gitimages.expertflow.com/cim/customer-channel-manager:4.4 (alpine 3.19.0) ========================================================================= Total: 8 (UNKNOWN: 0, LOW: 2, MEDIUM: 6, HIGH: 0, CRITICAL: 0) +------------+------------------+----------+-------------------+---------------+--------------------------------------+ | LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE | +------------+------------------+----------+-------------------+---------------+--------------------------------------+ | libcrypto3 | CVE-2023-6129 | MEDIUM | 3.1.4-r2 | 3.1.4-r3 | openssl: POLY1305 MAC implementation | | | | | | | corrupts vector registers on PowerPC | | | | | | | -->avd.aquasec.com/nvd/cve-2023-6129 | + +------------------+ + +---------------+--------------------------------------+ | | CVE-2023-6237 | | | 3.1.4-r4 | openssl: Excessive time spent | | | | | | | checking invalid RSA public keys | | | | | | | -->avd.aquasec.com/nvd/cve-2023-6237 | + +------------------+ + +---------------+--------------------------------------+ | | CVE-2024-0727 | | | 3.1.4-r5 | openssl: denial of service | | | | | | | via null dereference | | | | | | | -->avd.aquasec.com/nvd/cve-2024-0727 | + +------------------+----------+ +---------------+--------------------------------------+ | | CVE-2024-2511 | LOW | | 3.1.4-r6 | openssl: Unbounded memory growth | | | | | | | with session handling in TLSv1.3 | | | | | | | -->avd.aquasec.com/nvd/cve-2024-2511 | +------------+------------------+----------+ +---------------+--------------------------------------+ | libssl3 | CVE-2023-6129 | MEDIUM | | 3.1.4-r3 | openssl: POLY1305 MAC implementation | | | | | | | corrupts vector registers on PowerPC | | | | | | | -->avd.aquasec.com/nvd/cve-2023-6129 | + +------------------+ + +---------------+--------------------------------------+ | | CVE-2023-6237 | | | 3.1.4-r4 | openssl: Excessive time spent | | | | | | | checking invalid RSA public keys | | | | | | | -->avd.aquasec.com/nvd/cve-2023-6237 | + +------------------+ + +---------------+--------------------------------------+ | | CVE-2024-0727 | | | 3.1.4-r5 | openssl: denial of service | | | | | | | via null dereference | | | | | | | -->avd.aquasec.com/nvd/cve-2024-0727 | + +------------------+----------+ +---------------+--------------------------------------+ | | CVE-2024-2511 | LOW | | 3.1.4-r6 | openssl: Unbounded memory growth | | | | | | | with session handling in TLSv1.3 | | | | | | | -->avd.aquasec.com/nvd/cve-2024-2511 | +------------+------------------+----------+-------------------+---------------+--------------------------------------+ Java (jar) ========== Total: 39 (UNKNOWN: 0, LOW: 1, MEDIUM: 17, HIGH: 17, CRITICAL: 4) +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | ch.qos.logback:logback-classic | CVE-2023-6378 | HIGH | 1.2.11 | 1.3.12, 1.4.12, 1.2.13 | logback: serialization | | | | | | | vulnerability in logback receiver | | | | | | | -->avd.aquasec.com/nvd/cve-2023-6378 | +-------------------------------------------------------------+ + + + + + | ch.qos.logback:logback-core | | | | | | | | | | | | | | | | | | | | +-------------------------------------------------------------+------------------+ +-------------------+--------------------------------+----------------------------------------------------------------+ | com.fasterxml.jackson.core:jackson-databind | CVE-2022-42003 | | 2.13.3 | 2.12.7.1, 2.13.4.2 | jackson-databind: deep | | | | | | | wrapper array nesting wrt | | | | | | | UNWRAP_SINGLE_VALUE_ARRAYS | | | | | | | -->avd.aquasec.com/nvd/cve-2022-42003 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2022-42004 | | | 2.12.7.1, 2.13.4 | jackson-databind: use | | | | | | | of deeply nested arrays | | | | | | | -->avd.aquasec.com/nvd/cve-2022-42004 | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | com.google.guava:guava | CVE-2018-10237 | MEDIUM | 20.0 | 24.1.1-android | guava: Unbounded memory | | | | | | | allocation in AtomicDoubleArray | | | | | | | and CompoundOrdering classes | | | | | | | allow remote attackers... | | | | | | | -->avd.aquasec.com/nvd/cve-2018-10237 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2023-2976 | | | 32.0.0-android | guava: insecure temporary | | | | | | | directory creation | | | | | | | -->avd.aquasec.com/nvd/cve-2023-2976 | + +------------------+----------+ + +----------------------------------------------------------------+ | | CVE-2020-8908 | LOW | | | guava: local information | | | | | | | disclosure via temporary directory | | | | | | | created