docker.io/trinodb/trino:465 linux/amd64

docker.io/trinodb/trino:465 - Trivy安全扫描结果 扫描时间: 2024-11-28 09:59
全部漏洞信息
低危漏洞:37 中危漏洞:41 高危漏洞:50 严重漏洞:21

系统OS: redhat 9.5 扫描引擎: Trivy 扫描时间: 2024-11-28 09:59

docker.io/trinodb/trino:465 (redhat 9.5) (redhat)
低危漏洞:34 中危漏洞:16 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
expat CVE-2024-45491 中危 2.5.0-3.el9_5.1 libexpat: Integer Overflow or Wraparound

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

expat CVE-2024-50602 中危 2.5.0-3.el9_5.1 libexpat: expat: DoS via XML_ResumeParser

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50602

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-10-27 05:15 修改: 2024-10-30 18:35

glib2 CVE-2024-52533 中危 2.68.4-14.el9_4.1 glib: buffer overflow in set_connect_msg()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52533

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2024-11-11 23:15 修改: 2024-11-23 21:15

libarchive CVE-2023-30571 中危 3.5.3-4.el9 libarchive: Race condition in multi-threaded use of archive_write_disk_header() on posix based systems

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30571

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2023-05-29 20:15 修改: 2023-06-05 16:40

libyaml CVE-2024-35325 中危 0.2.5-7.el9 libyaml: double-free in yaml_event_delete in /src/libyaml/src/api.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35325

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2024-06-13 17:15 修改: 2024-08-28 16:15

python-unversioned-command CVE-2021-23336 中危 3.9.19-8.el9_5.1 python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30

python-unversioned-command CVE-2024-11168 中危 3.9.19-8.el9_5.1 python: Improper validation of IPv6 and IPvFuture addresses

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-11-12 22:15 修改: 2024-11-13 17:01

python-unversioned-command CVE-2024-9287 中危 3.9.19-8.el9_5.1 python: Virtual environment (venv) activation scripts don't quote paths

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15

python3 CVE-2021-23336 中危 3.9.19-8.el9_5.1 python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30

python3 CVE-2024-11168 中危 3.9.19-8.el9_5.1 python: Improper validation of IPv6 and IPvFuture addresses

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-11-12 22:15 修改: 2024-11-13 17:01

python3 CVE-2024-9287 中危 3.9.19-8.el9_5.1 python: Virtual environment (venv) activation scripts don't quote paths

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15

python3-libs CVE-2021-23336 中危 3.9.19-8.el9_5.1 python: Web cache poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23336

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2021-02-15 13:15 修改: 2023-11-07 03:30

python3-libs CVE-2024-11168 中危 3.9.19-8.el9_5.1 python: Improper validation of IPv6 and IPvFuture addresses

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11168

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-11-12 22:15 修改: 2024-11-13 17:01

python3-libs CVE-2024-9287 中危 3.9.19-8.el9_5.1 python: Virtual environment (venv) activation scripts don't quote paths

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9287

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-10-22 17:15 修改: 2024-11-04 18:15

systemd-libs CVE-2021-3997 中危 252-46.el9_5.2 systemd: Uncontrolled recursion in systemd-tmpfiles when removing files

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3997

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2022-08-23 20:15 修改: 2023-05-03 12:15

tar CVE-2005-2541 中危 2:1.34-7.el9 tar: does not properly warn the user when extracting setuid or setgid files

漏洞详情: https://avd.aquasec.com/nvd/cve-2005-2541

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2005-08-10 04:00 修改: 2023-11-07 01:57

ncurses-base CVE-2022-29458 低危 6.2-10.20210508.el9 ncurses: segfaulting OOB read

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46

ncurses-base CVE-2023-45918 低危 6.2-10.20210508.el9 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15

ncurses-base CVE-2023-50495 低危 6.2-10.20210508.el9 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

ncurses-libs CVE-2022-29458 低危 6.2-10.20210508.el9 ncurses: segfaulting OOB read

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46

ncurses-libs CVE-2023-45918 低危 6.2-10.20210508.el9 ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15

ncurses-libs CVE-2023-50495 低危 6.2-10.20210508.el9 ncurses: segmentation fault via _nc_wrap_entry()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15

openldap CVE-2023-2953 低危 2.6.6-3.el9 openldap: null pointer dereference in ber_memalloc_x function

