com.baomidou:mybatis-plus |
CVE-2023-25330 |
严重 |
3.3.2 |
3.5.3.1 |
MyBatis-Plus vulnerable to SQL injection via TenantPlugin
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25330
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-04-05 14:15 修改: 2024-08-02 12:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14718 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: arbitrary code execution in slf4j-ext class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14719 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14720 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: exfiltration/XXE in some JDK classes
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14720
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-14721 |
严重 |
2.9.6 |
2.9.7, 2.8.11.3, 2.7.9.5 |
jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14721
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19360 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5 |
jackson-databind: improper polymorphic deserialization in axis2-transport-jms class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19360
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19361 |
严重 |
2.9.6 |
2.7.9.5, 2.9.8, 2.8.11.3 |
jackson-databind: improper polymorphic deserialization in openjpa class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19361
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2018-19362 |
严重 |
2.9.6 |
2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 |
jackson-databind: improper polymorphic deserialization in jboss-common-core class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14379 |
严重 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6 |
jackson-databind: default typing mishandling leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14540 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16335 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16942 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-16943 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17267 |
严重 |
2.9.6 |
2.9.10, 2.8.11.5 |
jackson-databind: Serialization gadgets in classes of the ehcache package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-17531 |
严重 |
2.9.6 |
2.9.10.1, 2.8.11.5, 2.6.7.3 |
jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-20330 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 |
jackson-databind: lacks certain net.sf.ehcache blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-8840 |
严重 |
2.9.6 |
2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 |
jackson-databind: Lacks certain xbean-reflect/JNDI blocking
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9546 |
严重 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in shaded-hikari-config
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9546
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9547 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in ibatis-sqlmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-9548 |
严重 |
2.9.6 |
2.9.10.4, 2.8.11.6, 2.7.9.7 |
jackson-databind: Serialization gadgets in anteros-core
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26
|
com.itextpdf:itextpdf |
CVE-2021-43113 |
严重 |
5.5.13.2 |
5.5.13.3 |
iTextPDF in iText 7 and up to (excluding 4.4.13.3) 7.1.17 allows comma ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43113
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-12-15 07:15 修改: 2023-03-24 22:15
|
io.springfox:springfox-swagger-ui |
CVE-2019-17495 |
严重 |
2.9.2 |
2.10.0 |
Cross-site scripting in Swagger-UI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17495
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-10-10 22:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2019-17571 |
严重 |
1.2.12 |
|
log4j: deserialization of untrusted data in SocketServer
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17571
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-12-20 17:15 修改: 2023-11-07 03:06
|
log4j:log4j |
CVE-2022-23305 |
严重 |
1.2.12 |
|
log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23305
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
log4j:log4j |
CVE-2022-23307 |
严重 |
1.2.12 |
|
log4j: Unsafe deserialization flaw in Chainsaw log viewer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23307
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:29
|
org.springframework.boot:spring-boot-actuator-autoconfigure |
CVE-2023-20873 |
严重 |
2.3.5.RELEASE |
3.0.6, 2.7.11, 2.6.15, 2.5.15 |
spring-boot: Security Bypass With Wildcard Pattern Matching on Cloud Foundry
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20873
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-04-20 21:15 修改: 2023-08-28 13:15
|
org.springframework.boot:spring-boot-starter-web |
CVE-2022-22965 |
严重 |
2.3.5.RELEASE |
2.5.12, 2.6.6 |
spring-framework: RCE via Data Binding on JDK 9+
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22965
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-04-01 23:15 修改: 2024-10-18 19:52
|
org.springframework:spring-beans |
CVE-2022-22965 |
严重 |
5.2.10.RELEASE |
5.2.20.RELEASE, 5.3.18 |
spring-framework: RCE via Data Binding on JDK 9+
