| cn.hutool:hutool-all | CVE-2023-24162 | 严重 | 5.5.1 |  | Dromara Hutool Deserialization of Untrusted Data vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24162 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-01-31 16:15 修改: 2023-02-07 21:48 | 
                            
                            
                                | cn.hutool:hutool-all | CVE-2023-24163 | 严重 | 5.5.1 | 5.8.21 | Dromara hutool vulnerable to SQL Injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24163 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-01-31 16:15 修改: 2024-05-21 17:23 | 
                            
                            
                                | cn.hutool:hutool-all | CVE-2023-24162 | 严重 | 5.5.2 |  | Dromara Hutool Deserialization of Untrusted Data vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24162 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-01-31 16:15 修改: 2023-02-07 21:48 | 
                            
                            
                                | cn.hutool:hutool-all | CVE-2023-24162 | 严重 | 5.5.2 |  | Dromara Hutool Deserialization of Untrusted Data vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24162 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-01-31 16:15 修改: 2023-02-07 21:48 | 
                            
                            
                                | cn.hutool:hutool-all | CVE-2023-24163 | 严重 | 5.5.2 | 5.8.21 | Dromara hutool vulnerable to SQL Injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24163 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-01-31 16:15 修改: 2024-05-21 17:23 | 
                            
                            
                                | cn.hutool:hutool-all | CVE-2023-24163 | 严重 | 5.5.2 | 5.8.21 | Dromara hutool vulnerable to SQL Injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24163 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-01-31 16:15 修改: 2024-05-21 17:23 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-42276 | 严重 | 5.5.1 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42276 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:35 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-42277 | 严重 | 5.5.1 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42277 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:32 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-42276 | 严重 | 5.5.2 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42276 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:35 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-42276 | 严重 | 5.5.2 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42276 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:35 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-42277 | 严重 | 5.5.2 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42277 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:32 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-42277 | 严重 | 5.5.2 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42277 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:32 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-42276 | 严重 | 5.7.15 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42276 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:35 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-42277 | 严重 | 5.7.15 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42277 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:32 | 
                            
                            
                                | cn.hutool:hutool-http | CVE-2022-22885 | 严重 | 5.5.1 | 5.7.19 | Improper Certificate Validation in Hutool 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22885 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-02-16 22:15 修改: 2022-02-25 14:32 | 
                            
                            
                                | cn.hutool:hutool-http | CVE-2022-22885 | 严重 | 5.5.2 | 5.7.19 | Improper Certificate Validation in Hutool 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22885 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-02-16 22:15 修改: 2022-02-25 14:32 | 
                            
                            
                                | cn.hutool:hutool-http | CVE-2022-22885 | 严重 | 5.5.2 | 5.7.19 | Improper Certificate Validation in Hutool 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22885 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-02-16 22:15 修改: 2022-02-25 14:32 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2023-42276 | 严重 | 5.5.1 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42276 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:35 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2023-42277 | 严重 | 5.5.1 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42277 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:32 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2023-42276 | 严重 | 5.5.2 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42276 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:35 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2023-42276 | 严重 | 5.5.2 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42276 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:35 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2023-42277 | 严重 | 5.5.2 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42277 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:32 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2023-42277 | 严重 | 5.5.2 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42277 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:32 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2018-11307 | 严重 | 2.9.4 | 2.7.9.4, 2.8.11.2, 2.9.6 | jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11307 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-07-09 16:15 修改: 2024-04-03 17:40 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2018-14718 | 严重 | 2.9.4 | 2.9.7, 2.8.11.3, 2.7.9.5, 2.6.7.3 | jackson-databind: arbitrary code execution in slf4j-ext class 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14718 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2018-14719 | 严重 | 2.9.4 | 2.9.7, 2.8.11.3, 2.7.9.5 | jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14719 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2018-14720 | 严重 | 2.9.4 | 2.9.7, 2.8.11.3, 2.7.9.5 | jackson-databind: exfiltration/XXE in some JDK classes 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14720 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2018-14721 | 严重 | 2.9.4 | 2.9.7, 2.8.11.3, 2.7.9.5 | jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14721 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:53 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2018-19360 | 严重 | 2.9.4 | 2.9.8, 2.8.11.3, 2.7.9.5 | jackson-databind: improper polymorphic deserialization in axis2-transport-jms class 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19360 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2018-19361 | 严重 | 2.9.4 | 2.7.9.5, 2.9.8, 2.8.11.3 | jackson-databind: improper polymorphic deserialization in openjpa class 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19361 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2018-19362 | 严重 | 2.9.4 | 2.9.8, 2.8.11.3, 2.7.9.5, 2.6.7.3 | jackson-databind: improper polymorphic deserialization in jboss-common-core class 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-19362 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-01-02 18:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2018-7489 | 严重 | 2.9.4 | 2.8.11.1, 2.9.5, 2.7.9.3, 2.6.7.5 | jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-7489 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2018-02-26 15:29 修改: 2023-11-07 03:01 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2019-14379 | 严重 | 2.9.4 | 2.9.9.2, 2.8.11.4, 2.7.9.6 | jackson-databind: default typing mishandling leading to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14379 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-07-29 12:15 修改: 2023-11-07 03:04 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2019-14540 | 严重 | 2.9.4 | 2.9.10, 2.8.11.5, 2.6.7.3 | jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14540 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:04 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2019-16335 | 严重 | 2.9.4 | 2.9.10, 2.8.11.5, 2.6.7.3 | jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16335 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-09-15 22:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2019-16942 | 严重 | 2.9.4 | 2.9.10.1, 2.8.11.5, 2.6.7.3 | jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16942 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2019-16943 | 严重 | 2.9.4 | 2.9.10.1, 2.8.11.5, 2.6.7.3 | jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16943 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-10-01 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2019-17267 | 严重 | 2.9.4 | 2.9.10, 2.8.11.5 | jackson-databind: Serialization gadgets in classes of the ehcache package 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17267 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-10-07 00:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2019-17531 | 严重 | 2.9.4 | 2.9.10.1, 2.8.11.5, 2.6.7.3 | jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17531 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-10-12 21:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2019-20330 | 严重 | 2.9.4 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.2 | jackson-databind: lacks certain net.sf.ehcache blocking 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20330 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-01-03 04:15 修改: 2023-11-07 03:09 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-8840 | 严重 | 2.9.4 | 2.6.7.4, 2.7.9.7, 2.8.11.5, 2.9.10.3 | jackson-databind: Lacks certain xbean-reflect/JNDI blocking 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8840 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-02-10 21:56 修改: 2023-11-07 03:26 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-9546 | 严重 | 2.9.4 | 2.9.10.4 | jackson-databind: Serialization gadgets in shaded-hikari-config 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9546 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-9547 | 严重 | 2.9.4 | 2.9.10.4, 2.8.11.6, 2.7.9.7 | jackson-databind: Serialization gadgets in ibatis-sqlmap 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9547 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-9548 | 严重 | 2.9.4 | 2.9.10.4, 2.8.11.6, 2.7.9.7 | jackson-databind: Serialization gadgets in anteros-core 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-9548 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-03-02 04:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | dom4j:dom4j | CVE-2020-10683 | 严重 | 1.6.1 |  | dom4j: XML External Entity vulnerability in default SAX parser 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10683 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2020-05-01 19:15 修改: 2023-11-07 03:14 | 
                            
                            
                                | org.apache.avro:avro | CVE-2024-47561 | 严重 | 1.9.0 | 1.11.4 | apache-avro: Schema parsing may trigger Remote Code Execution (RCE) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15 | 
                            
                            
                                | org.apache.avro:avro | CVE-2024-47561 | 严重 | 1.9.0 | 1.11.4 | apache-avro: Schema parsing may trigger Remote Code Execution (RCE) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47561 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2024-10-03 11:15 修改: 2024-10-21 09:15 | 
                            
                            
                                | org.apache.commons:commons-text | CVE-2022-42889 | 严重 | 1.9 | 1.10.0 | apache-commons-text: variable interpolation RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42889 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-10-13 13:15 修改: 2024-01-19 16:15 | 
                            
                            
                                | org.apache.commons:commons-text | CVE-2022-42889 | 严重 | 1.9 | 1.10.0 | apache-commons-text: variable interpolation RCE 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42889 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-10-13 13:15 修改: 2024-01-19 16:15 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2018-8014 | 严重 | 8.5.28 | 9.0.9, 8.5.32, 8.0.53, 7.0.88 | tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8014 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-05-16 16:29 修改: 2023-12-08 16:41 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2020-1938 | 严重 | 8.5.28 | 9.0.31, 8.5.51, 7.0.100 | tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1938 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2020-02-24 22:15 修改: 2024-07-24 14:23 | 
                            
                            
                                | org.apache.zookeeper:zookeeper | CVE-2023-44981 | 严重 | 3.4.14 | 3.7.2, 3.8.3, 3.9.1 | zookeeper: Authorization Bypass in Apache ZooKeeper 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44981 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-10-11 12:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | org.quartz-scheduler:quartz | CVE-2019-13990 | 严重 | 2.2.1 | 2.3.2 | libquartz: XXE attacks via job description 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13990 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2019-07-26 19:15 修改: 2024-10-15 19:35 | 
                            
                            
                                | org.quartz-scheduler:quartz | CVE-2019-13990 | 严重 | 2.2.1 | 2.3.2 | libquartz: XXE attacks via job description 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13990 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-07-26 19:15 修改: 2024-10-15 19:35 | 
                            
                            
                                | org.springframework.boot:spring-boot-actuator-autoconfigure | CVE-2023-20873 | 严重 | 2.5.2 | 3.0.6, 2.7.11, 2.6.15, 2.5.15 | spring-boot: Security Bypass With Wildcard Pattern Matching on Cloud Foundry 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20873 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-04-20 21:15 修改: 2023-08-28 13:15 | 
                            
                            
                                | org.springframework.boot:spring-boot-starter-web | CVE-2022-22965 | 严重 | 2.0.0.RELEASE | 2.5.12, 2.6.6 | spring-framework: RCE via Data Binding on JDK 9+ 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22965 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-04-01 23:15 修改: 2024-10-18 19:52 | 
                            