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2953

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2023-05-30 22:15 修改: 2023-08-02 16:46

openssl-libs CVE-2024-2511 低危 1:3.2.2-6.el9_5 openssl: Unbounded memory growth with session handling in TLSv1.3

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15

openssl-libs CVE-2024-41996 低危 1:3.2.2-6.el9_5 openssl: remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41996

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2024-08-26 06:15 修改: 2024-08-26 16:35

openssl-libs CVE-2024-4741 低危 1:3.2.2-6.el9_5 openssl: Use After Free with SSL_free_buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01

openssl-libs CVE-2024-5535 低危 1:3.2.2-6.el9_5 openssl: SSL_select_next_proto buffer overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15

pcre2 CVE-2022-41409 低危 10.40-6.el9 pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2023-07-18 14:15 修改: 2023-07-27 03:46

pcre2-syntax CVE-2022-41409 低危 10.40-6.el9 pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2023-07-18 14:15 修改: 2023-07-27 03:46

bzip2-libs CVE-2019-12900 低危 1.0.8-8.el9 bzip2: out-of-bounds write in function BZ2_decompress

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12900

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2019-06-19 23:15 修改: 2023-11-07 03:03

glib2 CVE-2023-32636 低危 2.68.4-14.el9_4.1 glib: Timeout in fuzz_variant_text

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32636

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2023-09-14 20:15 修改: 2024-01-12 22:09

gnupg2 CVE-2022-3219 低危 2.3.3-4.el9 gnupg: denial of service issue (resource consumption) using compressed packets

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2023-02-23 20:15 修改: 2023-05-26 16:31

python-unversioned-command CVE-2024-0397 低危 3.9.19-8.el9_5.1 cpython: python: Memory race condition in ssl.SSLContext certificate store methods

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44

python-unversioned-command CVE-2024-7592 低危 3.9.19-8.el9_5.1 cpython: python: Uncontrolled CPU resource consumption when in http.cookies module

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-08-19 19:15 修改: 2024-09-04 21:15

curl-minimal CVE-2024-7264 低危 7.76.1-31.el9 curl: libcurl: ASN.1 date parser overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2024-07-31 08:15 修改: 2024-10-30 20:35

libcurl-minimal CVE-2024-7264 低危 7.76.1-31.el9 curl: libcurl: ASN.1 date parser overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2024-07-31 08:15 修改: 2024-10-30 20:35

libgcc CVE-2022-27943 低危 11.5.0-2.el9 binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27943

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2022-03-26 13:15 修改: 2023-11-07 03:45

python3 CVE-2024-0397 低危 3.9.19-8.el9_5.1 cpython: python: Memory race condition in ssl.SSLContext certificate store methods

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44

python3 CVE-2024-7592 低危 3.9.19-8.el9_5.1 cpython: python: Uncontrolled CPU resource consumption when in http.cookies module

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-08-19 19:15 修改: 2024-09-04 21:15

libstdc++ CVE-2022-27943 低危 11.5.0-2.el9 binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27943

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2022-03-26 13:15 修改: 2023-11-07 03:45

libxml2 CVE-2023-45322 低危 2.9.13-6.el9_4 libxml2: use-after-free in xmlUnlinkNode() in tree.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45322

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2023-10-06 22:15 修改: 2024-08-02 21:15

libxml2 CVE-2024-34459 低危 2.9.13-6.el9_4 libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2024-05-14 15:39 修改: 2024-08-22 18:35

python3-libs CVE-2024-0397 低危 3.9.19-8.el9_5.1 cpython: python: Memory race condition in ssl.SSLContext certificate store methods