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22965
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-04-01 23:15 修改: 2024-10-18 19:52
|
org.springframework:spring-web |
CVE-2016-1000027 |
严重 |
5.2.10.RELEASE |
6.0.0 |
spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000027
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-01-02 23:15 修改: 2023-04-20 09:15
|
org.springframework:spring-webmvc |
CVE-2022-22965 |
严重 |
5.2.10.RELEASE |
5.2.20.RELEASE, 5.3.18 |
spring-framework: RCE via Data Binding on JDK 9+
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22965
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-04-01 23:15 修改: 2024-10-18 19:52
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14439 |
高危 |
2.9.6 |
2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: Polymorphic typing issue related to logback/JNDI
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14892 |
高危 |
2.9.6 |
2.6.7.3, 2.8.11.5, 2.9.10 |
jackson-databind: Serialization gadgets in classes of the commons-configuration package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-14893 |
高危 |
2.9.6 |
2.9.10 |
jackson-databind: Serialization gadgets in classes of the xalan package
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14893
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-03-02 21:15 修改: 2023-11-07 03:05
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10650 |
高危 |
2.9.6 |
2.9.10.4 |
A deserialization flaw was discovered in jackson-databind through 2.9. ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10672 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10672
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10673 |
高危 |
2.9.6 |
2.9.10.4, 2.6.7.4 |
jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10968 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10968
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-10969 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in javax.swing.JEditorPane
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10969
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11111 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11111
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11112 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11112
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11113 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11113
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11619 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in org.springframework:spring-aop
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11619
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-11620 |
高危 |
2.9.6 |
2.9.10.4 |
jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11620
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14060 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14060
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-06-14 21:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14061 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in weblogic/oracle-aqjms
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14061
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14062 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14062
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-14195 |
高危 |
2.9.6 |
2.9.10.5 |
jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14195
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-06-16 16:15 修改: 2021-11-17 20:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24616 |
高危 |
2.9.6 |
2.9.10.6 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-24750 |
高危 |
2.9.6 |
2.6.7.5, 2.9.10.6 |
jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-25649 |
高危 |
2.9.6 |
2.6.7.4, 2.9.10.7, 2.10.5.1 |
jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35490 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35491 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-35728 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36179 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36180 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36181 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36182 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36183 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36184 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36185 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36186 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36187 |
高危 |
2.9.6 |
2.9.10.8 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36188 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36189 |
高危 |
2.9.6 |
2.9.10.8, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.9.6 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-20190 |
高危 |
2.9.6 |
2.9.10.7, 2.6.7.5 |
jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.9.6 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
com.fasterxml.jackson.dataformat:jackson-dataformat-cbor |
CVE-2020-28491 |
高危 |
2.11.3 |
2.11.4, 2.12.1 |
jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28491
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-02-18 16:15 修改: 2022-12-06 21:44
|
ch.qos.logback:logback-core |
