Pillow |
CVE-2020-11538 |
严重 |
5.4.1 |
7.1.0 |
python-pillow: out-of-bounds reads/writes in the parsing of SGI image files in expandrow/expandrow2
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11538
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2020-06-25 19:15 修改: 2023-11-07 03:14
|
Pillow |
CVE-2020-5310 |
严重 |
5.4.1 |
6.2.2 |
python-pillow: Integer overflow leading to buffer overflow in ImagingLibTiffDecode
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-5310
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2020-01-03 01:15 修改: 2023-11-07 03:23
|
Pillow |
CVE-2020-5311 |
严重 |
5.4.1 |
6.2.2 |
python-pillow: out-of-bounds write in expandrow in libImaging/SgiRleDecode.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-5311
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2020-01-03 01:15 修改: 2023-11-07 03:23
|
Pillow |
CVE-2020-5312 |
严重 |
5.4.1 |
6.2.2 |
python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-5312
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2020-01-03 01:15 修改: 2023-11-07 03:23
|
Pillow |
CVE-2021-25289 |
严重 |
5.4.1 |
8.1.1 |
python-pillow: insufficent fix for CVE-2020-35654 due to incorrect error checking in TiffDecode.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25289
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-03-19 04:15 修改: 2021-12-01 17:03
|
Pillow |
CVE-2021-34552 |
严重 |
5.4.1 |
8.3.0 |
python-pillow: Buffer overflow in image convert function
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34552
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-07-13 17:15 修改: 2023-11-07 03:36
|
Pillow |
CVE-2022-22817 |
严重 |
5.4.1 |
9.0.1 |
python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22817
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2022-01-10 14:12 修改: 2024-10-15 21:35
|
PyYAML |
CVE-2017-18342 |
严重 |
3.13 |
4.1 |
PyYAML: yaml.load() API could execute arbitrary code
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18342
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2018-06-27 12:29 修改: 2023-11-07 02:41
|
PyYAML |
CVE-2020-14343 |
严重 |
3.13 |
5.4 |
PyYAML: incomplete fix for CVE-2020-1747
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14343
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-02-09 21:15 修改: 2023-07-06 18:15
|
PyYAML |
CVE-2020-1747 |
严重 |
3.13 |
5.3.1 |
PyYAML: arbitrary command execution through python/object/new when FullLoader is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1747
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2020-03-24 15:15 修改: 2023-11-07 03:19
|
Pillow |
CVE-2020-10378 |
高危 |
5.4.1 |
7.1.0 |
python-pillow: an out-of-bounds read in libImaging/PcxDecode.c can occur when reading PCX files
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10378
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2020-06-25 19:15 修改: 2023-11-07 03:14
|
Pillow |
CVE-2020-10379 |
高危 |
5.4.1 |
7.1.0 |
python-pillow: two buffer overflows in libImaging/TiffDecode.c due to small buffers allocated in ImagingLibTiffDecode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10379
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2020-06-25 19:15 修改: 2023-11-07 03:14
|
Pillow |
CVE-2020-10994 |
高危 |
5.4.1 |
7.1.0 |
python-pillow: multiple out-of-bounds reads via a crafted JP2 file
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10994
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2020-06-25 19:15 修改: 2023-11-07 03:14
|
Pillow |
CVE-2020-35653 |
高危 |
5.4.1 |
8.1.0 |
python-pillow: Buffer over-read in PCX image reader
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35653
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-01-12 09:15 修改: 2023-11-07 03:22
|
Pillow |
CVE-2020-35654 |
高危 |
5.4.1 |
8.1.0 |
python-pillow: decoding crafted YCbCr files could result in heap-based buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35654
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-01-12 09:15 修改: 2023-11-07 03:22
|
Pillow |
CVE-2020-5313 |
高危 |
5.4.1 |
6.2.2 |
python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-5313
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2020-01-03 01:15 修改: 2023-11-07 03:23