                            
                                | org.springframework.data:spring-data-commons | CVE-2018-1273 | 严重 | 2.0.5.RELEASE | 1.13.11, 2.0.6 | spring-data-commons: Improper neutralization of special elements allow remote attackers to execute code via crafted requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1273 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-04-11 13:29 修改: 2024-07-16 17:53 | 
                            
                            
                                | org.springframework.data:spring-data-commons | CVE-2018-1273 | 严重 | 2.0.5.RELEASE | 1.13.11, 2.0.6 | spring-data-commons: Improper neutralization of special elements allow remote attackers to execute code via crafted requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1273 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2018-04-11 13:29 修改: 2024-07-16 17:53 | 
                            
                            
                                | org.springframework.data:spring-data-mongodb | CVE-2022-22980 | 严重 | 2.0.5.RELEASE | 3.4.1, 3.3.5 | MongoDB: SpEL in query methods allow code injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22980 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-06-23 17:15 修改: 2022-06-30 19:13 | 
                            
                            
                                | org.springframework.data:spring-data-mongodb | CVE-2022-22980 | 严重 | 2.0.5.RELEASE | 3.4.1, 3.3.5 | MongoDB: SpEL in query methods allow code injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22980 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-06-23 17:15 修改: 2022-06-30 19:13 | 
                            
                            
                                | org.springframework.data:spring-data-mongodb | CVE-2022-22980 | 严重 | 3.2.2 | 3.4.1, 3.3.5 | MongoDB: SpEL in query methods allow code injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22980 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-06-23 17:15 修改: 2022-06-30 19:13 | 
                            
                            
                                | org.springframework.security:spring-security-core | CVE-2022-22978 | 严重 | 5.5.1 | 5.5.7, 5.6.4, 5.4.11 | springframework: Authorization Bypass in RegexRequestMatcher 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22978 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-05-19 15:15 修改: 2023-04-11 23:15 | 
                            
                            
                                | org.springframework.security:spring-security-web | CVE-2022-22978 | 严重 | 5.5.1 | 5.5.7, 5.6.4, 5.4.11 | springframework: Authorization Bypass in RegexRequestMatcher 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22978 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-05-19 15:15 修改: 2023-04-11 23:15 | 
                            
                            
                                | org.springframework:spring-beans | CVE-2022-22965 | 严重 | 5.0.4.RELEASE | 5.2.20.RELEASE, 5.3.18 | spring-framework: RCE via Data Binding on JDK 9+ 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22965 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-04-01 23:15 修改: 2024-10-18 19:52 | 
                            
                            
                                | org.springframework:spring-beans | CVE-2022-22965 | 严重 | 5.3.8 | 5.2.20.RELEASE, 5.3.18 | spring-framework: RCE via Data Binding on JDK 9+ 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22965 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-04-01 23:15 修改: 2024-10-18 19:52 | 
                            
                            
                                | org.springframework:spring-core | CVE-2018-1270 | 严重 | 5.0.4.RELEASE | 5.0.5, 4.3.16 | spring-framework: Possible RCE via spring messaging 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1270 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-04-06 13:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | org.springframework:spring-core | CVE-2018-1275 | 严重 | 5.0.4.RELEASE | 4.3.16, 5.0.5 | spring-framework: Address partial fix for CVE-2018-1270 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1275 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-04-11 13:29 修改: 2023-11-07 02:55 | 
                            
                            
                                | org.springframework:spring-web | CVE-2016-1000027 | 严重 | 5.0.4.RELEASE | 6.0.0 | spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000027 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2020-01-02 23:15 修改: 2023-04-20 09:15 | 
                            
                            
                                | org.springframework:spring-web | CVE-2016-1000027 | 严重 | 5.3.8 | 6.0.0 | spring: HttpInvokerServiceExporter readRemoteInvocation method untrusted java deserialization 漏洞详情: https://avd.aquasec.com/nvd/cve-2016-1000027 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2020-01-02 23:15 修改: 2023-04-20 09:15 | 
                            
                            
                                | org.springframework:spring-webmvc | CVE-2022-22965 | 严重 | 5.0.4.RELEASE | 5.2.20.RELEASE, 5.3.18 | spring-framework: RCE via Data Binding on JDK 9+ 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22965 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-04-01 23:15 修改: 2024-10-18 19:52 | 
                            
                            
                                | org.springframework:spring-webmvc | CVE-2022-22965 | 严重 | 5.3.8 | 5.2.20.RELEASE, 5.3.18 | spring-framework: RCE via Data Binding on JDK 9+ 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22965 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-04-01 23:15 修改: 2024-10-18 19:52 | 
                            
                            
                                | org.thymeleaf:thymeleaf-spring5 | CVE-2021-43466 | 严重 | 3.0.12.RELEASE | 3.0.13.RELEASE | Template injection in thymeleaf-spring5 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43466 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-11-09 12:15 修改: 2022-11-03 20:41 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-42278 | 高危 | 5.7.15 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42278 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:29 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-51075 | 高危 | 5.7.15 | 5.8.24 | hutool-core discovered to contain an infinite loop in the StrSplitter.splitByRegex function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51075 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-12-27 21:15 修改: 2024-01-09 15:23 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-33695 | 高危 | 5.5.1 | 5.8.19 | Insecure Temporary File in HuTool 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33695 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-06-13 16:15 修改: 2023-06-21 15:26 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-42278 | 高危 | 5.5.1 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42278 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:29 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-51075 | 高危 | 5.5.1 | 5.8.24 | hutool-core discovered to contain an infinite loop in the StrSplitter.splitByRegex function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51075 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-12-27 21:15 修改: 2024-01-09 15:23 | 
                            
                            
                                | ch.qos.logback:logback-classic | CVE-2023-6378 | 高危 | 1.2.3 | 1.3.12, 1.4.12, 1.2.13 | logback: serialization vulnerability in logback receiver 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-11-29 12:15 修改: 2023-12-05 21:00 | 
                            
                            
                                | ch.qos.logback:logback-classic | CVE-2023-6378 | 高危 | 1.2.3 | 1.3.12, 1.4.12, 1.2.13 | logback: serialization vulnerability in logback receiver 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-11-29 12:15 修改: 2023-12-05 21:00 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2022-45688 | 高危 | 5.5.1 | 5.8.25 | json stack overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2018-12022 | 高危 | 2.9.4 | 2.7.9.4, 2.8.11.2, 2.9.6 | jackson-databind: improper polymorphic deserialization of types from Jodd-db library 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12022 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2018-12023 | 高危 | 2.9.4 | 2.7.9.4, 2.8.11.2, 2.9.6 | jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12023 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-03-21 16:00 修改: 2023-11-07 02:52 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2019-12086 | 高危 | 2.9.4 | 2.9.9, 2.8.11.4, 2.7.9.6, 2.6.7.3 | jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12086 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-05-17 17:29 修改: 2023-11-07 03:03 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2019-14439 | 高危 | 2.9.4 | 2.9.9.2, 2.8.11.4, 2.7.9.6, 2.6.7.3 | jackson-databind: Polymorphic typing issue related to logback/JNDI 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14439 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-07-30 11:15 修改: 2023-11-07 03:04 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2019-14892 | 高危 | 2.9.4 | 2.6.7.3, 2.8.11.5, 2.9.10 | jackson-databind: Serialization gadgets in classes of the commons-configuration package 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14892 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-03-02 17:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2019-14893 | 高危 | 2.9.4 | 2.9.10 | jackson-databind: Serialization gadgets in classes of the xalan package 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14893 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-03-02 21:15 修改: 2023-11-07 03:05 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-10650 | 高危 | 2.9.4 | 2.9.10.4 | A deserialization flaw was discovered in jackson-databind through 2.9. ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10650 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-12-26 20:15 修改: 2023-08-18 14:15 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-10672 | 高危 | 2.9.4 | 2.9.10.4 | jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10672 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-10673 | 高危 | 2.9.4 | 2.9.10.4, 2.6.7.4 | jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10673 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-03-18 22:15 修改: 2024-07-03 01:36 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-10968 | 高危 | 2.9.4 | 2.9.10.4 | jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10968 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-10969 | 高危 | 2.9.4 | 2.9.10.4 | jackson-databind: Serialization gadgets in javax.swing.JEditorPane 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10969 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-03-26 13:15 修改: 2024-07-03 01:36 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-11111 | 高危 | 2.9.4 | 2.9.10.4 | jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11111 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-11112 | 高危 | 2.9.4 | 2.9.10.4 | jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11112 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-11113 | 高危 | 2.9.4 | 2.9.10.4 | jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11113 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-03-31 05:15 修改: 2024-07-03 01:36 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-11619 | 高危 | 2.9.4 | 2.9.10.4 | jackson-databind: Serialization gadgets in org.springframework:spring-aop 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11619 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-11620 | 高危 | 2.9.4 | 2.9.10.4 | jackson-databind: Serialization gadgets in commons-jelly:commons-jelly 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11620 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-04-07 23:15 修改: 2023-11-07 03:15 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-14060 | 高危 | 2.9.4 | 2.9.10.5 | jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14060 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-06-14 21:15 修改: 2023-11-07 03:17 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-14061 | 高危 | 2.9.4 | 2.9.10.5 | jackson-databind: serialization in weblogic/oracle-aqjms 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14061 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-14062 | 高危 | 2.9.4 | 2.9.10.5 | jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14062 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-06-14 20:15 修改: 2023-11-07 03:17 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-14195 | 高危 | 2.9.4 | 2.9.10.5 | jackson-databind: serialization in org.jsecurity.realm.jndi.JndiRealmFactory 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14195 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-06-16 16:15 修改: 2021-11-17 20:20 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-24616 | 高危 | 2.9.4 | 2.9.10.6 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24616 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-08-25 18:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-24750 | 高危 | 2.9.4 | 2.6.7.5, 2.9.10.6 | jackson-databind: Serialization gadgets in com.pastdev.httpcomponents.configuration.JndiConfiguration 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24750 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-09-17 19:15 修改: 2023-09-13 14:56 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-25649 | 高危 | 2.9.4 | 2.6.7.4, 2.9.10.7, 2.10.5.1 | jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25649 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-12-03 17:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-35490 | 高危 | 2.9.4 | 2.9.10.8 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35490 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-35491 | 高危 | 2.9.4 | 2.9.10.8 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35491 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-12-17 19:15 修改: 2022-09-08 21:32 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-35728 | 高危 | 2.9.4 | 2.9.10.8 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35728 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-12-27 05:15 修改: 2023-11-07 03:22 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-36179 | 高危 | 2.9.4 | 2.9.10.8, 2.6.7.5 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36179 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-36180 | 高危 | 2.9.4 | 2.9.10.8, 2.6.7.5 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36180 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-36181 | 高危 | 2.9.4 | 2.9.10.8, 2.6.7.5 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36181 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-36182 | 高危 | 2.9.4 | 2.9.10.8, 2.6.7.5 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36182 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-01-07 00:15 修改: 2024-07-03 01:36 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-36183 | 高危 | 2.9.4 | 2.9.10.8, 2.6.7.5 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36183 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-01-07 00:15 修改: 2023-09-13 14:56 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-36184 | 高危 | 2.9.4 | 2.9.10.8 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36184 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-01-06 23:15 修改: 2024-07-03 01:36 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-36185 | 高危 | 2.9.4 | 2.9.10.8 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36185 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-36186 | 高危 | 2.9.4 | 2.9.10.8 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36186 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-36187 | 高危 | 2.9.4 | 2.9.10.8 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36187 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-36188 | 高危 | 2.9.4 | 2.9.10.8, 2.6.7.5 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36188 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-36189 | 高危 | 2.9.4 | 2.9.10.8, 2.6.7.5 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36189 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-01-06 23:15 修改: 2023-09-13 14:57 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-36518 | 高危 | 2.9.4 | 2.13.2.1, 2.12.6.1 | jackson-databind: denial of service via a large depth of nested objects 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2021-20190 | 高危 | 2.9.4 | 2.9.10.7, 2.6.7.5 | jackson-databind: mishandles the interaction between serialization gadgets and typing, related to javax.swing 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20190 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-01-19 17:15 修改: 2023-11-07 03:28 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2022-42003 | 高危 | 2.9.4 | 2.12.7.1, 2.13.4.2 | jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2022-42004 | 高危 | 2.9.4 | 2.12.7.1, 2.13.4 | jackson-databind: use of deeply nested arrays 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10 | 
                            