CVE-2023-6378 |
高危 |
1.2.3 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-11-29 12:15 修改: 2023-12-05 21:00
|
com.lowagie:itext |
CVE-2017-9096 |
高危 |
2.0.8 |
|
itext: External entities not disabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-9096
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2017-11-08 16:29 修改: 2020-10-20 22:15
|
commons-io:commons-io |
CVE-2024-47554 |
高危 |
2.5 |
2.14.0 |
apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-10-03 12:15 修改: 2024-10-04 13:50
|
ch.qos.logback:logback-core |
CVE-2023-6378 |
高危 |
1.2.3 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-11-29 12:15 修改: 2023-12-05 21:00
|
com.amazonaws:aws-java-sdk-s3 |
CVE-2022-31159 |
高危 |
1.11.792 |
1.12.261 |
Partial Path Traversal in com.amazonaws:aws-java-sdk-s3
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31159
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-07-15 18:15 修改: 2022-07-22 16:27
|
ch.qos.logback:logback-classic |
CVE-2023-6378 |
高危 |
1.2.3 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-11-29 12:15 修改: 2023-12-05 21:00
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2020-36518 |
高危 |
2.11.3 |
2.13.2.1, 2.12.6.1 |
jackson-databind: denial of service via a large depth of nested objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12
|
log4j:log4j |
CVE-2021-4104 |
高危 |
1.2.12 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4104
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-12-14 12:15 修改: 2023-12-22 09:15
|
log4j:log4j |
CVE-2022-23302 |
高危 |
1.2.12 |
|
log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23302
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-01-18 16:15 修改: 2023-02-24 15:30
|
org.apache.commons:commons-compress |
CVE-2021-35515 |
高危 |
1.19 |
1.21 |
apache-commons-compress: infinite loop when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35516 |
高危 |
1.19 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-35517 |
高危 |
1.19 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2021-36090 |
高危 |
1.19 |
1.21 |
apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36
|
org.apache.commons:commons-compress |
CVE-2024-25710 |
高危 |
1.19 |
1.26.0 |
commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15
|
org.apache.hive:hive-service |
CVE-2015-7521 |
高危 |
1.2.1 |
1.2.2 |
High severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7521
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2016-01-29 20:59 修改: 2018-10-09 19:58
|
org.apache.hive:hive-service |
CVE-2016-3083 |
高危 |
1.2.1 |
1.2.2, 2.0.1 |
org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service vulnerable to Improper Certificate Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-3083
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2017-05-30 14:29 修改: 2023-11-07 02:32
|
org.apache.thrift:libthrift |
CVE-2018-1320 |
高危 |
0.9.2 |
0.9.3-1, 0.12.0 |
thrift: SASL negotiation isComplete validation bypass in the org.apache.thrift.transport.TSaslTransport class
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1320
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-01-07 17:29 修改: 2023-11-07 02:55
|
org.apache.thrift:libthrift |
CVE-2019-0205 |
高危 |
0.9.2 |
0.13.0 |
thrift: Endless loop when feed with specific input data
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0205
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-10-29 19:15 修改: 2023-11-07 03:01
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2021-25122 |
高危 |
9.0.39 |
10.0.2, 9.0.43, 8.5.63 |
tomcat: Request mix-up with h2c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25122
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-03-01 12:15 修改: 2023-11-07 03:31
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2021-25329 |
高危 |
9.0.39 |
10.0.2, 9.0.41, 8.5.61, 7.0.108 |
tomcat: Incomplete fix for CVE-2020-9484 (RCE via session persistence)
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25329
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-03-01 12:15 修改: 2023-11-07 03:31
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2022-42252 |
高危 |
9.0.39 |
8.5.83, 9.0.68, 10.0.27, 10.1.1 |
tomcat: request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42252
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-11-01 09:15 修改: 2023-05-30 06:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-24998 |
高危 |
9.0.39 |
10.1.5, 11.0.0-M5, 8.5.88, 9.0.71 |
FileUpload: FileUpload DoS with excessive parts
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-46589 |
高危 |
9.0.39 |
11.0.0-M11, 10.1.16, 9.0.83, 8.5.96 |
tomcat: HTTP request smuggling via malformed trailer headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46589
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-11-28 16:15 修改: 2024-07-12 16:11
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2024-34750 |
高危 |
9.0.39 |
11.0.0-M21, 10.1.25, 9.0.90 |
tomcat: Improper Handling of Exceptional Conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34750
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-07-03 20:15 修改: 2024-07-09 16:22
|
org.eclipse.jetty:jetty-server |
CVE-2018-12545 |
高危 |
9.4.11.v20180605 |