|
Pillow |
CVE-2021-23437 |
高危 |
5.4.1 |
8.3.2 |
python-pillow: possible ReDoS via the getrgb function
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23437
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-09-03 16:15 修改: 2024-03-22 11:15
|
Pillow |
CVE-2021-25287 |
高危 |
5.4.1 |
8.2.0 |
python-pillow: Out-of-bounds read in J2K image reader
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25287
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-06-02 16:15 修改: 2023-11-07 03:31
|
Pillow |
CVE-2021-25288 |
高危 |
5.4.1 |
8.2.0 |
python-pillow: Out-of-bounds read in J2K image reader
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25288
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-06-02 16:15 修改: 2023-11-07 03:31
|
Pillow |
CVE-2021-25290 |
高危 |
5.4.1 |
8.1.1 |
python-pillow: Negative-offset memcpy in TIFF image reader
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25290
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-03-19 04:15 修改: 2021-12-03 18:10
|
Pillow |
CVE-2021-25291 |
高危 |
5.4.1 |
8.2.0 |
python-pillow: out-of-bounds read in TiffReadRGBATile in TiffDecode.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25291
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-03-19 04:15 修改: 2021-12-01 16:23
|
Pillow |
CVE-2021-25293 |
高危 |
5.4.1 |
8.1.1 |
python-pillow: Out-of-bounds read in SGI RLE image reader
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25293
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-03-19 04:15 修改: 2021-12-01 16:20
|
Pillow |
CVE-2021-27921 |
高危 |
5.4.1 |
8.1.1 |
python-pillow: Excessive memory allocation in BLP image reader
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27921
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-03-03 09:15 修改: 2023-11-07 03:32
|
Pillow |
CVE-2021-27922 |
高危 |
5.4.1 |
8.1.1 |
python-pillow: Excessive memory allocation in ICNS image reader
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27922
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-03-03 09:15 修改: 2023-11-07 03:32
|
Pillow |
CVE-2021-27923 |
高危 |
5.4.1 |
8.1.1 |
python-pillow: Excessive memory allocation in ICO image reader
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-27923
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-03-03 09:15 修改: 2023-11-07 03:32
|
Pillow |
CVE-2021-28675 |
高危 |
5.4.1 |
8.2.0 |
python-pillow: Excessive memory allocation in PSD image reader
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28675
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-06-02 15:15 修改: 2023-11-07 03:32
|
Pillow |
CVE-2021-28676 |
高危 |
5.4.1 |
8.2.0 |
python-pillow: Infinite loop in FLI image reader
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28676
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-06-02 16:15 修改: 2023-12-22 15:15
|
Pillow |
CVE-2021-28677 |
高危 |
5.4.1 |
8.2.0 |
python-pillow: Excessive CPU use in EPS image reader
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28677
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-06-02 16:15 修改: 2023-11-07 03:32
|
Pillow |
CVE-2022-24303 |
高危 |
5.4.1 |
9.0.1 |
python-pillow: temporary directory with a space character allows removal of unrelated file after im.show() and related actions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24303
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2022-03-28 02:15 修改: 2023-11-07 03:44
|
Pillow |
CVE-2022-45198 |
高危 |
5.4.1 |
9.2.0 |
Pillow before 9.2.0 performs Improper Handling of Highly Compressed GI ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45198
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2022-11-14 07:15 修改: 2023-01-10 20:11
|
Pillow |
CVE-2023-44271 |
高危 |
5.4.1 |
10.0.0 |
python-pillow: uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44271
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2023-11-03 05:15 修改: 2024-03-22 11:15
|
Pillow |
CVE-2023-4863 |
高危 |
5.4.1 |
10.0.1 |
libwebp: Heap buffer overflow in WebP Codec
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4863
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2023-09-12 15:15 修改: 2024-07-31 18:19
|
Pillow |
CVE-2023-50447 |
高危 |
5.4.1 |
10.2.0 |