                            
                                | com.google.code.gson:gson | CVE-2022-25647 | 高危 | 2.8.6 | 2.8.9 | com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33 | 
                            
                            
                                | com.google.code.gson:gson | CVE-2022-25647 | 高危 | 2.8.6 | 2.8.9 | com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33 | 
                            
                            
                                | com.google.code.gson:gson | CVE-2022-25647 | 高危 | 2.8.7 | 2.8.9 | com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25647 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-05-01 16:15 修改: 2022-11-28 17:33 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2021-22569 | 高危 | 2.6.1 | 3.16.1, 3.18.2, 3.19.2 | protobuf-java: potential DoS in the parsing procedure for binary data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2021-22570 | 高危 | 2.6.1 | 3.15.0 | protobuf: Incorrect parsing of nullchar in the proto symbol leads to Nullptr dereference 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22570 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-01-26 14:15 修改: 2023-11-07 03:30 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2022-3509 | 高危 | 2.6.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 | protobuf-java: Textformat parsing issue leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2022-3510 | 高危 | 2.6.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 | protobuf-java: Message-Type Extensions parsing issue leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2024-7254 | 高危 | 2.6.1 | 3.25.5, 4.27.5, 4.28.2 | protobuf: StackOverflow vulnerability in Protocol Buffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2024-09-19 01:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2021-22569 | 高危 | 3.19.1 | 3.16.1, 3.18.2, 3.19.2 | protobuf-java: potential DoS in the parsing procedure for binary data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2021-22569 | 高危 | 3.19.1 | 3.16.1, 3.18.2, 3.19.2 | protobuf-java: potential DoS in the parsing procedure for binary data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22569 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-01-10 14:10 修改: 2023-04-18 09:15 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2022-3509 | 高危 | 3.19.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 | protobuf-java: Textformat parsing issue leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2022-3509 | 高危 | 3.19.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 | protobuf-java: Textformat parsing issue leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3509 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-12 13:15 修改: 2022-12-15 16:57 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2022-3510 | 高危 | 3.19.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 | protobuf-java: Message-Type Extensions parsing issue leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2022-3510 | 高危 | 3.19.1 | 3.16.3, 3.19.6, 3.20.3, 3.21.7 | protobuf-java: Message-Type Extensions parsing issue leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3510 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-12 13:15 修改: 2023-11-07 03:51 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2024-7254 | 高危 | 3.19.1 | 3.25.5, 4.27.5, 4.28.2 | protobuf: StackOverflow vulnerability in Protocol Buffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-09-19 01:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2024-7254 | 高危 | 3.19.1 | 3.25.5, 4.27.5, 4.28.2 | protobuf: StackOverflow vulnerability in Protocol Buffers 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7254 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-09-19 01:15 修改: 2024-09-20 12:30 | 
                            
                            
                                | com.hazelcast:hazelcast | CVE-2023-33265 | 高危 | 5.2.1 | 5.2.4, 5.1.7, 5.0.5 | Hazelcast Executor Services don't check client permissions properly 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33265 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-07-18 16:15 修改: 2023-07-28 13:20 | 
                            
                            
                                | com.hazelcast:hazelcast | CVE-2023-33265 | 高危 | 5.2.1 | 5.2.4, 5.1.7, 5.0.5 | Hazelcast Executor Services don't check client permissions properly 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33265 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-07-18 16:15 修改: 2023-07-28 13:20 | 
                            
                            
                                | com.hazelcast:hazelcast | CVE-2023-45859 | 高危 | 5.2.1 | 5.2.5, 5.3.5 | Missing permission checks on Hazelcast client protocol 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45859 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-02-28 22:15 修改: 2024-02-29 13:49 | 
                            
                            
                                | com.hazelcast:hazelcast | CVE-2023-45859 | 高危 | 5.2.1 | 5.2.5, 5.3.5 | Missing permission checks on Hazelcast client protocol 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45859 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2024-02-28 22:15 修改: 2024-02-29 13:49 | 
                            
                            
                                | com.nimbusds:nimbus-jose-jwt | CVE-2023-52428 | 高危 | 9.10 | 9.37.2 | nimbus-jose-jwt: large JWE p2c header value causes Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52428 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-02-11 05:15 修改: 2024-10-16 20:01 | 
                            
                            
                                | commons-fileupload:commons-fileupload | CVE-2023-24998 | 高危 | 1.4 | 1.5 | FileUpload: FileUpload DoS with excessive parts 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11 | 
                            
                            
                                | commons-io:commons-io | CVE-2024-47554 | 高危 | 2.11.0 | 2.14.0 | apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-10-03 12:15 修改: 2024-10-04 13:50 | 
                            
                            
                                | commons-io:commons-io | CVE-2024-47554 | 高危 | 2.11.0 | 2.14.0 | apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-10-03 12:15 修改: 2024-10-04 13:50 | 
                            
                            
                                | commons-io:commons-io | CVE-2024-47554 | 高危 | 2.11.0 | 2.14.0 | apache-commons-io: Possible denial of service attack on untrusted input to XmlStreamReader 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47554 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2024-10-03 12:15 修改: 2024-10-04 13:50 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2023-42278 | 高危 | 5.5.1 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42278 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:29 | 
                            
                            
                                | dom4j:dom4j | CVE-2018-1000632 | 高危 | 1.6.1 |  | dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000632 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-08-20 19:31 修改: 2023-11-07 02:51 | 
                            
                            
                                | io.netty:netty-all | CVE-2019-16869 | 高危 | 4.1.22.Final | 4.1.42.Final | netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16869 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2019-09-26 16:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | io.netty:netty-codec | CVE-2021-37136 | 高危 | 4.1.65.Final | 4.1.68.Final | netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37136 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | io.netty:netty-codec | CVE-2021-37137 | 高危 | 4.1.65.Final | 4.1.68.Final | netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37137 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-10-19 15:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | net.minidev:json-smart | CVE-2023-1370 | 高危 | 2.4.7 | 2.4.9 | json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1370 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-03-22 06:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | ch.qos.logback:logback-core | CVE-2023-6378 | 高危 | 1.2.3 | 1.3.12, 1.4.12, 1.2.13 | logback: serialization vulnerability in logback receiver 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-11-29 12:15 修改: 2023-12-05 21:00 | 
                            
                            
                                | ch.qos.logback:logback-core | CVE-2023-6378 | 高危 | 1.2.3 | 1.3.12, 1.4.12, 1.2.13 | logback: serialization vulnerability in logback receiver 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6378 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-11-29 12:15 修改: 2023-12-05 21:00 | 
                            
                            
                                | org.apache.avro:avro | CVE-2023-39410 | 高危 | 1.9.0 | 1.11.3 | apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | org.apache.avro:avro | CVE-2023-39410 | 高危 | 1.9.0 | 1.11.3 | apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39410 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-09-29 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | org.apache.commons:commons-compress | CVE-2024-25710 | 高危 | 1.21 | 1.26.0 | commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15 | 
                            
                            
                                | org.apache.commons:commons-compress | CVE-2024-25710 | 高危 | 1.21 | 1.26.0 | commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15 | 
                            
                            
                                | org.apache.commons:commons-compress | CVE-2024-25710 | 高危 | 1.21 | 1.26.0 | commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15 | 
                            
