gcr.io/etcd-development/etcd:v3.5.17 linux/amd64

gcr.io/etcd-development/etcd:v3.5.17 - Trivy安全扫描结果 扫描时间: 2025-01-01 15:56
全部漏洞信息
低危漏洞:3 中危漏洞:0 高危漏洞:3 严重漏洞:3

系统OS: debian 11.10 扫描引擎: Trivy 扫描时间: 2025-01-01 15:56

gcr.io/etcd-development/etcd:v3.5.17 (debian 11.10) (debian)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
tzdata DLA-3972-1 未知 2024a-0+deb11u1 2024b-0+deb11u1 tzdata - new timezone database

漏洞详情:

镜像层: sha256:9ed498e122b248a801130d052c25418381ee7bf215cdf7990965bae0dc37dcc2

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

usr/local/bin/etcd (gobinary)
低危漏洞:1 中危漏洞:0 高危漏洞:1 严重漏洞:1
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
golang.org/x/crypto CVE-2024-45337 严重 v0.21.0 0.31.0 golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45337

镜像层: sha256:841f6016904707585ed12733d469cd6d29690cdf2093f80ff6fcd8a74287b6aa

发布日期: 2024-12-12 02:02 修改: 2024-12-12 21:15

golang.org/x/net CVE-2024-45338 高危 v0.23.0 0.33.0 golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45338

镜像层: sha256:841f6016904707585ed12733d469cd6d29690cdf2093f80ff6fcd8a74287b6aa

发布日期: 2024-12-18 21:15 修改: 2024-12-18 21:15

github.com/golang-jwt/jwt/v4 CVE-2024-51744 低危 v4.4.2 4.5.1 golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-51744

镜像层: sha256:841f6016904707585ed12733d469cd6d29690cdf2093f80ff6fcd8a74287b6aa

发布日期: 2024-11-04 22:15 修改: 2024-11-05 16:04

usr/local/bin/etcdctl (gobinary)
低危漏洞:1 中危漏洞:0 高危漏洞:1 严重漏洞:1
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
golang.org/x/crypto CVE-2024-45337 严重 v0.21.0 0.31.0 golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45337

镜像层: sha256:47fd3d5584d490ac4620524b897b25530570dc5ff2083594720621c88de03fdc

发布日期: 2024-12-12 02:02 修改: 2024-12-12 21:15

golang.org/x/net CVE-2024-45338 高危 v0.23.0 0.33.0 golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45338

镜像层: sha256:47fd3d5584d490ac4620524b897b25530570dc5ff2083594720621c88de03fdc

发布日期: 2024-12-18 21:15 修改: 2024-12-18 21:15

github.com/golang-jwt/jwt/v4 CVE-2024-51744 低危 v4.4.2 4.5.1 golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-51744

镜像层: sha256:47fd3d5584d490ac4620524b897b25530570dc5ff2083594720621c88de03fdc

发布日期: 2024-11-04 22:15 修改: 2024-11-05 16:04

usr/local/bin/etcdutl (gobinary)
低危漏洞:1 中危漏洞:0 高危漏洞:1 严重漏洞:1
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
golang.org/x/crypto CVE-2024-45337 严重 v0.21.0 0.31.0 golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45337

镜像层: sha256:1b0e0a0020a21c5078707b00f7fdc274c642ce6b66301b700f4a3df8fd664318

发布日期: 2024-12-12 02:02 修改: 2024-12-12 21:15

golang.org/x/net CVE-2024-45338 高危 v0.23.0 0.33.0 golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45338

镜像层: sha256:1b0e0a0020a21c5078707b00f7fdc274c642ce6b66301b700f4a3df8fd664318

发布日期: 2024-12-18 21:15 修改: 2024-12-18 21:15

github.com/golang-jwt/jwt/v4 CVE-2024-51744 低危 v4.4.2 4.5.1 golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-51744

镜像层: sha256:1b0e0a0020a21c5078707b00f7fdc274c642ce6b66301b700f4a3df8fd664318

发布日期: 2024-11-04 22:15 修改: 2024-11-05 16:04