9.4.12.v20180830, 9.3.25.v20180904 |
jetty: large settings frames causing denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12545
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-03-27 20:29 修改: 2023-11-07 02:52
|
org.eclipse.jetty:jetty-server |
CVE-2021-28165 |
高危 |
9.4.11.v20180605 |
9.4.39, 10.0.2, 11.0.2 |
jetty: Resource exhaustion when receiving an invalid large TLS frame
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28165
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-04-01 15:15 修改: 2023-11-07 03:32
|
org.mybatis:mybatis |
CVE-2020-26945 |
高危 |
3.5.4 |
3.5.6 |
mybatis: mishandles deserialization of object streams which could result in remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26945
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-10-10 20:15 修改: 2020-10-26 15:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2021-46877 |
高危 |
2.11.3 |
2.12.6, 2.13.1 |
jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21
|
org.springframework.boot:spring-boot-autoconfigure |
CVE-2023-20883 |
高危 |
2.3.5.RELEASE |
3.0.7, 2.7.12, 2.6.15, 2.5.15 |
spring-boot: Spring Boot Welcome Page DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20883
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-05-26 17:15 修改: 2023-07-03 16:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42003 |
高危 |
2.11.3 |
2.12.7.1, 2.13.4.2 |
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2022-42004 |
高危 |
2.11.3 |
2.12.7.1, 2.13.4 |
jackson-databind: use of deeply nested arrays
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10
|
org.springframework:spring-beans |
CVE-2022-22970 |
高危 |
5.2.10.RELEASE |
5.2.22.RELEASE, 5.3.20 |
springframework: DoS via data binding to multipartFile or servlet part
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22970
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-05-12 20:15 修改: 2022-10-07 13:17
|
org.springframework:spring-context |
CVE-2022-22968 |
高危 |
5.2.10.RELEASE |
5.3.19, 5.2.21.RELEASE |
Framework: Data Binding Rules Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22968
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-04-14 21:15 修改: 2022-10-19 15:15
|
org.springframework:spring-expression |
CVE-2023-20863 |
高危 |
5.2.10.RELEASE |
6.0.8, 5.3.27, 5.2.24.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20863
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-04-13 20:15 修改: 2024-06-10 17:16
|
ch.qos.logback:logback-classic |
CVE-2023-6378 |
高危 |
1.2.3 |
1.3.12, 1.4.12, 1.2.13 |
logback: serialization vulnerability in logback receiver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-11-29 12:15 修改: 2023-12-05 21:00
|
org.springframework:spring-web |
CVE-2021-22118 |
高危 |
5.2.10.RELEASE |
5.2.15, 5.3.7 |
spring-web: (re)creating the temporary storage directory could result in a privilege escalation within WebFlux application
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22118
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-05-27 15:15 修改: 2022-10-25 20:57
|
org.springframework:spring-web |
CVE-2024-22243 |
高危 |
5.2.10.RELEASE |
6.1.4, 6.0.17, 5.3.32 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22243
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-02-23 05:15 修改: 2024-08-22 15:35
|
org.springframework:spring-web |
CVE-2024-22259 |
高危 |
5.2.10.RELEASE |
6.1.5, 6.0.18, 5.3.33 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47
|
org.springframework:spring-web |
CVE-2024-22262 |
高危 |
5.2.10.RELEASE |
5.3.34, 6.0.19, 6.1.6 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12086 |
高危 |
2.9.6 |
2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03
|
org.springframework:spring-webmvc |
CVE-2024-38816 |
高危 |
5.2.10.RELEASE |
6.1.13, 6.0.24, 5.3.40 |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-09-13 06:15 修改: 2024-09-13 14:06
|
org.yaml:snakeyaml |
CVE-2022-1471 |
高危 |
1.26 |
2.0 |
SnakeYaml: Constructor Deserialization Remote Code Execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15
|
org.yaml:snakeyaml |
CVE-2022-25857 |
高危 |
1.26 |
1.31 |
snakeyaml: Denial of Service due to missing nested depth limitation for collections
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25857
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-08-30 05:15 修改: 2024-03-15 11:15
|
software.amazon.ion:ion-java |
CVE-2024-21634 |
高危 |
1.0.2 |
1.10.5 |
ion-java: ion-java: Ion Java StackOverflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21634
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-01-03 23:15 修改: 2024-01-10 16:38
|
org.eclipse.jetty:jetty-server |
CVE-2019-10247 |
中危 |
9.4.11.v20180605 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: error path information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10247
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-server |
CVE-2020-27218 |
中危 |
9.4.11.v20180605 |
9.4.35.v20201120 |
jetty: buffer not correctly recycled in Gzip Request inflation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27218
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-11-28 01:15 修改: 2024-02-16 16:46
|
org.eclipse.jetty:jetty-server |
CVE-2020-27223 |
中危 |
9.4.11.v20180605 |