                            
                                | org.apache.commons:commons-compress | CVE-2021-35515 | 高危 | 1.8.1 | 1.21 | apache-commons-compress: infinite loop when reading a specially crafted 7Z archive 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35515 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | org.apache.commons:commons-compress | CVE-2021-35516 | 高危 | 1.8.1 | 1.21 | apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35516 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | org.apache.commons:commons-compress | CVE-2021-35517 | 高危 | 1.8.1 | 1.21 | apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35517 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | org.apache.commons:commons-compress | CVE-2021-36090 | 高危 | 1.8.1 | 1.21 | apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36090 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-07-13 08:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | org.apache.commons:commons-compress | CVE-2024-25710 | 高危 | 1.8.1 | 1.26.0 | commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25710 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2024-02-19 09:15 修改: 2024-03-07 17:15 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2022-4565 | 高危 | 5.5.2 | 5.8.11 | HuTool vulnerable to Uncontrolled Resource Consumption 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4565 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-16 19:15 修改: 2024-01-25 20:40 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2022-4565 | 高危 | 5.5.2 | 5.8.11 | HuTool vulnerable to Uncontrolled Resource Consumption 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4565 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-16 19:15 修改: 2024-01-25 20:40 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2022-45688 | 高危 | 5.5.2 | 5.8.25 | json stack overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2022-45688 | 高危 | 5.5.2 | 5.8.25 | json stack overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2018-1336 | 高危 | 8.5.28 | 9.0.8, 8.5.31, 8.0.51, 7.0.87 | tomcat: A bug in the UTF-8 decoder can lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1336 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-08-02 14:29 修改: 2023-12-08 16:41 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2018-8034 | 高危 | 8.5.28 | 9.0.10, 8.5.32, 8.0.53, 7.0.90 | tomcat: Host name verification missing in WebSocket client 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8034 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-08-01 18:29 修改: 2024-10-21 16:35 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2019-0199 | 高危 | 8.5.28 | 9.0.16, 8.5.38 | tomcat: Apache Tomcat HTTP/2 DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0199 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2019-04-10 15:29 修改: 2023-12-08 16:41 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2019-0232 | 高危 | 8.5.28 | 9.0.17, 8.5.40, 7.0.94 | tomcat: Remote Code Execution on Windows 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0232 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2019-04-15 15:29 修改: 2023-12-08 16:41 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2019-10072 | 高危 | 8.5.28 | 9.0.20, 8.5.41 | tomcat: HTTP/2 connection window exhaustion on write, incomplete fix of CVE-2019-0199 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-10072 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2019-06-21 18:15 修改: 2023-12-08 16:41 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2019-12418 | 高危 | 8.5.28 | 7.0.99, 8.5.49, 9.0.29 | tomcat: local privilege escalation 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12418 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2019-12-23 18:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2019-17563 | 高危 | 8.5.28 | 7.0.99, 8.5.50, 9.0.30 | tomcat: Session fixation when using FORM authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-17563 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2019-12-23 17:15 修改: 2023-11-07 03:06 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2021-25122 | 高危 | 8.5.28 | 10.0.2, 9.0.43, 8.5.63 | tomcat: Request mix-up with h2c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25122 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-03-01 12:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2021-25329 | 高危 | 8.5.28 | 10.0.2, 9.0.41, 8.5.61, 7.0.108 | tomcat: Incomplete fix for CVE-2020-9484 (RCE via session persistence) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25329 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-03-01 12:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2022-42252 | 高危 | 8.5.28 | 8.5.83, 9.0.68, 10.0.27, 10.1.1 | tomcat: request smuggling 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42252 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-11-01 09:15 修改: 2023-05-30 06:15 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2023-46589 | 高危 | 8.5.28 | 11.0.0-M11, 10.1.16, 9.0.83, 8.5.96 | tomcat: HTTP request smuggling via malformed trailer headers 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46589 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-11-28 16:15 修改: 2024-07-12 16:11 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2022-42252 | 高危 | 9.0.48 | 8.5.83, 9.0.68, 10.0.27, 10.1.1 | tomcat: request smuggling 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42252 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-11-01 09:15 修改: 2023-05-30 06:15 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2022-45143 | 高危 | 9.0.48 | 8.5.84, 9.0.69, 10.1.2 | tomcat: JsonErrorReportValve injection 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45143 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-01-03 19:15 修改: 2023-06-27 13:15 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2023-24998 | 高危 | 9.0.48 | 10.1.5, 11.0.0-M5, 8.5.88, 9.0.71 | FileUpload: FileUpload DoS with excessive parts 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24998 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-02-20 16:15 修改: 2024-02-16 19:11 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2023-46589 | 高危 | 9.0.48 | 11.0.0-M11, 10.1.16, 9.0.83, 8.5.96 | tomcat: HTTP request smuggling via malformed trailer headers 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46589 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-11-28 16:15 修改: 2024-07-12 16:11 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2024-34750 | 高危 | 9.0.48 | 11.0.0-M21, 10.1.25, 9.0.90 | tomcat: Improper Handling of Exceptional Conditions 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34750 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-07-03 20:15 修改: 2024-07-09 16:22 | 
                            
                            
                                | org.apache.xmlgraphics:batik-bridge | CVE-2022-44729 | 高危 | 1.14 | 1.17 | batik: Server-Side Request Forgery vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44729 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15 | 
                            
                            
                                | org.apache.xmlgraphics:batik-transcoder | CVE-2022-44729 | 高危 | 1.14 | 1.17 | batik: Server-Side Request Forgery vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44729 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2023-42278 | 高危 | 5.5.2 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42278 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:29 | 
                            
                            
                                | org.bitbucket.b_c:jose4j | CVE-2023-31582 | 高危 | 0.7.9 | 0.9.3 | jose4j: Insecure iteration count setting 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31582 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-10-25 18:17 修改: 2023-10-31 15:18 | 
                            
                            
                                | org.bouncycastle:bcprov-jdk15on | CVE-2020-28052 | 高危 | 1.66 | 1.67 | bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28052 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2020-12-18 01:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | org.elasticsearch:elasticsearch | CVE-2023-31418 | 高危 | 7.12.1 | 7.17.13, 8.9.0 | elasticsearch: uncontrolled resource consumption 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31418 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-10-26 18:15 修改: 2023-11-30 22:15 | 
                            
                            
                                | org.hibernate:hibernate-validator | CVE-2017-7536 | 高危 | 5.2.4.Final | 5.2.5.Final, 5.3.6.Final, 5.4.2.Final | hibernate-validator: Privilege escalation when running under the security manager 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-7536 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-01-10 15:29 修改: 2023-11-07 02:50 | 
                            
                            
                                | org.json:json | CVE-2022-45688 | 高危 | 20180813 | 20230227 | json stack overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16 | 
                            
                            
                                | org.json:json | CVE-2022-45688 | 高危 | 20180813 | 20230227 | json stack overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16 | 
                            
                            
                                | org.json:json | CVE-2023-5072 | 高危 | 20180813 | 20231013 | JSON-java: parser confusion leads to OOM 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5072 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-10-12 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | org.json:json | CVE-2023-5072 | 高危 | 20180813 | 20231013 | JSON-java: parser confusion leads to OOM 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5072 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-10-12 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | org.json:json | CVE-2022-45688 | 高危 | 20220320 | 20230227 | json stack overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45688 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-13 15:15 修改: 2023-03-09 15:16 | 
                            
                            
                                | org.json:json | CVE-2023-5072 | 高危 | 20220320 | 20231013 | JSON-java: parser confusion leads to OOM 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5072 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-10-12 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | org.jsoup:jsoup | CVE-2021-37714 | 高危 | 1.10.3 | 1.14.2 | jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37714 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-08-18 15:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2023-42278 | 高危 | 5.5.2 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42278 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:29 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2020-36518 | 高危 | 2.12.3 | 2.13.2.1, 2.12.6.1 | jackson-databind: denial of service via a large depth of nested objects 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36518 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-03-11 07:15 修改: 2022-11-29 22:12 | 
                            
                            
                                | org.springframework.boot:spring-boot | CVE-2022-27772 | 高危 | 2.0.0.RELEASE | 2.2.11.RELEASE | Temporary Directory Hijacking to Local Privilege Escalation Vulnerability in org.springframework.boot:spring-boot 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27772 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-03-30 18:15 修改: 2024-08-03 06:15 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2021-46877 | 高危 | 2.12.3 | 2.12.6, 2.13.1 | jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46877 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-03-18 22:15 修改: 2023-08-08 14:21 | 
                            
                            
                                | org.springframework.boot:spring-boot-autoconfigure | CVE-2023-20883 | 高危 | 2.0.0.RELEASE | 3.0.7, 2.7.12, 2.6.15, 2.5.15 | spring-boot: Spring Boot Welcome Page DoS Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20883 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-05-26 17:15 修改: 2023-07-03 16:15 | 
                            
                            
                                | org.springframework.boot:spring-boot-autoconfigure | CVE-2023-20883 | 高危 | 2.5.2 | 3.0.7, 2.7.12, 2.6.15, 2.5.15 | spring-boot: Spring Boot Welcome Page DoS Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20883 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-05-26 17:15 修改: 2023-07-03 16:15 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2022-42003 | 高危 | 2.12.3 | 2.12.7.1, 2.13.4.2 | jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2022-42004 | 高危 | 2.12.3 | 2.12.7.1, 2.13.4 | jackson-databind: use of deeply nested arrays 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2022-42003 | 高危 | 2.12.6.1 | 2.12.7.1, 2.13.4.2 | jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42003 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-10-02 05:15 修改: 2023-12-20 10:15 | 
                            
                            
                                | org.springframework.data:spring-data-commons | CVE-2018-1259 | 高危 | 2.0.5.RELEASE | 1.13.12, 2.0.7 | spring-data-commons: XXE with Spring Data’s XMLBeam integration 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1259 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-05-11 20:29 修改: 2022-07-25 18:15 | 
                            
                            
                                | org.springframework.data:spring-data-commons | CVE-2018-1259 | 高危 | 2.0.5.RELEASE | 1.13.12, 2.0.7 | spring-data-commons: XXE with Spring Data’s XMLBeam integration 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1259 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2018-05-11 20:29 修改: 2022-07-25 18:15 | 
                            
                            
                                | org.springframework.data:spring-data-commons | CVE-2018-1274 | 高危 | 2.0.5.RELEASE | 1.13.11, 2.0.6 | spring-data-commons: Unlimited path depth in PropertyPath.java allow remote attackers to cause a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1274 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-04-18 16:29 修改: 2022-07-25 18:15 | 
                            
