docker.io/taomujian/linbing:latest linux/amd64

docker.io/taomujian/linbing:latest - Trivy安全扫描结果 扫描时间: 2024-12-10 18:12
全部漏洞信息
低危漏洞:1 中危漏洞:15 高危漏洞:5 严重漏洞:0

系统OS: ubuntu 18.04 扫描引擎: Trivy 扫描时间: 2024-12-10 18:12

docker.io/taomujian/linbing:latest (ubuntu 18.04) (ubuntu)
低危漏洞:0 中危漏洞:7 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
libpython3.6 CVE-2023-24329 中危 3.6.9-1~18.04ubuntu1.12 3.6.9-1~18.04ubuntu1.13 python: urllib.parse url blocklisting bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329

镜像层: sha256:3f5a39dbfa1448266ac42c6b1a7bb80cc491d5c9eeef8535c49ac125b6b1fa70

发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08

libpython3.6-dev CVE-2023-24329 中危 3.6.9-1~18.04ubuntu1.12 3.6.9-1~18.04ubuntu1.13 python: urllib.parse url blocklisting bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329

镜像层: sha256:3f5a39dbfa1448266ac42c6b1a7bb80cc491d5c9eeef8535c49ac125b6b1fa70

发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08

libpython3.6-minimal CVE-2023-24329 中危 3.6.9-1~18.04ubuntu1.12 3.6.9-1~18.04ubuntu1.13 python: urllib.parse url blocklisting bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329

镜像层: sha256:3f5a39dbfa1448266ac42c6b1a7bb80cc491d5c9eeef8535c49ac125b6b1fa70

发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08

libpython3.6-stdlib CVE-2023-24329 中危 3.6.9-1~18.04ubuntu1.12 3.6.9-1~18.04ubuntu1.13 python: urllib.parse url blocklisting bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329

镜像层: sha256:3f5a39dbfa1448266ac42c6b1a7bb80cc491d5c9eeef8535c49ac125b6b1fa70

发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08

python3.6 CVE-2023-24329 中危 3.6.9-1~18.04ubuntu1.12 3.6.9-1~18.04ubuntu1.13 python: urllib.parse url blocklisting bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329

镜像层: sha256:3f5a39dbfa1448266ac42c6b1a7bb80cc491d5c9eeef8535c49ac125b6b1fa70

发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08

python3.6-dev CVE-2023-24329 中危 3.6.9-1~18.04ubuntu1.12 3.6.9-1~18.04ubuntu1.13 python: urllib.parse url blocklisting bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329

镜像层: sha256:3f5a39dbfa1448266ac42c6b1a7bb80cc491d5c9eeef8535c49ac125b6b1fa70

发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08

python3.6-minimal CVE-2023-24329 中危 3.6.9-1~18.04ubuntu1.12 3.6.9-1~18.04ubuntu1.13 python: urllib.parse url blocklisting bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24329

镜像层: sha256:3f5a39dbfa1448266ac42c6b1a7bb80cc491d5c9eeef8535c49ac125b6b1fa70

发布日期: 2023-02-17 15:15 修改: 2023-11-07 04:08

Python (python-pkg)
低危漏洞:1 中危漏洞:8 高危漏洞:5 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
certifi CVE-2023-37920 高危 2020.12.5 2023.7.22 python-certifi: Removal of e-Tugra root certificate

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37920

镜像层: sha256:1fd4027e0ec9e67be8c311220c2d8db036873de504da855595ffec4ce892a016

发布日期: 2023-07-25 21:15 修改: 2023-08-12 06:16

future CVE-2022-40899 高危 0.18.2 0.18.3 python-future: remote attackers can cause denial of service via crafted Set-Cookie header from malicious web server

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40899

镜像层: sha256:1fd4027e0ec9e67be8c311220c2d8db036873de504da855595ffec4ce892a016

发布日期: 2022-12-23 00:15 修改: 2023-01-23 18:57

setuptools CVE-2022-40897 高危 58.1.0 65.5.1 pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40897

