|
nodejs |
CVE-2024-21538 |
中危 |
1:18.20.2-1.amzn2023.0.1 |
1:18.20.5-1.amzn2023.0.1 |
cross-spawn: regular expression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538
镜像层: sha256:a0c41c4fc2fb65dceba6735befd36289590f382e8363e9082542f7562129e631
发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15
|
nodejs |
CVE-2024-28863 |
中危 |
1:18.20.2-1.amzn2023.0.1 |
1:18.20.4-1.amzn2023.0.1 |
node-tar: denial of service while parsing a tar file due to lack of folders depth validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863
镜像层: sha256:a0c41c4fc2fb65dceba6735befd36289590f382e8363e9082542f7562129e631
发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16
|
python3 |
CVE-2023-27043 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
nodejs-docs |
CVE-2024-21538 |
中危 |
1:18.20.2-1.amzn2023.0.1 |
1:18.20.5-1.amzn2023.0.1 |
cross-spawn: regular expression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538
镜像层: sha256:a0c41c4fc2fb65dceba6735befd36289590f382e8363e9082542f7562129e631
发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15
|
nodejs-docs |
CVE-2024-28863 |
中危 |
1:18.20.2-1.amzn2023.0.1 |
1:18.20.4-1.amzn2023.0.1 |
node-tar: denial of service while parsing a tar file due to lack of folders depth validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863
镜像层: sha256:a0c41c4fc2fb65dceba6735befd36289590f382e8363e9082542f7562129e631
发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16
|
nodejs-full-i18n |
CVE-2024-21538 |
中危 |
1:18.20.2-1.amzn2023.0.1 |
1:18.20.5-1.amzn2023.0.1 |
cross-spawn: regular expression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538
镜像层: sha256:a0c41c4fc2fb65dceba6735befd36289590f382e8363e9082542f7562129e631
发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15
|
nodejs-full-i18n |
CVE-2024-28863 |
中危 |
1:18.20.2-1.amzn2023.0.1 |
1:18.20.4-1.amzn2023.0.1 |
node-tar: denial of service while parsing a tar file due to lack of folders depth validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863
镜像层: sha256:a0c41c4fc2fb65dceba6735befd36289590f382e8363e9082542f7562129e631
发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16
|
nodejs-libs |
CVE-2024-21538 |
中危 |
1:18.20.2-1.amzn2023.0.1 |
1:18.20.5-1.amzn2023.0.1 |
cross-spawn: regular expression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21538
镜像层: sha256:a0c41c4fc2fb65dceba6735befd36289590f382e8363e9082542f7562129e631
发布日期: 2024-11-08 05:15 修改: 2024-11-19 14:15
|
python3-libs |
CVE-2023-27043 |
中危 |
3.9.16-1.amzn2023.0.9 |
3.9.20-1.amzn2023.0.2 |
python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27
|
python3-pip-wheel |
CVE-2024-35195 |
中危 |
21.3.1-2.amzn2023.0.7 |
21.3.1-2.amzn2023.0.10 |
requests: subsequent requests to the same host ignore cert verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35195
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-05-20 21:15 修改: 2024-06-10 17:16
|
python3-pip-wheel |
CVE-2024-3651 |
中危 |
21.3.1-2.amzn2023.0.7 |
21.3.1-2.amzn2023.0.9 |
python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-07-07 18:15 修改: 2024-07-11 14:58
|
python3-pip-wheel |
CVE-2024-37891 |
中危 |
21.3.1-2.amzn2023.0.7 |
21.3.1-2.amzn2023.0.8 |
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37891
镜像层: sha256:c7e5c6d6328d49c187936300d79d2500d7ca36275f32f2035be6dad9b21f7a87
发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44
|