ghcr.io/weaveworks/wego-app:v0.38.0 linux/amd64

ghcr.io/weaveworks/wego-app:v0.38.0 - Trivy安全扫描结果 扫描时间: 2024-12-16 17:38
全部漏洞信息
低危漏洞:12 中危漏洞:27 高危漏洞:6 严重漏洞:3

系统OS: debian 11.8 扫描引擎: Trivy 扫描时间: 2024-12-16 17:38

ghcr.io/weaveworks/wego-app:v0.38.0 (debian 11.8) (debian)
低危漏洞:11 中危漏洞:13 高危漏洞:2 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
libc6 CVE-2024-2961 高危 2.31-13+deb11u7 2.31-13+deb11u9 glibc: Out of bounds write in iconv may lead to remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961

镜像层: sha256:f33e343848bd9064955eb26f7cdaa1a313116ff7cbae32b1b539dbcee622a593

发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15

libc6 CVE-2024-33599 高危 2.31-13+deb11u7 2.31-13+deb11u10 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:f33e343848bd9064955eb26f7cdaa1a313116ff7cbae32b1b539dbcee622a593

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc6 CVE-2023-4806 中危 2.31-13+deb11u7 glibc: potential use-after-free in getaddrinfo()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806

镜像层: sha256:f33e343848bd9064955eb26f7cdaa1a313116ff7cbae32b1b539dbcee622a593

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

libc6 CVE-2023-4813 中危 2.31-13+deb11u7 glibc: potential use-after-free in gaih_inet()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813

镜像层: sha256:f33e343848bd9064955eb26f7cdaa1a313116ff7cbae32b1b539dbcee622a593

发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15

libc6 CVE-2024-33600 中危 2.31-13+deb11u7 2.31-13+deb11u10 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:f33e343848bd9064955eb26f7cdaa1a313116ff7cbae32b1b539dbcee622a593

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc6 CVE-2024-33601 中危 2.31-13+deb11u7 2.31-13+deb11u10 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:f33e343848bd9064955eb26f7cdaa1a313116ff7cbae32b1b539dbcee622a593

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libc6 CVE-2024-33602 中危 2.31-13+deb11u7 2.31-13+deb11u10 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:f33e343848bd9064955eb26f7cdaa1a313116ff7cbae32b1b539dbcee622a593

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

libssl1.1 CVE-2023-5678 中危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5678

镜像层: sha256:714f56238fb5a6e9cde67167648f2d4af7702c2fa07b9de428970fb9b0693e4c

发布日期: 2023-11-06 16:15 修改: 2024-10-14 15:15

libssl1.1 CVE-2024-0727 中危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: denial of service via null dereference

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727

镜像层: sha256:714f56238fb5a6e9cde67167648f2d4af7702c2fa07b9de428970fb9b0693e4c

发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15

libssl1.1 CVE-2024-4741 中危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: Use After Free with SSL_free_buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741

镜像层: sha256:714f56238fb5a6e9cde67167648f2d4af7702c2fa07b9de428970fb9b0693e4c

发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01

libssl1.1 CVE-2024-5535 中危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: SSL_select_next_proto buffer overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535

镜像层: sha256:714f56238fb5a6e9cde67167648f2d4af7702c2fa07b9de428970fb9b0693e4c

发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15

openssl CVE-2023-5678 中危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5678

镜像层: sha256:c8beeff22ce7a27d75ad5f57277fc1859f7107f02a2c0548b9e892fe53fffb5d

发布日期: 2023-11-06 16:15 修改: 2024-10-14 15:15

openssl CVE-2024-0727 中危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: denial of service via null dereference

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0727

镜像层: sha256:c8beeff22ce7a27d75ad5f57277fc1859f7107f02a2c0548b9e892fe53fffb5d

发布日期: 2024-01-26 09:15 修改: 2024-10-14 15:15

openssl CVE-2024-4741 中危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: Use After Free with SSL_free_buffers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4741

镜像层: sha256:c8beeff22ce7a27d75ad5f57277fc1859f7107f02a2c0548b9e892fe53fffb5d

发布日期: 2024-11-13 11:15 修改: 2024-11-13 17:01

openssl CVE-2024-5535 中危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: SSL_select_next_proto buffer overread