镜像层: sha256:1d9d27f8efbf6d3c8d2c2d27ca487b270cae9ce04399dcb0a1ba838988506b24

发布日期: 2022-12-23 00:15 修改: 2024-10-29 15:35

setuptools CVE-2024-6345 高危 58.1.0 70.0.0 pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345

镜像层: sha256:1d9d27f8efbf6d3c8d2c2d27ca487b270cae9ce04399dcb0a1ba838988506b24

发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00

starlette CVE-2024-47874 高危 0.37.2 0.40.0 starlette: Starlette Denial of service (DoS) via multipart/form-data

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47874

镜像层: sha256:1fd4027e0ec9e67be8c311220c2d8db036873de504da855595ffec4ce892a016

发布日期: 2024-10-15 16:15 修改: 2024-10-16 16:38

dnspython CVE-2023-29483 中危 2.1.0 2.6.1 dnspython: denial of service in stub resolver

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-29483

镜像层: sha256:1fd4027e0ec9e67be8c311220c2d8db036873de504da855595ffec4ce892a016

发布日期: 2024-04-11 14:15 修改: 2024-08-27 19:35

aiohttp CVE-2024-52304 中危 3.9.5 3.10.11 aiohttp: aiohttp vulnerable to request smuggling due to incorrect parsing of chunk extensions

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52304

镜像层: sha256:1fd4027e0ec9e67be8c311220c2d8db036873de504da855595ffec4ce892a016

发布日期: 2024-11-18 21:15 修改: 2024-11-19 21:57

idna CVE-2024-3651 中危 2.10 3.7 python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651

镜像层: sha256:1fd4027e0ec9e67be8c311220c2d8db036873de504da855595ffec4ce892a016

发布日期: 2024-07-07 18:15 修改: 2024-07-11 14:58

pip CVE-2023-5752 中危 22.0.4 23.3 pip: Mercurial configuration injectable in repo revision when installing via pip

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5752

镜像层: sha256:1d9d27f8efbf6d3c8d2c2d27ca487b270cae9ce04399dcb0a1ba838988506b24

发布日期: 2023-10-25 18:17 修改: 2024-06-10 18:15

aiohttp CVE-2024-42367 中危 3.9.5 3.10.2 aiohttp: python-aiohttp: Compressed files as symlinks are not protected from path traversal

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42367

镜像层: sha256:1fd4027e0ec9e67be8c311220c2d8db036873de504da855595ffec4ce892a016

发布日期: 2024-08-12 13:38 修改: 2024-08-12 13:41

certifi CVE-2022-23491 中危 2020.12.5 2022.12.07 python-certifi: untrusted root certificates

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23491

镜像层: sha256:1fd4027e0ec9e67be8c311220c2d8db036873de504da855595ffec4ce892a016

发布日期: 2022-12-07 22:15 修改: 2023-03-24 18:12

cryptography GHSA-h4gh-qq45-vh27 中危 42.0.8 43.0.1 pyca/cryptography has a vulnerable OpenSSL included in cryptography wheels

漏洞详情: https://github.com/advisories/GHSA-h4gh-qq45-vh27

镜像层: sha256:1fd4027e0ec9e67be8c311220c2d8db036873de504da855595ffec4ce892a016

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

urllib3 CVE-2024-37891 中危 2.2.1 1.26.19, 2.2.2 urllib3: proxy-authorization request header is not stripped during cross-origin redirects

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37891

镜像层: sha256:1fd4027e0ec9e67be8c311220c2d8db036873de504da855595ffec4ce892a016

发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44

tqdm CVE-2024-34062 低危 4.59.0 4.66.3 python-tqdm: non-boolean CLI arguments may lead to local code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34062

镜像层: sha256:1fd4027e0ec9e67be8c311220c2d8db036873de504da855595ffec4ce892a016

发布日期: 2024-05-03 10:15 修改: 2024-06-10 17:16

/root/python/app/lib/__pycache__/rsa.cpython-310.pyc ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息