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0397

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-06-17 16:15 修改: 2024-07-03 01:44

python3-libs CVE-2024-7592 低危 3.9.19-8.el9_5.1 cpython: python: Uncontrolled CPU resource consumption when in http.cookies module

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7592

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-08-19 19:15 修改: 2024-09-04 21:15

python3-pip-wheel CVE-2021-3572 低危 21.3.1-1.el9 python-pip: Incorrect handling of unicode separators in git references

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3572

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2021-11-10 18:15 修改: 2024-06-21 19:15

sqlite-libs CVE-2023-36191 低危 3.34.1-7.el9_3 sqlite: CLI fault on missing -nonce

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-36191

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2023-06-23 02:15 修改: 2023-11-07 04:16

sqlite-libs CVE-2024-0232 低危 3.34.1-7.el9_3 sqlite: use-after-free bug in jsonParseAddNodeArray

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0232

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2024-01-16 14:15 修改: 2024-09-28 04:15

gawk CVE-2023-4156 低危 5.1.0-6.el9 gawk: heap out of bound read in builtin.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4156

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2023-09-25 18:15 修改: 2023-11-07 04:22

libzstd CVE-2022-4899 低危 1.5.1-2.el9 zstd: mysql: buffer overrun in util.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4899

镜像层: sha256:f4f838f0e5f5719a99d336d22b6c92f2f633066cb56228a317bfc5f6cc2347b4

发布日期: 2023-03-31 20:15 修改: 2023-11-07 03:59

tar CVE-2023-39804 低危 2:1.34-7.el9 tar: Incorrectly handled extension attributes in PAX archives can lead to a crash

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39804

镜像层: sha256:63b78768329291a8eecfc96e54bf7187237f39faaf0d371cdd84ed2f167c10cd

发布日期: 2024-03-27 04:15 修改: 2024-11-12 19:35

Java (jar)
低危漏洞:3 中危漏洞:25 高危漏洞:50 严重漏洞:21
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
com.fasterxml.jackson.core:jackson-databind CVE-2017-15095 严重 2.4.0 2.8.11, 2.9.4, 2.6.7.3, 2.7.9.2 jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15095

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:39

com.fasterxml.jackson.core:jackson-databind CVE-2017-17485 严重 2.4.0 2.9.4, 2.8.11, 2.7.9.2 jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-17485

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2018-01-10 18:29 修改: 2023-06-08 18:00

com.fasterxml.jackson.core:jackson-databind CVE-2017-7525 严重 2.4.0 2.6.7.1, 2.7.9.1, 2.8.9 jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper

漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7525

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2018-02-06 15:29 修改: 2023-11-07 02:50

com.fasterxml.jackson.core:jackson-databind CVE-2018-11307 严重 2.4.0 2.7.9.4, 2.8.11.2, 2.9.6 jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40

com.fasterxml.jackson.core:jackson-databind CVE-2018-14718 严重 2.4.0 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 jackson-databind: arbitrary code execution in slf4j-ext class

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53

com.fasterxml.jackson.core:jackson-databind CVE-2018-14719 严重 2.4.0 2.9.7, 2.8.11.3, 2.7.9.5 jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53

com.fasterxml.jackson.core:jackson-databind CVE-2018-19362 严重 2.4.0 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 jackson-databind: improper polymorphic deserialization in jboss-common-core class

