quay.io/coreos/etcd:v3.5.16 linux/amd64

quay.io/coreos/etcd:v3.5.16 - Trivy安全扫描结果 扫描时间: 2025-02-19 14:59
全部漏洞信息
低危漏洞:3 中危漏洞:0 高危漏洞:3 严重漏洞:3

系统OS: debian 11.10 扫描引擎: Trivy 扫描时间: 2025-02-19 14:59

quay.io/coreos/etcd:v3.5.16 (debian 11.10) (debian)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
tzdata DLA-3972-1 未知 2024a-0+deb11u1 2024b-0+deb11u1 tzdata - new timezone database

漏洞详情:

镜像层: sha256:9ed498e122b248a801130d052c25418381ee7bf215cdf7990965bae0dc37dcc2

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

usr/local/bin/etcd (gobinary)
低危漏洞:1 中危漏洞:0 高危漏洞:1 严重漏洞:1
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
golang.org/x/crypto CVE-2024-45337 严重 v0.21.0 0.31.0 golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45337

镜像层: sha256:e20fa08752cef620fa0d04306a77a07c0beef158663da1eb096070069eaa3d44

发布日期: 2024-12-12 02:02 修改: 2024-12-12 21:15

golang.org/x/net CVE-2024-45338 高危 v0.23.0 0.33.0 golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45338

镜像层: sha256:e20fa08752cef620fa0d04306a77a07c0beef158663da1eb096070069eaa3d44

发布日期: 2024-12-18 21:15 修改: 2024-12-31 20:16

github.com/golang-jwt/jwt/v4 CVE-2024-51744 低危 v4.4.2 4.5.1 golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-51744

镜像层: sha256:e20fa08752cef620fa0d04306a77a07c0beef158663da1eb096070069eaa3d44

发布日期: 2024-11-04 22:15 修改: 2024-11-05 16:04

usr/local/bin/etcdctl (gobinary)
低危漏洞:1 中危漏洞:0 高危漏洞:1 严重漏洞:1
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
golang.org/x/crypto CVE-2024-45337 严重 v0.21.0 0.31.0 golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45337

镜像层: sha256:b882a4334b2d3d2c158a19e88d8954a3d35a94882988ad2ded0d8fb57928502e

发布日期: 2024-12-12 02:02 修改: 2024-12-12 21:15

golang.org/x/net CVE-2024-45338 高危 v0.23.0 0.33.0 golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45338

镜像层: sha256:b882a4334b2d3d2c158a19e88d8954a3d35a94882988ad2ded0d8fb57928502e

发布日期: 2024-12-18 21:15 修改: 2024-12-31 20:16

github.com/golang-jwt/jwt/v4 CVE-2024-51744 低危 v4.4.2 4.5.1 golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-51744

镜像层: sha256:b882a4334b2d3d2c158a19e88d8954a3d35a94882988ad2ded0d8fb57928502e

发布日期: 2024-11-04 22:15 修改: 2024-11-05 16:04

usr/local/bin/etcdutl (gobinary)
低危漏洞:1 中危漏洞:0 高危漏洞:1 严重漏洞:1
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
golang.org/x/crypto CVE-2024-45337 严重 v0.21.0 0.31.0 golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45337

镜像层: sha256:4f9fc8437856077d54b309349fcb52c95b4378183998c13f7cf744ae9c2c07e0

发布日期: 2024-12-12 02:02 修改: 2024-12-12 21:15

golang.org/x/net CVE-2024-45338 高危 v0.23.0 0.33.0 golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45338

镜像层: sha256:4f9fc8437856077d54b309349fcb52c95b4378183998c13f7cf744ae9c2c07e0

发布日期: 2024-12-18 21:15 修改: 2024-12-31 20:16

github.com/golang-jwt/jwt/v4 CVE-2024-51744 低危 v4.4.2 4.5.1 golang-jwt: Bad documentation of error handling in ParseWithClaims can lead to potentially dangerous situations in golang-jwt

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-51744

镜像层: sha256:4f9fc8437856077d54b309349fcb52c95b4378183998c13f7cf744ae9c2c07e0

发布日期: 2024-11-04 22:15 修改: 2024-11-05 16:04