9.4.37, 10.0.1, 11.0.1 |
jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-27223
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-02-26 22:15 修改: 2023-11-07 03:20
|
org.eclipse.jetty:jetty-server |
CVE-2023-26048 |
中危 |
9.4.11.v20180605 |
9.4.51.v20230217, 10.0.14, 11.0.14 |
jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26048
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-04-18 21:15 修改: 2023-09-30 15:15
|
org.eclipse.jetty:jetty-server |
CVE-2024-8184 |
中危 |
9.4.11.v20180605 |
12.0.9, 10.0.24, 11.0.24, 9.4.56 |
org.eclipse.jetty:jetty-server: jetty: Jetty ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-8184
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-10-14 16:15 修改: 2024-10-15 12:57
|
com.google.guava:guava |
CVE-2023-2976 |
中危 |
25.1-jre |
32.0.0-android |
guava: insecure temporary directory creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15
|
org.springframework.boot:spring-boot-actuator |
CVE-2023-34055 |
中危 |
2.3.5.RELEASE |
2.7.18, 3.0.13, 3.1.6 |
spring-boot: org.springframework.boot: spring-boot-actuator class vulnerable to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34055
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-11-28 09:15 修改: 2023-12-21 22:15
|
ch.qos.logback:logback-core |
CVE-2021-42550 |
中危 |
1.2.3 |
1.2.9 |
logback: remote code execution through JNDI call from within its configuration file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42550
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-12-16 19:15 修改: 2022-12-12 21:13
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12384 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03
|
com.squareup.okio:okio |
CVE-2023-3635 |
中危 |
1.17.2 |
3.4.0, 1.17.6 |
okio: GzipSource class improper exception handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17
|
com.fasterxml.jackson.core:jackson-databind |
CVE-2019-12814 |
中危 |
2.9.6 |
2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 |
jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03
|
commons-io:commons-io |
CVE-2021-29425 |
中危 |
2.5 |
2.7 |
apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-29425
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-04-13 07:15 修改: 2023-11-07 03:32
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2021-24122 |
中危 |
9.0.39 |
10.0.0-M10, 9.0.40, 8.5.60, 7.0.107 |
tomcat: Information disclosure when using NTFS file system
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-24122
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-01-14 15:15 修改: 2023-11-07 03:31
|
org.springframework:spring-context |
CVE-2024-38820 |
中危 |
5.2.10.RELEASE |
6.1.14, 6.0.25, 5.3.41 |
The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-10-18 06:15 修改: 2024-10-22 15:42
|
org.springframework:spring-core |
CVE-2021-22060 |
中危 |
5.2.10.RELEASE |
5.3.14, 5.2.19 |
springframework: Additional Log Injection in Spring Framework (follow-up to CVE-2021-22096)
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22060
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-01-10 14:10 修改: 2022-05-13 15:52
|
org.springframework:spring-core |
CVE-2021-22096 |
中危 |
5.2.10.RELEASE |
5.3.11, 5.2.18 |
springframework: malicious input leads to insertion of additional log entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22096
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-10-28 16:15 修改: 2022-04-28 14:53
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-41080 |
中危 |
9.0.39 |
8.5.93, 9.0.80, 10.1.13, 11.0.0-M11 |
tomcat: Open Redirect vulnerability in FORM authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41080
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-08-25 21:15 修改: 2023-11-03 19:00
|
org.springframework:spring-expression |
CVE-2022-22950 |
中危 |
5.2.10.RELEASE |
5.3.17, 5.2.20.RELEASE |
spring-expression: Denial of service via specially crafted SpEL expression
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22950
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-04-01 23:15 修改: 2022-06-22 13:53
|
org.springframework:spring-expression |
CVE-2023-20861 |
中危 |
5.2.10.RELEASE |
6.0.7, 5.3.26, 5.2.23.RELEASE |
springframework: Spring Expression DoS Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20861
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-03-23 21:15 修改: 2023-04-20 09:15
|
org.springframework:spring-expression |
CVE-2024-38808 |
中危 |
5.2.10.RELEASE |
5.3.39 |
spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38808
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-08-20 08:15 修改: 2024-08-20 15:44
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-42795 |
中危 |
9.0.39 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
tomcat: improper cleaning of recycled objects could lead to information leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42795
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-10-10 18:15 修改: 2023-11-04 06:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-44487 |
中危 |
9.0.39 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-10-10 14:15 修改: 2024-08-14 19:57
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2023-45648 |
中危 |
9.0.39 |