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55

com.fasterxml.jackson.core:jackson-databind CVE-2018-7489 严重 2.4.0 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01

com.fasterxml.jackson.core:jackson-databind CVE-2019-14379 严重 2.4.0 2.9.9.2, 2.8.11.4, 2.7.9.6 jackson-databind: default typing mishandling leading to remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04

com.fasterxml.jackson.core:jackson-databind CVE-2019-14540 严重 2.4.0 2.9.10, 2.8.11.5, 2.6.7.3 jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04

com.fasterxml.jackson.core:jackson-databind CVE-2019-16335 严重 2.4.0 2.9.10, 2.8.11.5, 2.6.7.3 jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05

com.fasterxml.jackson.core:jackson-databind CVE-2019-16942 严重 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3 jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06

com.fasterxml.jackson.core:jackson-databind CVE-2019-16943 严重 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3 jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06

com.fasterxml.jackson.core:jackson-databind CVE-2019-17267 严重 2.4.0 2.9.10, 2.8.11.5 jackson-databind: Serialization gadgets in classes of the ehcache package

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06

com.fasterxml.jackson.core:jackson-databind CVE-2019-17531 严重 2.4.0 2.9.10.1, 2.8.11.5, 2.6.7.3 jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06

com.fasterxml.jackson.core:jackson-databind CVE-2019-20330 严重 2.4.0 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 jackson-databind: lacks certain net.sf.ehcache blocking

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09

com.fasterxml.jackson.core:jackson-databind CVE-2020-8840 严重 2.4.0 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 jackson-databind: Lacks certain xbean-reflect/JNDI blocking

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26

com.fasterxml.jackson.core:jackson-databind CVE-2020-9547 严重 2.4.0 2.9.10.4, 2.8.11.6, 2.7.9.7 jackson-databind: Serialization gadgets in ibatis-sqlmap

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26

com.fasterxml.jackson.core:jackson-databind CVE-2020-9548 严重 2.4.0 2.9.10.4, 2.8.11.6, 2.7.9.7 jackson-databind: Serialization gadgets in anteros-core

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26

io.netty:netty CVE-2019-20444 严重 3.10.6.Final 4.0.0 netty: HTTP request smuggling

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20444

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09

org.apache.avro:avro CVE-2024-47561 严重 1.7.7 1.11.4 apache-avro: Schema parsing may trigger Remote Code Execution (RCE)

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15

com.fasterxml.jackson.core:jackson-databind CVE-2019-12086 高危 2.4.0 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03

com.fasterxml.jackson.core:jackson-databind CVE-2019-14439 高危 2.4.0 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 jackson-databind: Polymorphic typing issue related to logback/JNDI

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04

com.fasterxml.jackson.core:jackson-databind CVE-2019-14892 高危 2.4.0 2.6.7.3, 2.8.11.5, 2.9.10 jackson-databind: Serialization gadgets in classes of the commons-configuration package

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05

com.fasterxml.jackson.core:jackson-databind CVE-2020-10650 高危 2.4.0 2.9.10.4 A deserialization flaw was discovered in jackson-databind through 2.9. ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15

com.fasterxml.jackson.core:jackson-databind CVE-2020-10673 高危 2.4.0 2.9.10.4, 2.6.7.4 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36

com.fasterxml.jackson.core:jackson-databind CVE-2020-24616 高危 2.4.0 2.9.10.6 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20

com.fasterxml.jackson.core:jackson-databind CVE-2020-24750 高危 2.4.0 2.6.7.5, 2.9.10.6 jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56

com.fasterxml.jackson.core:jackson-databind CVE-2020-35490 高危 2.4.0 2.9.10.8 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32

com.fasterxml.jackson.core:jackson-databind CVE-2020-35491 高危 2.4.0 2.9.10.8 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32

com.fasterxml.jackson.core:jackson-databind CVE-2020-35728 高危 2.4.0 2.9.10.8 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22

com.fasterxml.jackson.core:jackson-databind CVE-2020-36179 高危 2.4.0 2.9.10.8, 2.6.7.5 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36

com.fasterxml.jackson.core:jackson-databind CVE-2020-36180 高危 2.4.0 2.9.10.8, 2.6.7.5 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36

com.fasterxml.jackson.core:jackson-databind CVE-2020-36181 高危 2.4.0 2.9.10.8, 2.6.7.5 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36

