-
Notifications
You must be signed in to change notification settings - Fork 41
v2.16.0 Security vulnerability report images
System bot edited this page Nov 18, 2024
·
25 revisions
SUBSCRIPTIONID | RESOURCEGROUP | VULNID | IDENTIFICATIONDATE | CATEGORY | CVE | CVSS | SEVERITY | DISPLAYNAME | RESOURCEID | RESOURCEID_SINGLE | AKTIV | HOST | OSDETAILS |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
- | - | CVE-2024-32002 | 2024-05-14T19:15:10.81Z | docker image audit | CVE-2024-32002 | CRITICAL | git: Recursive clones RCE | e2e-test-v2.16.0 | e2e-test-v2.16.0 | Yes | package: git, status: fixed, fixedVersion: 1:2.39.5-0+deb12u1 | ||
- | - | CVE-2023-25652 | 2023-04-25T20:15:09.933Z | docker image audit | CVE-2023-25652 | HIGH | git: by feeding specially crafted input to , a path outside the working tree can be overwritten with partially controlled contents | e2e-test-v2.16.0 | e2e-test-v2.16.0 | Yes | package: git, status: fixed, fixedVersion: 1:2.39.5-0+deb12u1 | ||
- | - | CVE-2023-29007 | 2023-04-25T21:15:10.403Z | docker image audit | CVE-2023-29007 | HIGH | git: arbitrary configuration injection when renaming or deleting a section from a configuration file | e2e-test-v2.16.0 | e2e-test-v2.16.0 | Yes | package: git, status: fixed, fixedVersion: 1:2.39.5-0+deb12u1 | ||
- | - | CVE-2024-32004 | 2024-05-14T19:15:11.377Z | docker image audit | CVE-2024-32004 | HIGH | git: RCE while cloning local repos | e2e-test-v2.16.0 | e2e-test-v2.16.0 | Yes | package: git, status: fixed, fixedVersion: 1:2.39.5-0+deb12u1 | ||
- | - | CVE-2024-32465 | 2024-05-14T20:15:14.54Z | docker image audit | CVE-2024-32465 | HIGH | git: additional local RCE | e2e-test-v2.16.0 | e2e-test-v2.16.0 | Yes | package: git, status: fixed, fixedVersion: 1:2.39.5-0+deb12u1 | ||
- | - | CVE-2024-6655 | 2024-07-16T15:15:12.597Z | docker image audit | CVE-2024-6655 | HIGH | gtk3: gtk2: Library injection from CWD | e2e-test-v2.16.0 | e2e-test-v2.16.0 | Yes | package: gtk-update-icon-cache, status: fixed, fixedVersion: 3.24.38-2~deb12u2 | ||
- | - | CVE-2024-47175 | 2024-09-26T22:15:04.283Z | docker image audit | CVE-2024-47175 | HIGH | cups: libppd: remote command injection via attacker controlled data in PPD file | e2e-test-v2.16.0 | e2e-test-v2.16.0 | Yes | package: libcups2, status: fixed, fixedVersion: 2.4.2-3+deb12u8 | ||
- | - | CVE-2024-45491 | 2024-08-30T03:15:03.85Z | docker image audit | CVE-2024-45491 | CRITICAL | libexpat: Integer Overflow or Wraparound | e2e-test-v2.16.0 | e2e-test-v2.16.0 | Yes | package: libexpat1, status: fixed, fixedVersion: 2.5.0-1+deb12u1 | ||
- | - | CVE-2024-45492 | 2024-08-30T03:15:03.93Z | docker image audit | CVE-2024-45492 | CRITICAL | libexpat: integer overflow | e2e-test-v2.16.0 | e2e-test-v2.16.0 | Yes | package: libexpat1, status: fixed, fixedVersion: 2.5.0-1+deb12u1 | ||
- | - | CVE-2024-45490 | 2024-08-30T03:15:03.757Z | docker image audit | CVE-2024-45490 | HIGH | libexpat: Negative Length Parsing Vulnerability in libexpat | e2e-test-v2.16.0 | e2e-test-v2.16.0 | Yes | package: libexpat1, status: fixed, fixedVersion: 2.5.0-1+deb12u1 | ||
- | - | CVE-2024-0743 | 2024-01-23T14:15:38.28Z | docker image audit | CVE-2024-0743 | HIGH | Mozilla: Crash in NSS TLS method | e2e-test-v2.16.0 | e2e-test-v2.16.0 | Yes | package: libnss3, status: fixed, fixedVersion: 2:3.87.1-1+deb12u1 | ||
- | - | CVE-2024-6609 | 2024-07-09T15:15:12.923Z | docker image audit | CVE-2024-6609 | HIGH | When almost out-of-memory an elliptic curve key which was never alloca ... | e2e-test-v2.16.0 | e2e-test-v2.16.0 | Yes | package: libnss3, status: fixed, fixedVersion: 2:3.87.1-1+deb12u1 | ||
- | - | CVE-2023-7104 | 2023-12-29T10:15:13.89Z | docker image audit | CVE-2023-7104 | HIGH | sqlite: heap-buffer-overflow at sessionfuzz | e2e-test-v2.16.0 | e2e-test-v2.16.0 | Yes | package: libsqlite3-0, status: fixed, fixedVersion: 3.40.1-2+deb12u1 | ||
- | - | CVE-2024-9632 | 2024-10-30T08:15:04.83Z | docker image audit | CVE-2024-9632 | HIGH | xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability | e2e-test-v2.16.0 | e2e-test-v2.16.0 | Yes | package: xserver-common, status: fixed, fixedVersion: 2:21.1.7-3+deb12u8 |
Last scan date: 2024-11-18 6:35:6