                            
                                | org.springframework.data:spring-data-commons | CVE-2018-1274 | 高危 | 2.0.5.RELEASE | 1.13.11, 2.0.6 | spring-data-commons: Unlimited path depth in PropertyPath.java allow remote attackers to cause a denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1274 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2018-04-18 16:29 修改: 2022-07-25 18:15 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2022-42004 | 高危 | 2.12.6.1 | 2.12.7.1, 2.13.4 | jackson-databind: use of deeply nested arrays 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42004 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-10-02 05:15 修改: 2022-12-02 15:10 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-3276 | 高危 | 5.5.2 |  | HuTool XML parsing module has blind XXE vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3276 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-06-15 13:15 修改: 2024-05-17 02:27 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-3276 | 高危 | 5.5.2 |  | HuTool XML parsing module has blind XXE vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3276 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-06-15 13:15 修改: 2024-05-17 02:27 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-33695 | 高危 | 5.5.2 | 5.8.19 | Insecure Temporary File in HuTool 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33695 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-06-13 16:15 修改: 2023-06-21 15:26 | 
                            
                            
                                | org.springframework.security:spring-security-core | CVE-2024-22257 | 高危 | 5.5.1 | 5.7.12, 5.8.11, 6.1.8, 6.2.3 | spring-security: Broken Access Control With Direct Use of AuthenticatedVoter 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22257 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-03-18 15:15 修改: 2024-04-19 07:15 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-33695 | 高危 | 5.5.2 | 5.8.19 | Insecure Temporary File in HuTool 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33695 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-06-13 16:15 修改: 2023-06-21 15:26 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-42278 | 高危 | 5.5.2 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42278 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:29 | 
                            
                            
                                | org.springframework:spring-beans | CVE-2022-22970 | 高危 | 5.0.4.RELEASE | 5.2.22.RELEASE, 5.3.20 | springframework: DoS via data binding to multipartFile or servlet part 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22970 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-05-12 20:15 修改: 2022-10-07 13:17 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-42278 | 高危 | 5.5.2 |  | hutool Buffer Overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42278 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-08 22:15 修改: 2023-09-13 00:29 | 
                            
                            
                                | org.springframework:spring-beans | CVE-2022-22970 | 高危 | 5.3.8 | 5.2.22.RELEASE, 5.3.20 | springframework: DoS via data binding to multipartFile or servlet part 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22970 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-05-12 20:15 修改: 2022-10-07 13:17 | 
                            
                            
                                | org.springframework:spring-context | CVE-2022-22968 | 高危 | 5.0.4.RELEASE | 5.3.19, 5.2.21.RELEASE | Framework: Data Binding Rules Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22968 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-04-14 21:15 修改: 2022-10-19 15:15 | 
                            
                            
                                | org.springframework:spring-context | CVE-2022-22968 | 高危 | 5.3.8 | 5.3.19, 5.2.21.RELEASE | Framework: Data Binding Rules Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22968 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-04-14 21:15 修改: 2022-10-19 15:15 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-51075 | 高危 | 5.5.2 | 5.8.24 | hutool-core discovered to contain an infinite loop in the StrSplitter.splitByRegex function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51075 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-12-27 21:15 修改: 2024-01-09 15:23 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-51075 | 高危 | 5.5.2 | 5.8.24 | hutool-core discovered to contain an infinite loop in the StrSplitter.splitByRegex function 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51075 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-12-27 21:15 修改: 2024-01-09 15:23 | 
                            
                            
                                | org.springframework:spring-core | CVE-2018-1272 | 高危 | 5.0.4.RELEASE | 4.3.15, 5.0.5 | spring-framework: Multipart content pollution 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1272 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-04-06 13:29 修改: 2022-06-23 16:33 | 
                            
                            
                                | org.springframework:spring-core | CVE-2018-15756 | 高危 | 5.0.4.RELEASE | 5.1.1.RELEASE, 5.0.10.RELEASE, 4.3.20.RELEASE | springframework: DoS Attack via Range Requests 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15756 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-10-18 22:29 修改: 2023-11-07 02:53 | 
                            
                            
                                | org.springframework:spring-expression | CVE-2023-20863 | 高危 | 5.0.4.RELEASE | 6.0.8, 5.3.27, 5.2.24.RELEASE | springframework: Spring Expression DoS Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20863 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-04-13 20:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | org.springframework:spring-expression | CVE-2023-20863 | 高危 | 5.3.8 | 6.0.8, 5.3.27, 5.2.24.RELEASE | springframework: Spring Expression DoS Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20863 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-04-13 20:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2022-4565 | 高危 | 5.5.1 | 5.8.11 | HuTool vulnerable to Uncontrolled Resource Consumption 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4565 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-12-16 19:15 修改: 2024-01-25 20:40 | 
                            
                            
                                | org.springframework:spring-web | CVE-2024-22243 | 高危 | 5.0.4.RELEASE | 6.1.4, 6.0.17, 5.3.32 | springframework: URL Parsing with Host Validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22243 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-02-23 05:15 修改: 2024-08-22 15:35 | 
                            
                            
                                | org.springframework:spring-web | CVE-2024-22259 | 高危 | 5.0.4.RELEASE | 6.1.5, 6.0.18, 5.3.33 | springframework: URL Parsing with Host Validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47 | 
                            
                            
                                | org.springframework:spring-web | CVE-2024-22262 | 高危 | 5.0.4.RELEASE | 5.3.34, 6.0.19, 6.1.6 | springframework: URL Parsing with Host Validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-3276 | 高危 | 5.5.1 |  | HuTool XML parsing module has blind XXE vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3276 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-06-15 13:15 修改: 2024-05-17 02:27 | 
                            
                            
                                | org.springframework:spring-web | CVE-2024-22243 | 高危 | 5.3.8 | 6.1.4, 6.0.17, 5.3.32 | springframework: URL Parsing with Host Validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22243 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-02-23 05:15 修改: 2024-08-22 15:35 | 
                            
                            
                                | org.springframework:spring-web | CVE-2024-22259 | 高危 | 5.3.8 | 6.1.5, 6.0.18, 5.3.33 | springframework: URL Parsing with Host Validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22259 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-03-16 05:15 修改: 2024-07-03 01:47 | 
                            
                            
                                | org.springframework:spring-web | CVE-2024-22262 | 高危 | 5.3.8 | 5.3.34, 6.0.19, 6.1.6 | springframework: URL Parsing with Host Validation 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22262 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-04-16 06:15 修改: 2024-08-27 14:35 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2022-4565 | 高危 | 5.7.15 | 5.8.11 | HuTool vulnerable to Uncontrolled Resource Consumption 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4565 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-16 19:15 修改: 2024-01-25 20:40 | 
                            
                            
                                | org.springframework:spring-webmvc | CVE-2020-5398 | 高危 | 5.0.4.RELEASE | 5.2.3.RELEASE, 5.1.13.RELEASE, 5.0.16.RELEASE | springframework: RFD attack via Content-Disposition Header sourced from request input by Spring MVC or Spring WebFlux Application 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-5398 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2020-01-17 00:15 修改: 2023-11-07 03:23 | 
                            
                            
                                | org.springframework:spring-webmvc | CVE-2024-38816 | 高危 | 5.0.4.RELEASE | 6.1.13, 6.0.24, 5.3.40 | spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-09-13 06:15 修改: 2024-09-13 14:06 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-3276 | 高危 | 5.7.15 |  | HuTool XML parsing module has blind XXE vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3276 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-06-15 13:15 修改: 2024-05-17 02:27 | 
                            
                            
                                | org.springframework:spring-webmvc | CVE-2024-38816 | 高危 | 5.3.8 | 6.1.13, 6.0.24, 5.3.40 | spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38816 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-09-13 06:15 修改: 2024-09-13 14:06 | 
                            
                            
                                | cn.hutool:hutool-core | CVE-2023-33695 | 高危 | 5.7.15 | 5.8.19 | Insecure Temporary File in HuTool 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33695 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-06-13 16:15 修改: 2023-06-21 15:26 | 
                            
                            
                                | org.xerial.snappy:snappy-java | CVE-2023-34455 | 高危 | 1.1.7.3 | 1.1.10.1 | snappy-java: Unchecked chunk length leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34455 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-06-15 18:15 修改: 2024-02-01 14:17 | 
                            
                            
                                | org.xerial.snappy:snappy-java | CVE-2023-43642 | 高危 | 1.1.7.3 | 1.1.10.4 | snappy-java: Missing upper bound check on chunk length in snappy-java can lead to Denial of Service (DoS) impact 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43642 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-09-25 20:15 修改: 2023-09-26 15:46 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2017-18640 | 高危 | 1.18 | 1.26 | snakeyaml: Billion laughs attack via alias feature 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18640 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-12-12 03:15 修改: 2023-11-07 02:41 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-1471 | 高危 | 1.18 | 2.0 | SnakeYaml: Constructor Deserialization Remote Code Execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-25857 | 高危 | 1.18 | 1.31 | snakeyaml: Denial of Service due to missing nested depth limitation for collections 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25857 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-08-30 05:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2017-18640 | 高危 | 1.19 | 1.26 | snakeyaml: Billion laughs attack via alias feature 漏洞详情: https://avd.aquasec.com/nvd/cve-2017-18640 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2019-12-12 03:15 修改: 2023-11-07 02:41 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-1471 | 高危 | 1.19 | 2.0 | SnakeYaml: Constructor Deserialization Remote Code Execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-25857 | 高危 | 1.19 | 1.31 | snakeyaml: Denial of Service due to missing nested depth limitation for collections 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25857 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-08-30 05:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-1471 | 高危 | 1.28 | 2.0 | SnakeYaml: Constructor Deserialization Remote Code Execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1471 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-01 11:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-25857 | 高危 | 1.28 | 1.31 | snakeyaml: Denial of Service due to missing nested depth limitation for collections 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25857 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-08-30 05:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.bouncycastle:bcprov-jdk15on | CVE-2023-33202 | 中危 | 1.60 | 1.70 | bc-java: Out of memory while parsing ASN.1 crafted data in org.bouncycastle.openssl.PEMParser class 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33202 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-11-23 16:15 修改: 2024-09-09 13:53 | 
                            
                            
                                | org.bouncycastle:bcprov-jdk15on | CVE-2024-29857 | 中危 | 1.60 | 1.78 | org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29857 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-05-14 15:17 修改: 2024-08-15 19:35 | 
                            