com.fasterxml.jackson.core:jackson-databind CVE-2020-36182 高危 2.4.0 2.9.10.8, 2.6.7.5 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36

com.fasterxml.jackson.core:jackson-databind CVE-2020-36183 高危 2.4.0 2.9.10.8, 2.6.7.5 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56

com.fasterxml.jackson.core:jackson-databind CVE-2020-36184 高危 2.4.0 2.9.10.8 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36

com.fasterxml.jackson.core:jackson-databind CVE-2020-36185 高危 2.4.0 2.9.10.8 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57

com.fasterxml.jackson.core:jackson-databind CVE-2020-36186 高危 2.4.0 2.9.10.8 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57

com.fasterxml.jackson.core:jackson-databind CVE-2020-36187 高危 2.4.0 2.9.10.8 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57

com.fasterxml.jackson.core:jackson-databind CVE-2020-36188 高危 2.4.0 2.9.10.8, 2.6.7.5 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57

com.fasterxml.jackson.core:jackson-databind CVE-2020-36189 高危 2.4.0 2.9.10.8, 2.6.7.5 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57

com.fasterxml.jackson.core:jackson-databind CVE-2020-36518 高危 2.4.0 2.13.2.1, 2.12.6.1 jackson-databind: denial of service via a large depth of nested objects

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12

com.fasterxml.jackson.core:jackson-databind CVE-2021-20190 高危 2.4.0 2.9.10.7, 2.6.7.5 jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28

com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 高危 2.4.0 2.12.7.1, 2.13.4.2 jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15

com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 高危 2.4.0 2.12.7.1, 2.13.4 jackson-databind: use of deeply nested arrays

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10

com.google.protobuf:protobuf-java CVE-2021-22569 高危 2.5.0 3.16.1, 3.18.2, 3.19.2 protobuf-java: potential DoS in the parsing procedure for binary data

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15

com.google.protobuf:protobuf-java CVE-2021-22570 高危 2.5.0 3.15.0 protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30

com.google.protobuf:protobuf-java CVE-2022-3509 高危 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7 protobuf-java: Textformat parsing issue leads to DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57

com.google.protobuf:protobuf-java CVE-2022-3510 高危 2.5.0 3.16.3, 3.19.6, 3.20.3, 3.21.7 protobuf-java: Message-Type Extensions parsing issue leads to DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51

com.google.protobuf:protobuf-java CVE-2024-7254 高危 2.5.0 3.25.5, 4.27.5, 4.28.2 protobuf: StackOverflow vulnerability in Protocol Buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-09-19 01:15 修改: 2024-09-20 12:30

com.google.protobuf:protobuf-java CVE-2024-7254 高危 3.21.12 3.25.5, 4.27.5, 4.28.2 protobuf: StackOverflow vulnerability in Protocol Buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-09-19 01:15 修改: 2024-09-20 12:30

com.nimbusds:nimbus-jose-jwt CVE-2023-52428 高危 9.8.1 9.37.2 nimbus-jose-jwt: large JWE p2c header value causes Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35

commons-io:commons-io CVE-2024-47554 高危 2.11.0 2.14.0 apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-10-03 12:15 修改: 2024-10-04 13:50

dnsjava:dnsjava CVE-2024-25638 高危 2.1.7 3.6.0 dnsjava: Improper response validation allowing DNSSEC bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25638

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-07-22 14:15 修改: 2024-09-04 15:15

com.fasterxml.jackson.core:jackson-databind CVE-2018-12022 高危 2.4.0 2.7.9.4, 2.8.11.2, 2.9.6 jackson-databind: improper polymorphic deserialization of types from Jodd-db library

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52

io.netty:netty CVE-2021-37136 高危 3.10.6.Final 4.0.0 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36

io.netty:netty CVE-2021-37137 高危 3.10.6.Final 4.0.0 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36

io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p 高危 4.1.87.Final 4.1.100.Final io.netty:netty-codec-http2 vulnerable to HTTP/2 Rapid Reset Attack