11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 |
tomcat: incorrectly parsed http trailer headers can cause request smuggling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45648
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-10-10 19:15 修改: 2023-11-04 06:15
|
org.apache.tomcat.embed:tomcat-embed-core |
CVE-2024-24549 |
中危 |
9.0.39 |
8.5.99, 9.0.86, 10.1.19, 11.0.0-M17 |
Tomcat: HTTP/2 header handling DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24549
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-03-13 16:15 修改: 2024-06-23 09:15
|
org.apache.tomcat.embed:tomcat-embed-websocket |
CVE-2024-23672 |
中危 |
9.0.39 |
11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 |
Tomcat: WebSocket DoS with incomplete closing handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23672
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-03-13 16:15 修改: 2024-06-23 09:15
|
org.springframework:spring-web |
CVE-2024-38809 |
中危 |
5.2.10.RELEASE |
5.3.38, 6.0.23, 6.1.12 |
org.springframework:spring-web: Spring Framework DoS via conditional HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45
|
org.eclipse.jetty:jetty-http |
CVE-2023-40167 |
中危 |
9.4.11.v20180605 |
9.4.52, 10.0.16, 11.0.16, 12.0.1 |
jetty: Improper validation of HTTP/1 content-length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-40167
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-09-15 20:15 修改: 2023-10-13 01:59
|
ch.qos.logback:logback-core |
CVE-2021-42550 |
中危 |
1.2.3 |
1.2.9 |
logback: remote code execution through JNDI call from within its configuration file
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42550
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-12-16 19:15 修改: 2022-12-12 21:13
|
org.apache.thrift:libthrift |
CVE-2018-11798 |
中危 |
0.9.2 |
0.12.0 |
thrift: Improper Access Control grants access to files outside the webservers docroot path
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11798
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-01-07 17:29 修改: 2023-11-07 02:51
|
org.eclipse.jetty:jetty-server |
CVE-2019-10241 |
中危 |
9.4.11.v20180605 |
9.2.27.v20190403, 9.3.26.v20190403, 9.4.16.v20190411 |
jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10241
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.yaml:snakeyaml |
CVE-2022-38749 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38749
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38750 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38750
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38751 |
中危 |
1.26 |
1.31 |
snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38751
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-38752 |
中危 |
1.26 |
1.32 |
snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15
|
org.yaml:snakeyaml |
CVE-2022-41854 |
中危 |
1.26 |
1.32 |
dev-java/snakeyaml: DoS via stack overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15
|
org.eclipse.jetty:jetty-server |
CVE-2019-10246 |
中危 |
9.4.11.v20180605 |
9.2.28.v20190418, 9.3.27.v20190418, 9.4.17.v20190418 |
jetty: Directory Listing on Windows reveals Resource Base path
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10246
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2019-04-22 20:29 修改: 2023-11-07 03:02
|
org.eclipse.jetty:jetty-http |
CVE-2022-2047 |
低危 |
9.4.11.v20180605 |
9.4.47, 10.0.10, 11.0.10 |
jetty-http: improver hostname input handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2047
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2022-07-07 21:15 修改: 2022-10-25 19:10
|
org.eclipse.jetty:jetty-http |
CVE-2024-6763 |
低危 |
9.4.11.v20180605 |
12.0.12 |
org.eclipse.jetty:jetty-http: jetty: Jetty URI parsing of invalid authority
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6763
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2024-10-14 16:15 修改: 2024-10-15 12:57
|
org.apache.hive:hive-service |
CVE-2018-1284 |
低危 |
1.2.1 |
2.3.3 |
hive: Mishandled input in UDFXPathUtil.java allows users to access arbitrary files via crafted XML
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1284
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2018-04-05 13:29 修改: 2023-11-07 02:55
|
org.eclipse.jetty:jetty-server |
CVE-2021-34428 |
低危 |
9.4.11.v20180605 |
9.4.41, 10.0.3, 11.0.3 |
jetty: SessionListener can prevent a session from being invalidated breaking logout
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34428
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2021-06-22 15:15 修改: 2023-11-07 03:35
|
org.eclipse.jetty:jetty-server |
CVE-2023-26049 |
低危 |
9.4.11.v20180605 |
9.4.51.v20230217, 10.0.14, 11.0.14, 12.0.0.beta0 |
jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26049
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2023-04-18 21:15 修改: 2024-02-01 15:36
|
com.google.guava:guava |
CVE-2020-8908 |
低危 |
25.1-jre |
32.0.0-android |
guava: local information disclosure via temporary directory created with unsafe permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908
镜像层: sha256:230ae4f1ca31a6762ef9e742f223f08303c880de6f3fe6a9147f9a03eed0f044
发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30
|