                            
                                | org.bouncycastle:bcprov-jdk15on | CVE-2024-30171 | 中危 | 1.60 | 1.78 | bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-30171 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-05-14 15:21 修改: 2024-08-19 18:35 | 
                            
                            
                                | org.bouncycastle:bcprov-jdk15on | CVE-2024-30172 | 中危 | 1.60 | 1.78 | org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-30172 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-05-14 15:21 修改: 2024-06-14 13:15 | 
                            
                            
                                | com.hazelcast:hazelcast | CVE-2023-33264 | 中危 | 5.2.1 | 5.3.0 | hazelcast: Improper password mask 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33264 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-05-22 01:15 修改: 2023-06-02 17:41 | 
                            
                            
                                | org.bouncycastle:bcprov-jdk15on | CVE-2023-33201 | 中危 | 1.66 |  | bouncycastle: potential  blind LDAP injection attack using a self-signed certificate 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33201 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-07-05 03:15 修改: 2023-08-24 19:15 | 
                            
                            
                                | org.bouncycastle:bcprov-jdk15on | CVE-2023-33202 | 中危 | 1.66 | 1.70 | bc-java: Out of memory while parsing ASN.1 crafted data in org.bouncycastle.openssl.PEMParser class 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33202 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-11-23 16:15 修改: 2024-09-09 13:53 | 
                            
                            
                                | org.bouncycastle:bcprov-jdk15on | CVE-2024-29857 | 中危 | 1.66 | 1.78 | org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29857 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-05-14 15:17 修改: 2024-08-15 19:35 | 
                            
                            
                                | org.bouncycastle:bcprov-jdk15on | CVE-2024-30171 | 中危 | 1.66 | 1.78 | bc-java: BouncyCastle vulnerable to a timing variant of Bleichenbacher (Marvin Attack) 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-30171 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-05-14 15:21 修改: 2024-08-19 18:35 | 
                            
                            
                                | org.bouncycastle:bcprov-jdk15on | CVE-2024-30172 | 中危 | 1.66 | 1.78 | org.bouncycastle:bcprov-jdk18on: Infinite loop in ED25519 verification in the ScalarUtil class 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-30172 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-05-14 15:21 修改: 2024-06-14 13:15 | 
                            
                            
                                | org.elasticsearch.client:elasticsearch-rest-client | CVE-2021-22145 | 中危 | 7.12.1 | 7.13.4 | elasticsearch: memory disclosure in error reporting 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22145 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-07-21 15:15 修改: 2022-05-10 15:25 | 
                            
                            
                                | com.hazelcast:hazelcast | CVE-2023-33264 | 中危 | 5.2.1 | 5.3.0 | hazelcast: Improper password mask 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33264 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-05-22 01:15 修改: 2023-06-02 17:41 | 
                            
                            
                                | org.elasticsearch:elasticsearch | CVE-2021-22144 | 中危 | 7.12.1 | 6.8.17, 7.13.3 | elasticsearch: uncontrolled recursion in Grok parser 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22144 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-07-26 12:15 修改: 2022-05-10 18:02 | 
                            
                            
                                | org.elasticsearch:elasticsearch | CVE-2021-22147 | 中危 | 7.12.1 | 7.14.0 | elasticsearch: document and field level security was not applied to searchable snapshots 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22147 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-09-15 12:15 修改: 2022-11-04 18:27 | 
                            
                            
                                | org.elasticsearch:elasticsearch | CVE-2023-31417 | 中危 | 7.12.1 | 7.17.13, 8.9.2 | elasticsearch: Sensitive information in audit logs 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31417 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-10-26 18:15 修改: 2024-01-03 19:02 | 
                            
                            
                                | org.elasticsearch:elasticsearch | CVE-2023-31419 | 中危 | 7.12.1 | 7.17.13, 8.9.1 | elasticsearch: StackOverflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31419 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-10-26 18:15 修改: 2024-02-01 02:16 | 
                            
                            
                                | org.elasticsearch:elasticsearch | CVE-2023-46673 | 中危 | 7.12.1 | 7.17.14, 8.10.3 | elasticsearch: Improper Handling of Exceptional Conditions 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46673 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-11-22 10:15 修改: 2023-11-30 20:22 | 
                            
                            
                                | org.elasticsearch:elasticsearch | CVE-2023-49921 | 中危 | 7.12.1 | 7.17.16, 8.11.2 | elasticsearch: Insertion of Sensitive Information into Log File 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49921 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-07-26 05:15 修改: 2024-09-11 14:09 | 
                            
                            
                                | org.elasticsearch:elasticsearch | CVE-2024-23444 | 中危 | 7.12.1 | 8.13.0, 7.17.23 | Elasticsearch stores private key on disk unencrypted 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23444 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-07-31 18:15 修改: 2024-08-01 12:42 | 
                            
                            
                                | org.elasticsearch:elasticsearch | CVE-2024-23450 | 中危 | 7.12.1 | 7.17.19, 8.13.0 | elasticsearch: Possible denial of service when processing documents in a deeply nested pipeline 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23450 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-03-27 17:15 修改: 2024-06-10 17:16 | 
                            
                            
                                | org.hibernate.validator:hibernate-validator | CVE-2020-10693 | 中危 | 6.0.7.Final | 6.1.5.Final, 6.0.20.Final | hibernate-validator: Improper input validation in the interpolation of constraint error messages 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10693 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2020-05-06 14:15 修改: 2023-11-07 03:14 | 
                            
                            
                                | org.apache.commons:commons-compress | CVE-2024-26308 | 中危 | 1.21 | 1.26.0 | commons-compress: OutOfMemoryError unpacking broken Pack200 file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26308 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-02-19 09:15 修改: 2024-03-21 19:54 | 
                            
                            
                                | org.jetbrains.kotlin:kotlin-stdlib | CVE-2020-29582 | 中危 | 1.4.0 | 1.4.21 | kotlin: vulnerable Java API was used for temporary file and folder creation which could result in information disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-29582 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-02-03 16:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | org.jetbrains.kotlin:kotlin-stdlib | CVE-2022-24329 | 中危 | 1.4.0 | 1.6.0 | kotlin: Not possible to lock dependencies for Multiplatform Gradle Projects 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24329 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-02-25 15:15 修改: 2023-02-22 17:50 | 
                            
                            
                                | org.jetbrains.kotlin:kotlin-stdlib | CVE-2022-24329 | 中危 | 1.5.20 | 1.6.0 | kotlin: Not possible to lock dependencies for Multiplatform Gradle Projects 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24329 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-02-25 15:15 修改: 2023-02-22 17:50 | 
                            
                            
                                | org.apache.commons:commons-compress | CVE-2024-26308 | 中危 | 1.21 | 1.26.0 | commons-compress: OutOfMemoryError unpacking broken Pack200 file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26308 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-02-19 09:15 修改: 2024-03-21 19:54 | 
                            
                            
                                | org.apache.commons:commons-compress | CVE-2024-26308 | 中危 | 1.21 | 1.26.0 | commons-compress: OutOfMemoryError unpacking broken Pack200 file 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26308 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-02-19 09:15 修改: 2024-03-21 19:54 | 
                            
                            
                                | com.hazelcast:hazelcast | CVE-2023-45860 | 中危 | 5.2.1 | 5.3.5, 5.2.5 | Hazelcast: Permission checking in CSV File Source connector 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45860 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-02-16 10:15 修改: 2024-02-16 13:37 | 
                            
                            
                                | com.hazelcast:hazelcast | CVE-2023-45860 | 中危 | 5.2.1 | 5.3.5, 5.2.5 | Hazelcast: Permission checking in CSV File Source connector 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45860 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2024-02-16 10:15 修改: 2024-02-16 13:37 | 
                            
                            
                                | com.fasterxml.woodstox:woodstox-core | CVE-2022-40152 | 中危 | 6.0.1 | 6.4.0, 5.4.0 | woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36 | 
                            
                            
                                | com.squareup.okio:okio | CVE-2023-3635 | 中危 | 1.14.0 | 3.4.0, 1.17.6 | okio: GzipSource class improper exception handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17 | 
                            
                            
                                | com.squareup.okio:okio | CVE-2023-3635 | 中危 | 2.7.0 | 3.4.0, 1.17.6 | okio: GzipSource class improper exception handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17 | 
                            
                            
                                | org.jsoup:jsoup | CVE-2022-36033 | 中危 | 1.10.3 | 1.15.3 | jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-36033 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-08-29 17:15 修改: 2022-12-08 03:48 | 
                            
                            
                                | org.apache.commons:commons-compress | CVE-2018-11771 | 中危 | 1.8.1 | 1.18 | apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11771 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2018-08-16 15:29 修改: 2023-11-07 02:51 | 
                            
                            
                                | com.squareup.okio:okio | CVE-2023-3635 | 中危 | 2.8.0 | 3.4.0, 1.17.6 | okio: GzipSource class improper exception handling 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3635 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-07-12 19:15 修改: 2023-10-25 15:17 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2022-3171 | 中危 | 2.6.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 | protobuf-java: timeout in parser leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | org.springframework.boot:spring-boot-actuator | CVE-2023-34055 | 中危 | 2.5.2 | 2.7.18, 3.0.13, 3.1.6 | spring-boot: org.springframework.boot: spring-boot-actuator class vulnerable to denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34055 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-11-28 09:15 修改: 2023-12-21 22:15 | 
                            
                            
                                | org.apache.httpcomponents:httpclient | CVE-2020-13956 | 中危 | 4.5.5 | 4.5.13, 5.0.3 | apache-httpclient: incorrect handling of malformed authority component in request URIs 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17 | 
                            
                            
                                | org.apache.httpcomponents:httpclient | CVE-2020-13956 | 中危 | 4.5.5 | 4.5.13, 5.0.3 | apache-httpclient: incorrect handling of malformed authority component in request URIs 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13956 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-12-02 17:15 修改: 2023-11-07 03:17 | 
                            