漏洞详情: https://github.com/advisories/GHSA-xpw8-rcwv-8f8p

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

io.netty:netty-common CVE-2024-47535 高危 4.1.104.Final 4.1.115 netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01

io.netty:netty-common CVE-2024-47535 高危 4.1.110.Final 4.1.115 netty: Denial of Service attack on windows app using Netty

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01

net.minidev:json-smart CVE-2021-31684 高危 1.3.2 1.3.3, 2.4.4 json-smart: Denial of Service in JSONParserByteArray function

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31684

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-06-01 20:15 修改: 2024-06-21 19:15

net.minidev:json-smart CVE-2023-1370 高危 1.3.2 2.4.9 json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15

com.fasterxml.jackson.core:jackson-databind CVE-2018-5968 高危 2.4.0 2.8.11.1, 2.9.4, 2.7.9.5 jackson-databind: unsafe deserialization due to incomplete blacklist (incomplete fix for CVE-2017-7525 and CVE-2017-17485)

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-5968

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2018-01-22 04:29 修改: 2023-09-13 14:19

org.apache.avro:avro CVE-2023-39410 高危 1.7.7 1.11.3 apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15

org.codehaus.jettison:jettison CVE-2022-40150 高危 1.1 1.5.2 jettison: memory exhaustion via user-supplied XML or JSON data

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40150

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-09-16 10:15 修改: 2023-07-13 17:24

org.codehaus.jettison:jettison CVE-2022-45685 高危 1.1 1.5.2 jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45685

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-12-13 15:15 修改: 2023-01-30 17:57

org.codehaus.jettison:jettison CVE-2022-45693 高危 1.1 1.5.2 jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45693

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-12-13 15:15 修改: 2023-01-26 17:35

org.codehaus.jettison:jettison CVE-2023-1436 高危 1.1 1.5.4 jettison: Uncontrolled Recursion in JSONArray

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1436

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2023-03-22 06:15 修改: 2023-11-07 04:03

org.xerial.snappy:snappy-java CVE-2023-34455 高危 1.0.5 1.1.10.1 snappy-java: Unchecked chunk length leads to DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17

org.xerial.snappy:snappy-java CVE-2023-43642 高危 1.0.5 1.1.10.4 snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46

com.squareup.okio:okio CVE-2023-3635 中危 1.6.0 3.4.0, 1.17.6 okio: GzipSource class improper exception handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17

com.fasterxml.jackson.core:jackson-databind CVE-2019-12814 中危 2.4.0 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03

commons-net:commons-net CVE-2021-37533 中危 3.6 3.9.0 apache-commons-net: FTP client trusts the host from PASV response by default

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29

io.netty:netty-handler CVE-2023-34462 中危 4.1.87.Final 4.1.94.Final netty: SniHandler 16MB allocation leads to OOM

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34462

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2023-06-22 23:15 修改: 2024-06-21 19:15

com.google.protobuf:protobuf-java CVE-2022-3171 中危 2.5.0 3.21.7, 3.20.3, 3.19.6, 3.16.3 protobuf-java: timeout in parser leads to DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50

com.fasterxml.woodstox:woodstox-core CVE-2022-40152 中危 5.3.0 6.4.0, 5.4.0 woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36

net.snowflake:snowflake-jdbc CVE-2024-43382 中危 3.19.1 3.20.0 Snowflake JDBC Security Advisory

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43382

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-10-30 21:15 修改: 2024-11-01 12:57

com.fasterxml.jackson.core:jackson-databind CVE-2019-12384 中危 2.4.0 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03

com.squareup.okio:okio CVE-2023-3635 中危 1.17.5 3.4.0, 1.17.6 okio: GzipSource class improper exception handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17

org.apache.commons:commons-configuration2 CVE-2024-29131 中危 2.1.1 2.10.1 commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29131