pillow: Arbitrary Code Execution via the environment parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50447
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2024-01-19 20:15 修改: 2024-08-01 13:45
|
Pillow |
GHSA-56pw-mpj4-fxww |
高危 |
5.4.1 |
10.0.1 |
Bundled libwebp in Pillow vulnerable
漏洞详情: https://github.com/advisories/GHSA-56pw-mpj4-fxww
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
Pillow |
CVE-2019-16865 |
高危 |
5.4.1 |
6.2.0 |
python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16865
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2019-10-04 22:15 修改: 2023-11-07 03:06
|
Pillow |
CVE-2019-19911 |
高危 |
5.4.1 |
6.2.2 |
python-pillow: uncontrolled resource consumption in FpxImagePlugin.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19911
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2020-01-05 22:15 修改: 2023-11-07 03:07
|
Pillow |
CVE-2020-10177 |
高危 |
5.4.1 |
7.1.0 |
python-pillow: multiple out-of-bounds reads in libImaging/FliDecode.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10177
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2020-06-25 19:15 修改: 2023-11-07 03:14
|
certifi |
CVE-2023-37920 |
高危 |
2018.11.29 |
2023.7.22 |
python-certifi: Removal of e-Tugra root certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37920
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2023-07-25 21:15 修改: 2023-08-12 06:16
|
pip |
CVE-2019-20916 |
高危 |
19.0.1 |
19.2 |
python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20916
镜像层: sha256:0137df19cd999c22669542826ca1421951f516dc1243e7fe78bd44bd206d6e37
发布日期: 2020-09-04 20:15 修改: 2024-02-08 02:04
|
pip |
CVE-2021-3572 |
高危 |
19.0.1 |
21.1 |
python-pip: Incorrect handling of unicode separators in git references
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3572
镜像层: sha256:0137df19cd999c22669542826ca1421951f516dc1243e7fe78bd44bd206d6e37
发布日期: 2021-11-10 18:15 修改: 2024-06-21 19:15
|
setuptools |
CVE-2022-40897 |
高危 |
40.6.3 |
65.5.1 |
pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40897
镜像层: sha256:0137df19cd999c22669542826ca1421951f516dc1243e7fe78bd44bd206d6e37
发布日期: 2022-12-23 00:15 修改: 2024-06-21 19:15
|
setuptools |
CVE-2024-6345 |
高危 |
40.6.3 |
70.0.0 |
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345
镜像层: sha256:0137df19cd999c22669542826ca1421951f516dc1243e7fe78bd44bd206d6e37
发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00
|
uWSGI |
CVE-2023-27522 |
高危 |
2.0.17.1 |
2.0.22 |
httpd: mod_proxy_uwsgi HTTP response splitting
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27522
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2023-03-07 16:15 修改: 2024-10-23 17:35
|
urllib3 |
CVE-2019-11324 |
高危 |
1.24.1 |
1.24.2 |
python-urllib3: Certification mishandle when error should be thrown
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11324
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2019-04-18 21:29 修改: 2023-11-07 03:02
|
wheel |
CVE-2022-40898 |
高危 |
0.32.3 |
0.38.1 |
python-wheel: remote attackers can cause denial of service via attacker controlled input to wheel cli
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40898
镜像层: sha256:0137df19cd999c22669542826ca1421951f516dc1243e7fe78bd44bd206d6e37
发布日期: 2022-12-23 00:15 修改: 2022-12-30 22:15
|
Pillow |
CVE-2021-28678 |
中危 |
5.4.1 |
8.2.0 |
python-pillow: Excessive looping in BLP image reader
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28678
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-06-02 16:15 修改: 2023-11-07 03:32
|
certifi |
CVE-2022-23491 |
中危 |
2018.11.29 |
2022.12.07 |
python-certifi: untrusted root certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23491
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2022-12-07 22:15 修改: 2023-03-24 18:12
|
idna |
CVE-2024-3651 |
中危 |
2.8 |
3.7 |
python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3651
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2024-07-07 18:15 修改: 2024-07-11 14:58
|
Pillow |
CVE-2022-22815 |
中危 |
5.4.1 |
9.0.0 |
python-pillow: improperly initializes ImagePath.Path in path_getbbox() in path.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22815