                            
                                | org.apache.kafka:kafka-clients | CVE-2021-38153 | 中危 | 2.3.1 | 2.6.3, 2.7.2, 2.8.1 | Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38153 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-09-22 09:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | org.apache.kafka:kafka_2.12 | CVE-2021-38153 | 中危 | 2.3.1 | 2.6.3, 2.7.2, 2.8.1 | Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38153 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-09-22 09:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | com.fasterxml.woodstox:woodstox-core | CVE-2022-40152 | 中危 | 6.2.7 | 6.4.0, 5.4.0 | woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40152 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-09-16 10:15 修改: 2023-02-09 01:36 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2022-45690 | 中危 | 5.5.2 | 5.8.11 | hutool-json stack overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45690 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-13 15:15 修改: 2022-12-16 04:57 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2022-45690 | 中危 | 5.5.2 | 5.8.11 | hutool-json stack overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45690 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-13 15:15 修改: 2022-12-16 04:57 | 
                            
                            
                                | commons-net:commons-net | CVE-2021-37533 | 中危 | 3.6 | 3.9.0 | apache-commons-net: FTP client trusts the host from PASV response by default 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29 | 
                            
                            
                                | commons-net:commons-net | CVE-2021-37533 | 中危 | 3.6 | 3.9.0 | apache-commons-net: FTP client trusts the host from PASV response by default 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29 | 
                            
                            
                                | commons-net:commons-net | CVE-2021-37533 | 中危 | 3.6 | 3.9.0 | apache-commons-net: FTP client trusts the host from PASV response by default 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37533 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-12-03 15:15 修改: 2023-01-10 19:29 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2022-45690 | 中危 | 5.5.1 | 5.8.11 | hutool-json stack overflow vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45690 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-12-13 15:15 修改: 2022-12-16 04:57 | 
                            
                            
                                | com.google.guava:guava | CVE-2023-2976 | 中危 | 30.1.1-android | 32.0.0-android | guava: insecure temporary directory creation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15 | 
                            
                            
                                | io.github.classgraph:classgraph | CVE-2021-47621 | 中危 | 4.8.69 | 4.8.112 | ClassGraph XML External Entity Reference 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47621 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-06-21 06:15 修改: 2024-08-19 17:35 | 
                            
                            
                                | com.google.guava:guava | CVE-2023-2976 | 中危 | 31.0.1-jre | 32.0.0-android | guava: insecure temporary directory creation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15 | 
                            
                            
                                | com.google.guava:guava | CVE-2023-2976 | 中危 | 31.0.1-jre | 32.0.0-android | guava: insecure temporary directory creation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15 | 
                            
                            
                                | org.springframework.security:spring-security-core | CVE-2022-22976 | 中危 | 5.5.1 | 5.5.7, 5.6.4 | springframework: BCrypt skips salt rounds for work factor of 31 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22976 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-05-19 15:15 修改: 2024-06-13 18:38 | 
                            
                            
                                | com.google.guava:guava | CVE-2023-2976 | 中危 | 31.0.1-jre | 32.0.0-android | guava: insecure temporary directory creation 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2976 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2023-06-14 18:15 修改: 2024-02-13 19:15 | 
                            
                            
                                | io.netty:netty-codec-http | CVE-2021-43797 | 中危 | 4.1.65.Final | 4.1.71.Final | netty: control chars in header names may lead to HTTP request smuggling 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43797 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-12-09 19:15 修改: 2023-02-24 15:47 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2018-11784 | 中危 | 8.5.28 | 8.5.34, 7.0.91, 9.0.12 | tomcat: Open redirect in default servlet 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11784 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-10-04 13:29 修改: 2023-12-08 16:41 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2018-8037 | 中危 | 8.5.28 | 9.0.10, 8.5.32 | tomcat: Due to a mishandling of close in NIO/NIO2 connectors user sessions can get mixed up 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-8037 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-08-02 14:29 修改: 2023-12-08 16:41 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2019-0221 | 中危 | 8.5.28 | 9.0.17, 8.5.40, 7.0.94 | tomcat: XSS in SSI printenv 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-0221 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2019-05-28 22:29 修改: 2023-12-08 16:41 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2020-1935 | 中危 | 8.5.28 | 7.0.100, 8.5.51, 9.0.31 | tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1935 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2020-02-24 22:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | org.springframework:spring-context | CVE-2024-38820 | 中危 | 5.0.4.RELEASE | 6.1.14, 6.0.25, 5.3.41 | The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-10-18 06:15 修改: 2024-10-22 15:42 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2021-24122 | 中危 | 8.5.28 | 10.0.0-M10, 9.0.40, 8.5.60, 7.0.107 | tomcat: Information disclosure when using NTFS file system 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-24122 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-01-14 15:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | org.springframework:spring-context | CVE-2024-38820 | 中危 | 5.3.8 | 6.1.14, 6.0.25, 5.3.41 | The fix for CVE-2022-22968 made disallowedFieldspatterns in DataBinder ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38820 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-10-18 06:15 修改: 2024-10-22 15:42 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2023-41080 | 中危 | 8.5.28 | 8.5.93, 9.0.80, 10.1.13, 11.0.0-M11 | tomcat: Open Redirect vulnerability in FORM authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41080 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-08-25 21:15 修改: 2023-11-03 19:00 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2023-42795 | 中危 | 8.5.28 | 11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 | tomcat: improper cleaning of recycled objects could lead to information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42795 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-10-10 18:15 修改: 2023-11-04 06:15 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2023-44487 | 中危 | 8.5.28 | 11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-10-10 14:15 修改: 2024-08-14 19:57 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2023-45648 | 中危 | 8.5.28 | 11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 | tomcat: incorrectly parsed http trailer headers can cause request smuggling 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45648 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-10-10 19:15 修改: 2023-11-04 06:15 | 
                            
                            
                                | org.springframework:spring-core | CVE-2018-11040 | 中危 | 5.0.4.RELEASE | 5.0.7.RELEASE, 4.3.18.RELEASE | springframework: cross-domain requests via JSONP through AbstractJsonpResponseBodyAdvice 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11040 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-06-25 15:29 修改: 2022-06-23 16:31 | 
                            
                            
                                | org.springframework:spring-core | CVE-2018-1257 | 中危 | 5.0.4.RELEASE | 5.0.6, 4.3.17 | spring-framework: ReDoS Attack with spring-messaging 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1257 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-05-11 20:29 修改: 2022-06-23 16:31 | 
                            
                            
                                | org.springframework:spring-core | CVE-2018-1271 | 中危 | 5.0.4.RELEASE | 5.0.5, 4.3.15 | spring-framework: Directory traversal vulnerability with static resources on Windows filesystems 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1271 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-04-06 13:29 修改: 2022-06-23 16:33 | 
                            
                            
                                | org.springframework:spring-core | CVE-2021-22060 | 中危 | 5.3.8 | 5.3.14, 5.2.19 | springframework: Additional Log Injection in Spring Framework (follow-up to CVE-2021-22096) 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22060 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-01-10 14:10 修改: 2022-05-13 15:52 | 
                            
                            
                                | org.springframework:spring-core | CVE-2021-22096 | 中危 | 5.3.8 | 5.3.11, 5.2.18 | springframework: malicious input leads to insertion of additional log entries 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22096 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-10-28 16:15 修改: 2022-04-28 14:53 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2024-21733 | 中危 | 8.5.28 | 8.5.64 | tomcat: Leaking of unrelated request bodies in default error page 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21733 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-01-19 11:15 修改: 2024-02-16 13:15 | 
                            
                            
                                | org.springframework:spring-expression | CVE-2022-22950 | 中危 | 5.0.4.RELEASE | 5.3.17, 5.2.20.RELEASE | spring-expression: Denial of service via specially crafted SpEL expression 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22950 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-04-01 23:15 修改: 2022-06-22 13:53 | 
                            
                            
                                | org.springframework:spring-expression | CVE-2023-20861 | 中危 | 5.0.4.RELEASE | 6.0.7, 5.3.26, 5.2.23.RELEASE | springframework: Spring Expression DoS Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20861 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-03-23 21:15 修改: 2023-04-20 09:15 | 
                            
                            
                                | org.springframework:spring-expression | CVE-2024-38808 | 中危 | 5.0.4.RELEASE | 5.3.39 | spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38808 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-08-20 08:15 修改: 2024-08-20 15:44 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2024-24549 | 中危 | 8.5.28 | 8.5.99, 9.0.86, 10.1.19, 11.0.0-M17 | Tomcat: HTTP/2 header handling DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24549 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-03-13 16:15 修改: 2024-06-23 09:15 | 
                            
                            
                                | org.springframework:spring-expression | CVE-2022-22950 | 中危 | 5.3.8 | 5.3.17, 5.2.20.RELEASE | spring-expression: Denial of service via specially crafted SpEL expression 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22950 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-04-01 23:15 修改: 2022-06-22 13:53 | 
                            
                            
                                | org.springframework:spring-expression | CVE-2023-20861 | 中危 | 5.3.8 | 6.0.7, 5.3.26, 5.2.23.RELEASE | springframework: Spring Expression DoS Vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-20861 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-03-23 21:15 修改: 2023-04-20 09:15 | 
                            
                            
                                | org.springframework:spring-expression | CVE-2024-38808 | 中危 | 5.3.8 | 5.3.39 | spring-expression: Denial of service when processing a specially crafted Spring Expression Language expression 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38808 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-08-20 08:15 修改: 2024-08-20 15:44 | 
                            
                            
                                | org.springframework:spring-messaging | CVE-2022-22971 | 中危 | 5.0.4.RELEASE | 5.3.20, 5.2.22.RELEASE | springframework: DoS with STOMP over WebSocket 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22971 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-05-12 20:15 修改: 2022-10-05 16:54 | 
                            
                            
                                | org.springframework:spring-messaging | CVE-2022-22971 | 中危 | 5.3.8 | 5.3.20, 5.2.22.RELEASE | springframework: DoS with STOMP over WebSocket 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22971 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-05-12 20:15 修改: 2022-10-05 16:54 | 
                            
                            
                                | io.netty:netty-codec-http | CVE-2022-24823 | 中危 | 4.1.65.Final | 4.1.77.Final | netty: world readable temporary file containing sensitive data 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24823 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-05-06 12:15 修改: 2022-12-03 14:25 | 
                            