with unsafe permissions | | | | | | | -->avd.aquasec.com/nvd/cve-2020-8908 | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | com.squareup.okio:okio | CVE-2023-3635 | MEDIUM | 2.8.0 | 3.4.0, 1.17.6 | okio: GzipSource class | | | | | | | improper exception handling | | | | | | | -->avd.aquasec.com/nvd/cve-2023-3635 | +-------------------------------------------------------------+------------------+ +-------------------+--------------------------------+----------------------------------------------------------------+ | io.netty:netty-handler | CVE-2023-34462 | | 4.1.79.Final | 4.1.94.Final | netty: SniHandler 16MB | | | | | | | allocation leads to OOM | | | | | | | -->avd.aquasec.com/nvd/cve-2023-34462 | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | org.apache.activemq:activemq-client | CVE-2023-46604 | CRITICAL | 5.16.5 | 5.15.16, 5.16.7, 5.17.6, | activemq-openwire: OpenWire Module: | | | | | | 5.18.3 | Unbounded deserialization causes | | | | | | | ActiveMQ to be vulnerable to a... | | | | | | | -->avd.aquasec.com/nvd/cve-2023-46604 | +-------------------------------------------------------------+ + + + + + | org.apache.activemq:activemq-openwire-legacy | | | | | | | | | | | | | | | | | | | | | | | | | | | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | org.apache.tomcat.embed:tomcat-embed-core | CVE-2022-42252 | HIGH | 9.0.65 | 8.5.83, 9.0.68, 10.0.27, | tomcat: request smuggling | | | | | | 10.1.1 | -->avd.aquasec.com/nvd/cve-2022-42252 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2022-45143 | | | 8.5.84, 9.0.69, 10.1.2 | tomcat: JsonErrorReportValve | | | | | | | injection | | | | | | | -->avd.aquasec.com/nvd/cve-2022-45143 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2023-24998 | | | 10.1.5, 11.0.0-M5, 8.5.88, | Apache Commons FileUpload: | | | | | | 9.0.71 | FileUpload DoS with excessive parts | | | | | | | -->avd.aquasec.com/nvd/cve-2023-24998 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2023-46589 | | | 11.0.0-M11, 10.1.16, 9.0.83, | tomcat: HTTP request smuggling | | | | | | 8.5.96 | via malformed trailer headers | | | | | | | -->avd.aquasec.com/nvd/cve-2023-46589 | + +------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | | CVE-2023-41080 | MEDIUM | | 8.5.93, 9.0.80, 10.1.13, | tomcat: Open Redirect vulnerability | | | | | | 11.0.0-M11 | in FORM authentication | | | | | | | -->avd.aquasec.com/nvd/cve-2023-41080 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2023-42795 | | | 11.0.0-M12, 10.1.14, 9.0.81, | tomcat: improper cleaning | | | | | | 8.5.94 | of recycled objects could | | | | | | | lead to information leak | | | | | | | -->avd.aquasec.com/nvd/cve-2023-42795 | + +------------------+ + + +----------------------------------------------------------------+ | | CVE-2023-44487 | | | | HTTP/2: Multiple HTTP/2 | | | | | | | enabled web servers are | | | | | | | vulnerable to a DDoS attack... | | | | | | | -->avd.aquasec.com/nvd/cve-2023-44487 | + +------------------+ + + +----------------------------------------------------------------+ | | CVE-2023-45648 | | | | tomcat: incorrectly parsed | | | | | | | http trailer headers can | | | | | | | cause request smuggling | | | | | | | -->avd.aquasec.com/nvd/cve-2023-45648 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2024-24549 | | | 8.5.99, 9.0.86, 10.1.19, | : Apache Tomcat: HTTP/2 | | | | | | 11.0.0-M17 | header handling DoS | | | | | | | -->avd.aquasec.com/nvd/cve-2024-24549 | +-------------------------------------------------------------+------------------+ + +--------------------------------+----------------------------------------------------------------+ | org.apache.tomcat.embed:tomcat-embed-websocket | CVE-2024-23672 | | | 11.0.0-M17, 10.1.19, 9.0.86, | Apache Tomcat: WebSocket DoS | | | | | | 8.5.99 | with incomplete closing handshake | | | | | | | -->avd.aquasec.com/nvd/cve-2024-23672 | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | org.json:json | CVE-2022-45688 | HIGH | 20220320 | 20230227 | json stack overflow vulnerability | | | | | | | -->avd.aquasec.com/nvd/cve-2022-45688 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2023-5072 | | | 20231013 | JSON-java: parser | | | | | | | confusion leads to OOM | | | | | | | -->avd.aquasec.com/nvd/cve-2023-5072 | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | org.springframework.boot:spring-boot | CVE-2023-34055 | MEDIUM | 2.7.3 | 2.7.18, 3.0.13, 3.1.6 | spring-boot: | | | | | | | org.springframework.boot:spring-boot-actuator | | | | | | | class