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-03-21 09:15 修改: 2024-08-28 15:35

org.apache.commons:commons-configuration2 CVE-2024-29133 中危 2.1.1 2.10.1 commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29133

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-03-21 09:15 修改: 2024-11-04 17:35

io.netty:netty CVE-2019-20445 中危 3.10.6.Final 4.0.0 netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20445

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2020-01-29 21:15 修改: 2023-11-07 03:09

io.netty:netty CVE-2021-21290 中危 3.10.6.Final 4.0.0 netty: Information disclosure via the local system temporary directory

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21290

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-02-08 20:15 修改: 2023-11-07 03:29

io.netty:netty CVE-2021-21295 中危 3.10.6.Final 4.0.0 netty: possible request smuggling in HTTP/2 due missing validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21295

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-03-09 19:15 修改: 2023-11-07 03:29

io.netty:netty CVE-2021-21409 中危 3.10.6.Final 4.0.0 netty: Request smuggling via content-length header

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-21409

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-03-30 15:15 修改: 2023-11-07 03:30

org.codehaus.jettison:jettison CVE-2022-40149 中危 1.1 1.5.1 jettison: parser crash by stackoverflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40149

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2022-09-16 10:15 修改: 2023-03-01 16:32

org.eclipse.jetty:jetty-http CVE-2023-40167 中危 9.4.50.v20221201 9.4.52, 10.0.16, 11.0.16, 12.0.1 jetty: Improper validation of HTTP/1 content-length

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59

org.eclipse.jetty:jetty-http CVE-2024-6763 中危 9.4.50.v20221201 12.0.12 org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:15

org.eclipse.jetty:jetty-server CVE-2023-26048 中危 9.4.50.v20221201 9.4.51.v20230217, 10.0.14, 11.0.14 jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15

org.eclipse.jetty:jetty-server CVE-2024-8184 中危 9.4.50.v20221201 12.0.9, 10.0.24, 11.0.24, 9.4.56 org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8184

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-10-14 16:15 修改: 2024-11-08 21:00

org.iq80.snappy:snappy CVE-2024-36124 中危 0.3 0.5 snappy: tries to read outside the bounds of the given byte arrays

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36124

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-06-03 15:15 修改: 2024-06-03 19:23

io.netty:netty CVE-2021-43797 中危 3.10.6.Final 4.0.0 netty: control chars in header names may lead to HTTP request smuggling

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47

io.netty:netty-codec-http CVE-2024-29025 中危 4.1.87.Final 4.1.108.Final netty-codec-http: Allocation of Resources Without Limits or Throttling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29025

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-03-25 20:15 修改: 2024-06-21 22:15

org.xerial.snappy:snappy-java CVE-2023-34453 中危 1.0.5 1.1.10.1 snappy-java: Integer overflow in shuffle leads to DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59

org.xerial.snappy:snappy-java CVE-2023-34454 中危 1.0.5 1.1.10.1 snappy-java: Integer overflow in compress leads to DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2023-06-15 17:15 修改: 2023-06-27 16:04

org.eclipse.jetty:jetty-xml GHSA-58qw-p7qm-5rvh 低危 9.4.50.v20221201 10.0.16, 11.0.16, 12.0.0, 9.4.52.v20230823 Eclipse Jetty XmlParser allows arbitrary DOCTYPE declarations

漏洞详情: https://github.com/advisories/GHSA-58qw-p7qm-5rvh

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

org.apache.hadoop:hadoop-common CVE-2024-23454 低危 3.2.4 3.4.0 Apache Hadoop: Temporary File Local Information Disclosure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23454

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2024-09-25 08:15 修改: 2024-11-05 20:35

org.eclipse.jetty:jetty-server CVE-2023-26049 低危 9.4.50.v20221201 9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049

镜像层: sha256:d1d6755691c921a173a2ba9c849639d40ec58c38cbbefde59ce9a7b2cd972bc3

发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36