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535

镜像层: sha256:c8beeff22ce7a27d75ad5f57277fc1859f7107f02a2c0548b9e892fe53fffb5d

发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15

libc6 CVE-2018-20796 低危 2.31-13+deb11u7 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-20796

镜像层: sha256:f33e343848bd9064955eb26f7cdaa1a313116ff7cbae32b1b539dbcee622a593

发布日期: 2019-02-26 02:29 修改: 2023-11-07 02:56

libc6 CVE-2019-1010022 低危 2.31-13+deb11u7 glibc: stack guard protection bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010022

镜像层: sha256:f33e343848bd9064955eb26f7cdaa1a313116ff7cbae32b1b539dbcee622a593

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libc6 CVE-2019-1010023 低危 2.31-13+deb11u7 glibc: running ldd on malicious ELF leads to code execution because of wrong size computation

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010023

镜像层: sha256:f33e343848bd9064955eb26f7cdaa1a313116ff7cbae32b1b539dbcee622a593

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libssl1.1 CVE-2024-2511 低危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: Unbounded memory growth with session handling in TLSv1.3

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511

镜像层: sha256:714f56238fb5a6e9cde67167648f2d4af7702c2fa07b9de428970fb9b0693e4c

发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15

libssl1.1 CVE-2024-9143 低危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143

镜像层: sha256:714f56238fb5a6e9cde67167648f2d4af7702c2fa07b9de428970fb9b0693e4c

发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35

libc6 CVE-2019-1010024 低危 2.31-13+deb11u7 glibc: ASLR bypass using cache of thread stack and heap

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010024

镜像层: sha256:f33e343848bd9064955eb26f7cdaa1a313116ff7cbae32b1b539dbcee622a593

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libc6 CVE-2019-1010025 低危 2.31-13+deb11u7 glibc: information disclosure of heap addresses of pthread_created thread

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1010025

镜像层: sha256:f33e343848bd9064955eb26f7cdaa1a313116ff7cbae32b1b539dbcee622a593

发布日期: 2019-07-15 04:15 修改: 2024-08-05 03:15

libc6 CVE-2019-9192 低危 2.31-13+deb11u7 glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9192

镜像层: sha256:f33e343848bd9064955eb26f7cdaa1a313116ff7cbae32b1b539dbcee622a593

发布日期: 2019-02-26 18:29 修改: 2024-08-04 22:15

libc6 CVE-2010-4756 低危 2.31-13+deb11u7 glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions

漏洞详情: https://avd.aquasec.com/nvd/cve-2010-4756

镜像层: sha256:f33e343848bd9064955eb26f7cdaa1a313116ff7cbae32b1b539dbcee622a593

发布日期: 2011-03-02 20:00 修改: 2021-09-01 12:15

openssl CVE-2024-2511 低危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: Unbounded memory growth with session handling in TLSv1.3

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2511

镜像层: sha256:c8beeff22ce7a27d75ad5f57277fc1859f7107f02a2c0548b9e892fe53fffb5d

发布日期: 2024-04-08 14:15 修改: 2024-10-14 15:15

openssl CVE-2024-9143 低危 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9143

镜像层: sha256:c8beeff22ce7a27d75ad5f57277fc1859f7107f02a2c0548b9e892fe53fffb5d

发布日期: 2024-10-16 17:15 修改: 2024-11-08 16:35

tzdata DLA-3972-1 未知 2021a-1+deb11u10 2024b-0+deb11u1 tzdata - new timezone database

漏洞详情:

镜像层: sha256:7bea6b893187b14fc0a759fe5f8972d1292a9c0554c87cbf485f0947c26b8a05

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

gitops-server (gobinary)
低危漏洞:1 中危漏洞:14 高危漏洞:4 严重漏洞:3
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
github.com/go-git/go-git/v5 CVE-2023-49569 严重 v5.6.1 5.11.0 go-git: Maliciously crafted Git server replies can lead to path traversal and RCE on go-git clients

