-
Notifications
You must be signed in to change notification settings - Fork 41
v2.15.0 Security vulnerability report images
System bot edited this page Oct 7, 2024
·
8 revisions
SUBSCRIPTIONID | RESOURCEGROUP | VULNID | IDENTIFICATIONDATE | CATEGORY | CVE | CVSS | SEVERITY | DISPLAYNAME | RESOURCEID | RESOURCEID_SINGLE | AKTIV | HOST | OSDETAILS |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
- | - | CVE-2024-32002 | 2024-05-14T19:15:10.81Z | docker image audit | CVE-2024-32002 | CRITICAL | git: Recursive clones RCE | e2e-test-v2.15.0 | e2e-test-v2.15.0 | Yes | package: git, status: fixed, fixedVersion: 1:2.39.5-0+deb12u1 | ||
- | - | CVE-2023-25652 | 2023-04-25T20:15:09.933Z | docker image audit | CVE-2023-25652 | HIGH | git: by feeding specially crafted input to , a path outside the working tree can be overwritten with partially controlled contents | e2e-test-v2.15.0 | e2e-test-v2.15.0 | Yes | package: git, status: fixed, fixedVersion: 1:2.39.5-0+deb12u1 | ||
- | - | CVE-2023-29007 | 2023-04-25T21:15:10.403Z | docker image audit | CVE-2023-29007 | HIGH | git: arbitrary configuration injection when renaming or deleting a section from a configuration file | e2e-test-v2.15.0 | e2e-test-v2.15.0 | Yes | package: git, status: fixed, fixedVersion: 1:2.39.5-0+deb12u1 | ||
- | - | CVE-2024-32004 | 2024-05-14T19:15:11.377Z | docker image audit | CVE-2024-32004 | HIGH | git: RCE while cloning local repos | e2e-test-v2.15.0 | e2e-test-v2.15.0 | Yes | package: git, status: fixed, fixedVersion: 1:2.39.5-0+deb12u1 | ||
- | - | CVE-2024-32465 | 2024-05-14T20:15:14.54Z | docker image audit | CVE-2024-32465 | HIGH | git: additional local RCE | e2e-test-v2.15.0 | e2e-test-v2.15.0 | Yes | package: git, status: fixed, fixedVersion: 1:2.39.5-0+deb12u1 | ||
- | - | CVE-2024-6655 | 2024-07-16T15:15:12.597Z | docker image audit | CVE-2024-6655 | HIGH | gtk3: gtk2: Library injection from CWD | e2e-test-v2.15.0 | e2e-test-v2.15.0 | Yes | package: gtk-update-icon-cache, status: fixed, fixedVersion: 3.24.38-2~deb12u2 | ||
- | - | CVE-2024-47175 | 2024-09-26T22:15:04.283Z | docker image audit | CVE-2024-47175 | HIGH | cups: libppd: remote command injection via attacker controlled data in PPD file | e2e-test-v2.15.0 | e2e-test-v2.15.0 | Yes | package: libcups2, status: fixed, fixedVersion: 2.4.2-3+deb12u8 | ||
- | - | CVE-2024-45490 | 2024-08-30T03:15:03.757Z | docker image audit | CVE-2024-45490 | CRITICAL | libexpat: Negative Length Parsing Vulnerability in libexpat | e2e-test-v2.15.0 | e2e-test-v2.15.0 | Yes | package: libexpat1, status: fixed, fixedVersion: 2.5.0-1+deb12u1 | ||
- | - | CVE-2024-45491 | 2024-08-30T03:15:03.85Z | docker image audit | CVE-2024-45491 | CRITICAL | libexpat: Integer Overflow or Wraparound | e2e-test-v2.15.0 | e2e-test-v2.15.0 | Yes | package: libexpat1, status: fixed, fixedVersion: 2.5.0-1+deb12u1 | ||
- | - | CVE-2024-45492 | 2024-08-30T03:15:03.93Z | docker image audit | CVE-2024-45492 | CRITICAL | libexpat: integer overflow | e2e-test-v2.15.0 | e2e-test-v2.15.0 | Yes | package: libexpat1, status: fixed, fixedVersion: 2.5.0-1+deb12u1 |
Last scan date: 2024-10-7 6:33:36