docker.io/superng6/qbittorrentee:latest linux/amd64

docker.io/superng6/qbittorrentee:latest - Trivy安全扫描结果 扫描时间: 2024-11-20 10:41
全部漏洞信息
低危漏洞:4 中危漏洞:2 高危漏洞:0 严重漏洞:0

系统OS: alpine 3.20.3 扫描引擎: Trivy 扫描时间: 2024-11-20 10:41

docker.io/superng6/qbittorrentee:latest (alpine 3.20.3) (alpine)
低危漏洞:4 中危漏洞:2 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
curl CVE-2024-8096 中危 8.9.1-r2 8.10.0-r0 curl: OCSP stapling bypass with GnuTLS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096

镜像层: sha256:aad00348126d10c040bb40a49725d814bddc700b19b533c4e3fe86c208427746

发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26

libcurl CVE-2024-8096 中危 8.9.1-r2 8.10.0-r0 curl: OCSP stapling bypass with GnuTLS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8096

镜像层: sha256:aad00348126d10c040bb40a49725d814bddc700b19b533c4e3fe86c208427746

发布日期: 2024-09-11 10:15 修改: 2024-09-11 16:26

libcrypto3 CVE-2024-9143 低危 3.3.2-r0 3.3.2-r1 openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143

镜像层: sha256:877036b083444b81229692659857a1c806d1c4bb7bbc505c05ba4276967c9a33

发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35

curl CVE-2024-9681 低危 8.9.1-r2 8.11.0-r0 curl: HSTS subdomain overwrites parent cache entry

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681

镜像层: sha256:aad00348126d10c040bb40a49725d814bddc700b19b533c4e3fe86c208427746

发布日期: 2024-11-06 08:15 修改: 2024-11-06 18:17

libcurl CVE-2024-9681 低危 8.9.1-r2 8.11.0-r0 curl: HSTS subdomain overwrites parent cache entry

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681

镜像层: sha256:aad00348126d10c040bb40a49725d814bddc700b19b533c4e3fe86c208427746

发布日期: 2024-11-06 08:15 修改: 2024-11-06 18:17

libssl3 CVE-2024-9143 低危 3.3.2-r0 3.3.2-r1 openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143

镜像层: sha256:877036b083444b81229692659857a1c806d1c4bb7bbc505c05ba4276967c9a33

发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35