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49569

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-01-12 11:15 修改: 2024-01-22 18:57

golang.org/x/crypto CVE-2024-45337 严重 v0.14.0 0.31.0 golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45337

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-12-12 02:02 修改: 2024-12-12 21:15

stdlib CVE-2024-24790 严重 1.20.12 1.21.11, 1.22.4 golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24790

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-06-05 16:15 修改: 2024-09-03 18:35

github.com/cloudflare/circl GHSA-9763-4f94-gfch 高危 v1.3.3 1.3.7 CIRCL's Kyber: timing side-channel (kyberslash2)

漏洞详情: https://github.com/advisories/GHSA-9763-4f94-gfch

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

github.com/go-git/go-git/v5 CVE-2023-49568 高危 v5.6.1 5.11.0 go-git: Maliciously crafted Git server replies can cause DoS on go-git clients

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-49568

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-01-12 11:15 修改: 2024-01-22 17:57

stdlib CVE-2023-45288 高危 1.20.12 1.21.9, 1.22.2 golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45288

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-04-04 21:15 修改: 2024-08-26 21:35

stdlib CVE-2024-34156 高危 1.20.12 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

google.golang.org/protobuf CVE-2024-24786 中危 v1.31.0 1.33.0 golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24786

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-03-05 23:15 修改: 2024-11-07 17:35

gopkg.in/square/go-jose.v2 CVE-2024-28180 中危 v2.6.0 jose-go: improper handling of highly compressed data

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28180

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-03-09 01:15 修改: 2024-06-12 02:15

github.com/hashicorp/go-retryablehttp CVE-2024-6104 中危 v0.7.4 0.7.7 go-retryablehttp: url might write sensitive information to log file

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6104

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-06-24 17:15 修改: 2024-06-26 17:19

golang.org/x/crypto CVE-2023-48795 中危 v0.14.0 0.17.0 ssh: Prefix truncation attack on Binary Packet Protocol (BPP)

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-48795

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2023-12-18 16:15 修改: 2024-12-02 14:54

golang.org/x/net CVE-2023-45288 中危 v0.17.0 0.23.0 golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45288

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-04-04 21:15 修改: 2024-08-26 21:35

stdlib CVE-2023-45289 中危 1.20.12 1.21.8, 1.22.1 golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45289

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-03-05 23:15 修改: 2024-11-04 19:35

stdlib CVE-2023-45290 中危 1.20.12 1.21.8, 1.22.1 golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45290

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-03-05 23:15 修改: 2024-11-07 11:35

stdlib CVE-2024-24783 中危 1.20.12 1.21.8, 1.22.1 golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24783

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-03-05 23:15 修改: 2024-11-05 17:35

stdlib CVE-2024-24784 中危 1.20.12 1.21.8, 1.22.1 golang: net/mail: comments in display names are incorrectly handled

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24784

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-03-05 23:15 修改: 2024-08-05 21:35

stdlib CVE-2024-24785 中危 1.20.12 1.21.8, 1.22.1 golang: html/template: errors returned from MarshalJSON methods may break template escaping

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24785

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-03-05 23:15 修改: 2024-05-01 17:15

stdlib CVE-2024-24789 中危 1.20.12 1.21.11, 1.22.4 golang: archive/zip: Incorrect handling of certain ZIP files

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24789

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-06-05 16:15 修改: 2024-07-03 01:48

stdlib CVE-2024-24791 中危 1.20.12 1.21.12, 1.22.5 net/http: Denial of service due to improper 100-continue handling in net/http

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24791

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-07-02 22:15 修改: 2024-07-08 14:17

stdlib CVE-2024-34155 中危 1.20.12 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-09-06 21:15 修改: 2024-11-04 17:35

stdlib CVE-2024-34158 中危 1.20.12 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35

github.com/golang-jwt/jwt/v4 CVE-2024-51744 低危 v4.4.3 4.5.1 golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-51744

镜像层: sha256:e57022bd4176ed1fbc056c2471be56947bf24eda973487427be6d24510241c53

发布日期: 2024-11-04 22:15 修改: 2024-11-05 16:04