vulnerable to denial of service | | | | | | | -->avd.aquasec.com/nvd/cve-2023-34055 | +-------------------------------------------------------------+------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | org.springframework.boot:spring-boot-actuator-autoconfigure | CVE-2023-20873 | CRITICAL | | 3.0.6, 2.7.11 | spring-boot: Security | | | | | | | Bypass With Wildcard Pattern | | | | | | | Matching on Cloud Foundry | | | | | | | -->avd.aquasec.com/nvd/cve-2023-20873 | +-------------------------------------------------------------+------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | org.springframework.boot:spring-boot-autoconfigure | CVE-2023-20883 | HIGH | | 3.0.7, 2.7.12, 2.6.15, 2.5.15 | spring-boot: Spring Boot | | | | | | | Welcome Page DoS Vulnerability | | | | | | | -->avd.aquasec.com/nvd/cve-2023-20883 | +-------------------------------------------------------------+------------------+ +-------------------+--------------------------------+----------------------------------------------------------------+ | org.springframework:spring-expression | CVE-2023-20863 | | 5.3.22 | 6.0.8, 5.3.27, 5.2.24.RELEASE | springframework: Spring | | | | | | | Expression DoS Vulnerability | | | | | | | -->avd.aquasec.com/nvd/cve-2023-20863 | + +------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | | CVE-2023-20861 | MEDIUM | | 6.0.7, 5.3.26, 5.2.23.RELEASE | springframework: Spring | | | | | | | Expression DoS Vulnerability | | | | | | | -->avd.aquasec.com/nvd/cve-2023-20861 | +-------------------------------------------------------------+------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | org.springframework:spring-web | CVE-2016-1000027 | CRITICAL | | 6.0.0 | spring: HttpInvokerServiceExporter | | | | | | | readRemoteInvocation method | | | | | | | untrusted java deserialization | | | | | | | -->avd.aquasec.com/nvd/cve-2016-1000027 | + +------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | | CVE-2024-22243 | HIGH | | 6.1.4, 6.0.17, 5.3.32 | springframework: URL | | | | | | | Parsing with Host Validation | | | | | | | -->avd.aquasec.com/nvd/cve-2024-22243 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2024-22259 | | | 6.1.5, 6.0.18, 5.3.33 | springframework: URL | | | | | | | Parsing with Host Validation | | | | | | | -->avd.aquasec.com/nvd/cve-2024-22259 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2024-22262 | | | 5.3.34, 6.0.19, 6.1.6 | springframework: URL | | | | | | | Parsing with Host Validation | | | | | | | -->avd.aquasec.com/nvd/cve-2024-22262 | +-------------------------------------------------------------+------------------+ +-------------------+--------------------------------+----------------------------------------------------------------+ | org.yaml:snakeyaml | CVE-2022-1471 | | 1.30 | 2.0 | SnakeYaml: Constructor | | | | | | | Deserialization | | | | | | | Remote Code Execution | | | | | | | -->avd.aquasec.com/nvd/cve-2022-1471 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2022-25857 | | | 1.31 | snakeyaml: Denial of Service | | | | | | | due to missing nested depth | | | | | | | limitation for collections... | | | | | | | -->avd.aquasec.com/nvd/cve-2022-25857 | + +------------------+----------+ + +----------------------------------------------------------------+ | | CVE-2022-38749 | MEDIUM | | | snakeyaml: Uncaught exception in | | | | | | | org.yaml.snakeyaml.composer.Composer.composeSequenceNode | | | | | | | -->avd.aquasec.com/nvd/cve-2022-38749 | + +------------------+ + + +----------------------------------------------------------------+ | | CVE-2022-38750 | | | | snakeyaml: Uncaught exception in | | | | | | | org.yaml.snakeyaml.constructor.BaseConstructor.constructObject | | | | | | | -->avd.aquasec.com/nvd/cve-2022-38750 | + +------------------+ + + +----------------------------------------------------------------+ | | CVE-2022-38751 | | | | snakeyaml: Uncaught exception in | | | | | | | java.base/java.util.regex.Pattern$Ques.match | | | | | | | -->avd.aquasec.com/nvd/cve-2022-38751 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2022-38752 | | | 1.32 | snakeyaml: Uncaught exception in | | | | | | | java.base/java.util.ArrayList.hashCode | | | | | | | -->avd.aquasec.com/nvd/cve-2022-38752 | + +------------------+ + + +----------------------------------------------------------------+ | | CVE-2022-41854 | | | | dev-java/snakeyaml: | | | | | | | DoS via stack overflow | | | | | | | -->avd.aquasec.com/nvd/cve-2022-41854 | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+