                            
                                | io.netty:netty-codec-http | CVE-2024-29025 | 中危 | 4.1.65.Final | 4.1.108.Final | netty-codec-http: Allocation of Resources Without Limits or Throttling 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29025 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-03-25 20:15 修改: 2024-06-21 22:15 | 
                            
                            
                                | io.netty:netty-handler | CVE-2023-34462 | 中危 | 4.1.65.Final | 4.1.94.Final | netty: SniHandler 16MB allocation leads to OOM 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34462 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-06-22 23:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2022-3171 | 中危 | 3.19.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 | protobuf-java: timeout in parser leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | org.springframework:spring-web | CVE-2018-11039 | 中危 | 5.0.4.RELEASE | 5.0.7, 4.3.18 | springframework: Cross Site Tracing (XST) if vulnerable to XSS 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-11039 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2018-06-25 15:29 修改: 2022-06-23 16:30 | 
                            
                            
                                | org.springframework:spring-web | CVE-2024-38809 | 中危 | 5.0.4.RELEASE | 5.3.38, 6.0.23, 6.1.12 | org.springframework:spring-web: Spring Framework DoS via conditional HTTP request 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45 | 
                            
                            
                                | com.google.protobuf:protobuf-java | CVE-2022-3171 | 中危 | 3.19.1 | 3.21.7, 3.20.3, 3.19.6, 3.16.3 | protobuf-java: timeout in parser leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3171 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-10-12 23:15 修改: 2023-11-07 03:50 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2023-41080 | 中危 | 9.0.48 | 8.5.93, 9.0.80, 10.1.13, 11.0.0-M11 | tomcat: Open Redirect vulnerability in FORM authentication 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41080 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-08-25 21:15 修改: 2023-11-03 19:00 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2023-42795 | 中危 | 9.0.48 | 11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 | tomcat: improper cleaning of recycled objects could lead to information leak 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42795 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-10-10 18:15 修改: 2023-11-04 06:15 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2023-44487 | 中危 | 9.0.48 | 11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 | HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-10-10 14:15 修改: 2024-08-14 19:57 | 
                            
                            
                                | org.springframework:spring-web | CVE-2024-38809 | 中危 | 5.3.8 | 5.3.38, 6.0.23, 6.1.12 | org.springframework:spring-web: Spring Framework DoS via conditional HTTP request 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38809 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-09-27 17:15 修改: 2024-09-30 12:45 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2023-45648 | 中危 | 9.0.48 | 11.0.0-M12, 10.1.14, 9.0.81, 8.5.94 | tomcat: incorrectly parsed http trailer headers can cause request smuggling 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45648 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-10-10 19:15 修改: 2023-11-04 06:15 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-core | CVE-2024-24549 | 中危 | 9.0.48 | 8.5.99, 9.0.86, 10.1.19, 11.0.0-M17 | Tomcat: HTTP/2 header handling DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24549 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-03-13 16:15 修改: 2024-06-23 09:15 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-websocket | CVE-2024-23672 | 中危 | 8.5.28 | 11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 | Tomcat: WebSocket DoS with incomplete closing handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23672 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-03-13 16:15 修改: 2024-06-23 09:15 | 
                            
                            
                                | org.apache.tomcat.embed:tomcat-embed-websocket | CVE-2024-23672 | 中危 | 9.0.48 | 11.0.0-M17, 10.1.19, 9.0.86, 8.5.99 | Tomcat: WebSocket DoS with incomplete closing handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23672 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-03-13 16:15 修改: 2024-06-23 09:15 | 
                            
                            
                                | ch.qos.logback:logback-core | CVE-2021-42550 | 中危 | 1.2.3 | 1.2.9 | logback: remote code execution through JNDI call from within its configuration file 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42550 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2021-12-16 19:15 修改: 2022-12-12 21:13 | 
                            
                            
                                | org.apache.xmlgraphics:batik-script | CVE-2022-44730 | 中危 | 1.14 | 1.17 | batik: Server-Side Request Forgery vulnerability 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44730 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-08-22 19:16 修改: 2024-01-07 11:15 | 
                            
                            
                                | ch.qos.logback:logback-core | CVE-2021-42550 | 中危 | 1.2.3 | 1.2.9 | logback: remote code execution through JNDI call from within its configuration file 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42550 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-12-16 19:15 修改: 2022-12-12 21:13 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2019-12384 | 中危 | 2.9.4 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 | jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12384 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-06-24 16:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | org.xerial.snappy:snappy-java | CVE-2023-34453 | 中危 | 1.1.7.3 | 1.1.10.1 | snappy-java: Integer overflow in shuffle leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34453 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-06-15 17:15 修改: 2023-06-27 15:59 | 
                            
                            
                                | org.xerial.snappy:snappy-java | CVE-2023-34454 | 中危 | 1.1.7.3 | 1.1.10.1 | snappy-java: Integer overflow in compress leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-34454 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-06-15 17:15 修改: 2023-06-27 16:04 | 
                            
                            
                                | com.fasterxml.jackson.core:jackson-databind | CVE-2019-12814 | 中危 | 2.9.4 | 2.9.9.1, 2.8.11.4, 2.7.9.6, 2.6.7.3 | jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12814 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2019-06-19 14:15 修改: 2023-11-07 03:03 | 
                            
                            
                                | org.bitbucket.b_c:jose4j | CVE-2023-51775 | 中危 | 0.7.9 | 0.9.4 | jose4j: denial of service via specially crafted JWE 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51775 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2024-02-29 01:42 修改: 2024-08-14 19:35 | 
                            
                            
                                | org.bitbucket.b_c:jose4j | GHSA-jgvc-jfgh-rjvv | 中危 | 0.7.9 | 0.9.3 | Chosen Ciphertext Attack in Jose4j 漏洞详情: https://github.com/advisories/GHSA-jgvc-jfgh-rjvv 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-38749 | 中危 | 1.18 | 1.31 | snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38749 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-38750 | 中危 | 1.18 | 1.31 | snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38750 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-38751 | 中危 | 1.18 | 1.31 | snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38751 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-38752 | 中危 | 1.18 | 1.32 | snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-41854 | 中危 | 1.18 | 1.32 | dev-java/snakeyaml: DoS via stack overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | org.bouncycastle:bcprov-ext-jdk15on | CVE-2023-33201 | 中危 | 1.69 |  | bouncycastle: potential  blind LDAP injection attack using a self-signed certificate 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33201 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-07-05 03:15 修改: 2023-08-24 19:15 | 
                            
                            
                                | org.bouncycastle:bcprov-ext-jdk15on | CVE-2023-33202 | 中危 | 1.69 | 1.73 | bc-java: Out of memory while parsing ASN.1 crafted data in org.bouncycastle.openssl.PEMParser class 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33202 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-11-23 16:15 修改: 2024-09-09 13:53 | 
                            
                            
                                | org.bouncycastle:bcprov-jdk15on | CVE-2020-15522 | 中危 | 1.60 | 1.66 | bouncycastle: Timing issue within the EC math library 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-15522 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2021-05-20 12:15 修改: 2021-06-22 09:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-38749 | 中危 | 1.19 | 1.31 | snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38749 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-38750 | 中危 | 1.19 | 1.31 | snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38750 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-38751 | 中危 | 1.19 | 1.31 | snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38751 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-38752 | 中危 | 1.19 | 1.32 | snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-41854 | 中危 | 1.19 | 1.32 | dev-java/snakeyaml: DoS via stack overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | org.bouncycastle:bcprov-jdk15on | CVE-2020-26939 | 中危 | 1.60 | 1.61 | In Legion of the Bouncy Castle BC before 1.61 and BC-FJA before 1.0.1. ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26939 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2020-11-02 22:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | org.bouncycastle:bcprov-jdk15on | CVE-2023-33201 | 中危 | 1.60 |  | bouncycastle: potential  blind LDAP injection attack using a self-signed certificate 漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33201 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2023-07-05 03:15 修改: 2023-08-24 19:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-38749 | 中危 | 1.28 | 1.31 | snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38749 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-38750 | 中危 | 1.28 | 1.31 | snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38750 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-38751 | 中危 | 1.28 | 1.31 | snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38751 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-38752 | 中危 | 1.28 | 1.32 | snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38752 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-09-05 10:15 修改: 2024-03-15 11:15 | 
                            
                            
                                | org.yaml:snakeyaml | CVE-2022-41854 | 中危 | 1.28 | 1.32 | dev-java/snakeyaml: DoS via stack overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41854 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-11-11 13:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2022-45689 | 低危 | 5.5.1 |  | hutool-json vulnerable to memory exhaustion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45689 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2022-12-13 15:15 修改: 2022-12-16 04:57 | 
                            
                            
                                | com.google.guava:guava | CVE-2020-8908 | 低危 | 31.0.1-jre | 32.0.0-android | guava: local information disclosure via temporary directory created with unsafe permissions 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30 | 
                            
                            
                                | com.google.guava:guava | CVE-2020-8908 | 低危 | 31.0.1-jre | 32.0.0-android | guava: local information disclosure via temporary directory created with unsafe permissions 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30 | 
                            
                            
                                | com.google.guava:guava | CVE-2020-8908 | 低危 | 31.0.1-jre | 32.0.0-android | guava: local information disclosure via temporary directory created with unsafe permissions 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908 镜像层: sha256:f0b31c82687b1a5da49f5ad0928246ed8f7666890df72c36e46aec70c8578131 发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30 | 
                            
                            
                                | com.google.guava:guava | CVE-2020-8908 | 低危 | 30.1.1-android | 32.0.0-android | guava: local information disclosure via temporary directory created with unsafe permissions 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8908 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2020-12-10 23:15 修改: 2023-08-02 17:30 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2022-45689 | 低危 | 5.5.2 |  | hutool-json vulnerable to memory exhaustion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45689 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-13 15:15 修改: 2022-12-16 04:57 | 
                            
                            
                                | cn.hutool:hutool-json | CVE-2022-45689 | 低危 | 5.5.2 |  | hutool-json vulnerable to memory exhaustion 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45689 镜像层: sha256:d2a4241544e68c9e654a0fb5aaa6967dd08e9367777fb245087c8fbd9fb78885 发布日期: 2022-12-13 15:15 修改: 2022-12-16 04:57 |