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2022-01-10 14:12 修改: 2023-01-31 17:27
|
Pillow |
CVE-2022-22816 |
中危 |
5.4.1 |
9.0.0 |
python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22816
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2022-01-10 14:12 修改: 2023-01-31 17:41
|
pip |
CVE-2023-5752 |
中危 |
19.0.1 |
23.3 |
pip: Mercurial configuration injectable in repo revision when installing via pip
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5752
镜像层: sha256:0137df19cd999c22669542826ca1421951f516dc1243e7fe78bd44bd206d6e37
发布日期: 2023-10-25 18:17 修改: 2024-06-10 18:15
|
requests |
CVE-2023-32681 |
中危 |
2.21.0 |
2.31.0 |
python-requests: Unintended leak of Proxy-Authorization header
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32681
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2023-05-26 18:15 修改: 2023-09-17 09:15
|
requests |
CVE-2024-35195 |
中危 |
2.21.0 |
2.32.0 |
requests: subsequent requests to the same host ignore cert verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35195
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2024-05-20 21:15 修改: 2024-06-10 17:16
|
Pillow |
CVE-2024-28219 |
中危 |
5.4.1 |
10.3.0 |
python-pillow: buffer overflow in _imagingcms.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28219
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2024-04-03 03:15 修改: 2024-08-20 20:35
|
Pillow |
GHSA-jgpv-4h4c-xhw3 |
中危 |
5.4.1 |
8.1.2 |
Uncontrolled Resource Consumption in pillow
漏洞详情: https://github.com/advisories/GHSA-jgpv-4h4c-xhw3
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|
MapProxy |
CVE-2017-1000426 |
中危 |
1.9.0 |
1.11.1 |
MapProxy version 1.10.3 and older is vulnerable to a Cross Site Script ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000426
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2018-01-02 21:29 修改: 2019-09-10 13:13
|
Pillow |
CVE-2020-35655 |
中危 |
5.4.1 |
8.1.0 |
python-pillow: Buffer over-read in SGI RLE image reader
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35655
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-01-12 09:15 修改: 2023-11-07 03:22
|
urllib3 |
CVE-2018-25091 |
中危 |
1.24.1 |
1.24.2 |
urllib3: urllib3 does not remove the authorization HTTP header when following a cross-origin redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-25091
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2023-10-15 19:15 修改: 2023-10-19 14:01
|
urllib3 |
CVE-2019-11236 |
中危 |
1.24.1 |
1.24.3 |
python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-11236
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2019-04-15 15:29 修改: 2023-11-07 03:02
|
urllib3 |
CVE-2020-26137 |
中危 |
1.24.1 |
1.25.9 |
python-urllib3: CRLF injection via HTTP request method
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26137
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2020-09-30 18:15 修改: 2023-10-08 14:15
|
urllib3 |
CVE-2023-43804 |
中危 |
1.24.1 |
2.0.6, 1.26.17 |
python-urllib3: Cookie request header isn't stripped during cross-origin redirects
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43804
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2023-10-04 17:15 修改: 2024-02-01 00:55
|
urllib3 |
CVE-2023-45803 |
中危 |
1.24.1 |
2.0.7, 1.26.18 |
urllib3: Request body not stripped after redirect from 303 status changes request method to GET
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45803
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2023-10-17 20:15 修改: 2023-11-03 22:15
|
urllib3 |
CVE-2024-37891 |
中危 |
1.24.1 |
1.26.19, 2.2.2 |
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37891
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44
|
Pillow |
CVE-2021-25292 |
中危 |
5.4.1 |
8.1.1 |
python-pillow: Regular expression DoS in PDF format parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25292
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 2021-03-19 04:15 修改: 2023-08-08 14:22
|
Pillow |
GHSA-4fx9-vc88-q2xc |
低危 |
5.4.1 |
9.0.0 |
Infinite loop in Pillow
漏洞详情: https://github.com/advisories/GHSA-4fx9-vc88-q2xc
镜像层: sha256:1789b5d852a3fc7766ed266ccb93275b98d66b29925f2b4d8fb13f048b0dc481
发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00
|