org.apache.avro:avro |
CVE-2024-47561 |
严重 |
1.11.3 |
1.11.4 |
apache-avro: Schema parsing may trigger Remote Code Execution (RCE)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15
|
org.springframework.security:spring-security-web |
CVE-2024-38821 |
严重 |
6.1.7 |
5.7.13, 5.8.15, 6.2.7, 6.0.13, 6.1.11, 6.3.4 |
Spring-WebFlux: Authorization Bypass of Static Resources in WebFlux Applications
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38821
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-10-28 07:15 修改: 2024-10-28 13:58
|
com.google.protobuf:protobuf-java |
CVE-2024-7254 |
高危 |
3.23.3 |
3.25.5, 4.27.5, 4.28.2 |
protobuf: StackOverflow vulnerability in Protocol Buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-09-19 01:15 修改: 2024-12-13 14:15
|
org.springframework.security:spring-security-core |
CVE-2024-22257 |
高危 |
6.1.7 |
5.7.12, 5.8.11, 6.1.8, 6.2.3 |
spring-security: Broken Access Control With Direct Use of AuthenticatedVoter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22257
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-03-18 15:15 修改: 2024-11-12 16:35
|
com.nimbusds:nimbus-jose-jwt |
CVE-2023-52428 |
高危 |
9.24.4 |
9.37.2 |
nimbus-jose-jwt: large JWE p2c header value causes Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-02-11 05:15 修改: 2024-10-30 20:35
|
org.springframework:spring-web |
CVE-2024-22259 |
高危 |
6.0.17 |
6.1.5, 6.0.18, 5.3.33 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47
|
org.springframework:spring-web |
CVE-2024-22262 |
高危 |
6.0.17 |
5.3.34, 6.0.19, 6.1.6 |
springframework: URL Parsing with Host Validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35
|
org.springframework:spring-webflux |
CVE-2024-38816 |
高危 |
6.0.17 |
6.1.13 |
spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-09-13 06:15 修改: 2024-12-27 16:15
|
org.springframework:spring-webflux |
CVE-2024-38819 |
高危 |
6.0.17 |
6.1.14 |
org.springframework:spring-webmvc: Path traversal vulnerability in functional web frameworks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38819
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-12-19 18:15 修改: 2024-12-19 18:15
|
software.amazon.ion:ion-java |
CVE-2024-21634 |
高危 |
1.0.2 |
1.10.5 |
ion-java: ion-java: Ion Java StackOverflow vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21634
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-01-03 23:15 修改: 2024-01-10 16:38
|
org.springframework:spring-beans |
CVE-2024-38827 |
中危 |
6.0.17 |
6.1.14 |
spring-security: authorization bypass for case sensitive comparisons
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38827
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-12-02 15:15 修改: 2024-12-02 15:15
|
org.springframework:spring-context |
CVE-2024-38820 |
中危 |
6.0.17 |
6.1.14 |
The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-10-18 06:15 修改: 2024-11-29 12:15
|
org.springframework:spring-context |
CVE-2024-38827 |
中危 |
6.0.17 |
6.1.14 |
spring-security: authorization bypass for case sensitive comparisons
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38827
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-12-02 15:15 修改: 2024-12-02 15:15
|
org.springframework:spring-core |
CVE-2024-38827 |
中危 |
6.0.17 |
6.1.14 |
spring-security: authorization bypass for case sensitive comparisons
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38827
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-12-02 15:15 修改: 2024-12-02 15:15
|
org.springframework:spring-expression |
CVE-2024-38827 |
中危 |
6.0.17 |
6.1.14 |
spring-security: authorization bypass for case sensitive comparisons
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38827
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-12-02 15:15 修改: 2024-12-02 15:15
|
ch.qos.logback:logback-core |
CVE-2024-12798 |
中危 |
1.4.12 |
1.5.13, 1.3.15 |
logback-core: arbitrary code execution via JaninoEventEvaluator
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12798
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-12-19 16:15 修改: 2025-01-03 14:15
|
org.apache.kafka:kafka-clients |
CVE-2024-31141 |
中危 |
3.5.2 |
3.7.1 |
kafka-clients: privilege escalation to filesystem read-access via automatic ConfigProvider
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31141
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-11-19 09:15 修改: 2024-11-19 21:57
|
org.springframework:spring-web |
CVE-2024-38809 |
中危 |
6.0.17 |
5.3.38, 6.0.23, 6.1.12 |
org.springframework:spring-web: Spring Framework DoS via conditional HTTP request
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45
|
org.springframework.ldap:spring-ldap-core |
CVE-2024-38829 |
中危 |
3.1.4 |
3.2.8, 2.4.4 |
spring-ldap: Spring LDAP sensitive data exposure for case-sensitive comparisons
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38829
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-12-04 21:15 修改: 2024-12-10 15:15
|
io.netty:netty-codec-http |
CVE-2024-29025 |
中危 |
4.1.107.Final |
4.1.108.Final |
netty-codec-http: Allocation of Resources Without Limits or Throttling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29025
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-03-25 20:15 修改: 2024-06-21 22:15
|
io.netty:netty-common |
CVE-2024-47535 |
中危 |
4.1.107.Final |
4.1.115 |
netty: Denial of Service attack on windows app using Netty
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47535
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-11-12 16:15 修改: 2024-11-13 17:01
|
ch.qos.logback:logback-core |
CVE-2024-12801 |
低危 |
1.4.12 |
1.5.13, 1.3.15 |
logback-core: SaxEventRecorder vulnerable to Server-Side Request Forgery (SSRF) attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-12801
镜像层: sha256:a46b2a43bbdf3bd0ec5c50152937a83e23656ba41ed453dc1d09fd29bf75ed6e
发布日期: 2024-12-19 17:15 修改: 2025-01-03 14:15
|