gitimages.expertflow.com/cim/telegram-connector:4.4 (alpine 3.19.0) =================================================================== Total: 8 (UNKNOWN: 0, LOW: 2, MEDIUM: 6, HIGH: 0, CRITICAL: 0) +------------+------------------+----------+-------------------+---------------+--------------------------------------+ | LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE | +------------+------------------+----------+-------------------+---------------+--------------------------------------+ | libcrypto3 | CVE-2023-6129 | MEDIUM | 3.1.4-r2 | 3.1.4-r3 | openssl: POLY1305 MAC implementation | | | | | | | corrupts vector registers on PowerPC | | | | | | | -->avd.aquasec.com/nvd/cve-2023-6129 | + +------------------+ + +---------------+--------------------------------------+ | | CVE-2023-6237 | | | 3.1.4-r4 | openssl: Excessive time spent | | | | | | | checking invalid RSA public keys | | | | | | | -->avd.aquasec.com/nvd/cve-2023-6237 | + +------------------+ + +---------------+--------------------------------------+ | | CVE-2024-0727 | | | 3.1.4-r5 | openssl: denial of service | | | | | | | via null dereference | | | | | | | -->avd.aquasec.com/nvd/cve-2024-0727 | + +------------------+----------+ +---------------+--------------------------------------+ | | CVE-2024-2511 | LOW | | 3.1.4-r6 | openssl: Unbounded memory growth | | | | | | | with session handling in TLSv1.3 | | | | | | | -->avd.aquasec.com/nvd/cve-2024-2511 | +------------+------------------+----------+ +---------------+--------------------------------------+ | libssl3 | CVE-2023-6129 | MEDIUM | | 3.1.4-r3 | openssl: POLY1305 MAC implementation | | | | | | | corrupts vector registers on PowerPC | | | | | | | -->avd.aquasec.com/nvd/cve-2023-6129 | + +------------------+ + +---------------+--------------------------------------+ | | CVE-2023-6237 | | | 3.1.4-r4 | openssl: Excessive time spent | | | | | | | checking invalid RSA public keys | | | | | | | -->avd.aquasec.com/nvd/cve-2023-6237 | + +------------------+ + +---------------+--------------------------------------+ | | CVE-2024-0727 | | | 3.1.4-r5 | openssl: denial of service | | | | | | | via null dereference | | | | | | | -->avd.aquasec.com/nvd/cve-2024-0727 | + +------------------+----------+ +---------------+--------------------------------------+ | | CVE-2024-2511 | LOW | | 3.1.4-r6 | openssl: Unbounded memory growth | | | | | | | with session handling in TLSv1.3 | | | | | | | -->avd.aquasec.com/nvd/cve-2024-2511 | +------------+------------------+----------+-------------------+---------------+--------------------------------------+ Java (jar) ========== Total: 57 (UNKNOWN: 0, LOW: 1, MEDIUM: 26, HIGH: 24, CRITICAL: 6) +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | ch.qos.logback:logback-classic | CVE-2023-6378 | HIGH | 1.2.3 | 1.3.12, 1.4.12, 1.2.13 | logback: serialization | | | | | | | vulnerability in logback receiver | | | | | | | -->avd.aquasec.com/nvd/cve-2023-6378 | +-------------------------------------------------------------+ + + + + + | ch.qos.logback:logback-core | | | | | | | | | | | | | | | | | | | | + +------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | | CVE-2021-42550 | MEDIUM | | 1.2.9 | logback: remote code execution | | | | | | | through JNDI call from within | | | | | | | its configuration file... | | | | | | | -->avd.aquasec.com/nvd/cve-2021-42550 | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | com.fasterxml.jackson.core:jackson-databind | CVE-2020-36518 | HIGH | 2.11.2 | 2.13.2.1, 2.12.6.1 | jackson-databind: denial of service | | | | | | | via a large depth of nested objects | | | | | | | -->avd.aquasec.com/nvd/cve-2020-36518 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2021-46877 | | | 2.12.6, 2.13.1 | jackson-databind: Possible | | | | | | | DoS if using JDK serialization | | | | | | | to serialize JsonNode | | | | | | | -->avd.aquasec.com/nvd/cve-2021-46877 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2022-42003 | | | 2.12.7.1, 2.13.4.2 | jackson-databind: deep | | | | | | | wrapper array nesting wrt | | | | | | | UNWRAP_SINGLE_VALUE_ARRAYS | | | | | | | -->avd.aquasec.com/nvd/cve-2022-42003 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2022-42004 | | | 2.12.7.1, 2.13.4 | jackson-databind: use | | | | | | | of deeply nested arrays | | | | | | | -->avd.aquasec.com/nvd/cve-2022-42004 | +-------------------------------------------------------------+------------------+ +-------------------+--------------------------------+----------------------------------------------------------------+ | com.google.code.gson:gson | CVE-2022-25647 | | 2.8.6 | 2.8.9 | com.google.code.gson-gson: | | | | | | | Deserialization of Untrusted | | | | | | | Data in com.google.code.gson-gson | | | | | | | -->avd.aquasec.com/nvd/cve-2022-25647 | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | com.google.guava:guava | CVE-2018-10237 | MEDIUM | 20.0 | 24.1.1-android | guava: Unbounded memory | | | | | | | allocation in AtomicDoubleArray | | | | | | | and CompoundOrdering classes | | | | | | | allow remote attackers... | | | | | | | -->avd.aquasec.com/nvd/cve-2018-10237 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2023-2976 | | | 32.0.0-android | guava: insecure temporary | | | | | | | directory creation | | | | | | | -->avd.aquasec.com/nvd/cve-2023-2976 | + +------------------+----------+ + +----------------------------------------------------------------+ | | CVE-2020-8908 | LOW | | | guava: local information | | | | | | | disclosure via temporary directory | | | | | | | created with unsafe permissions | | | | | | | -->avd.aquasec.com/nvd/cve-2020-8908 | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | com.squareup.okio:okio | CVE-2023-3635 | MEDIUM | 2.8.0 | 3.4.0, 1.17.6 | okio: GzipSource class | | | | | | | improper exception handling | | | | | | | -->avd.aquasec.com/nvd/cve-2023-3635 | +-------------------------------------------------------------+------------------+ +-------------------+--------------------------------+----------------------------------------------------------------+ | org.apache.httpcomponents:httpclient | CVE-2020-13956 | | 4.5.12 | 4.5.13, 5.0.3 | apache-httpclient: incorrect | | | | | | | handling of malformed authority | | | | | | | component in request URIs | | | | | | | -->avd.aquasec.com/nvd/cve-2020-13956 | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | org.apache.tomcat.embed:tomcat-embed-core | CVE-2021-25122 | HIGH | 9.0.38 | 10.0.2, 9.0.43, 8.5.63 | tomcat: Request mix-up with h2c | | | | | | | -->avd.aquasec.com/nvd/cve-2021-25122 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2021-25329 | | | 10.0.2, 9.0.41, 8.5.61, | tomcat: Incomplete fix | | | | | | 7.0.108 | for CVE-2020-9484 (RCE | | | | | | | via session persistence) | | | | | | | -->avd.aquasec.com/nvd/cve-2021-25329 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2022-42252 | | | 8.5.83, 9.0.68, 10.0.27, | tomcat: request smuggling | | | | | | 10.1.1 | -->avd.aquasec.com/nvd/cve-2022-42252 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2023-24998 | | | 10.1.5, 11.0.0-M5, 8.5.88, | Apache Commons FileUpload: | | | | | | 9.0.71 | FileUpload DoS with excessive parts | | | | | | | -->avd.aquasec.com/nvd/cve-2023-24998 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2023-46589 | | | 11.0.0-M11, 10.1.16, 9.0.83, | tomcat: HTTP request smuggling | | | | | | 8.5.96 | via malformed trailer headers | | | | | | | -->avd.aquasec.com/nvd/cve-2023-46589 | + +------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | | CVE-2021-24122 | MEDIUM | | 10.0.0-M10, 9.0.40, 8.5.60, | tomcat: Information disclosure | | | | | | 7.0.107 | when using NTFS file system | | | | | | | -->avd.aquasec.com/nvd/cve-2021-24122 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2023-41080 | | | 8.5.93, 9.0.80, 10.1.13, | tomcat: Open Redirect vulnerability | | | | | | 11.0.0-M11 | in FORM authentication | | | | | | | -->avd.aquasec.com/nvd/cve-2023-41080 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2023-42795 | | | 11.0.0-M12, 10.1.14, 9.0.81, | tomcat: improper cleaning | | | | | | 8.5.94 | of recycled objects could | | | | | | | lead to information leak | | | | | | | -->avd.aquasec.com/nvd/cve-2023-42795 | + +------------------+ + + +----------------------------------------------------------------+ | | CVE-2023-44487 | | | | HTTP/2: Multiple HTTP/2 | | | | | | | enabled web servers are | | | | | | | vulnerable to a DDoS attack... | | | | | | | -->avd.aquasec.com/nvd/cve-2023-44487 | + +------------------+ + + +----------------------------------------------------------------+ | | CVE-2023-45648 | | | | tomcat: incorrectly parsed | | | | | | | http trailer headers can | | | | | | | cause request smuggling | | | | | | | -->avd.aquasec.com/nvd/cve-2023-45648 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2024-24549 | | | 8.5.99, 9.0.86, 10.1.19, | : Apache Tomcat: HTTP/2 | | | | | | 11.0.0-M17 | header handling DoS | | | | | | | -->avd.aquasec.com/nvd/cve-2024-24549 | +-------------------------------------------------------------+------------------+ + +--------------------------------+----------------------------------------------------------------+ | org.apache.tomcat.embed:tomcat-embed-websocket | CVE-2024-23672 | | | 11.0.0-M17, 10.1.19, 9.0.86, | Apache Tomcat: WebSocket DoS | | | | | | 8.5.99 | with incomplete closing handshake | | | | | | | -->avd.aquasec.com/nvd/cve-2024-23672 | +-------------------------------------------------------------+------------------+ +-------------------+--------------------------------+----------------------------------------------------------------+ | org.glassfish.jersey.core:jersey-common | CVE-2021-28168 | | 2.30.1 | 2.34, 3.0.2 | jersey: Local information disclosure | | | | | | | via system temporary directory | | | | | | | -->avd.aquasec.com/nvd/cve-2021-28168 | +-------------------------------------------------------------+------------------+ +-------------------+--------------------------------+----------------------------------------------------------------+ | org.hibernate.validator:hibernate-validator | CVE-2020-10693 | | 6.0.18.Final | 6.1.5.Final, 6.0.20.Final | hibernate-validator: Improper input | | | | | | | validation in the interpolation | | | | | | | of constraint error messages | | | | | | | -->avd.aquasec.com/nvd/cve-2020-10693 | +-------------------------------------------------------------+------------------+ +-------------------+--------------------------------+----------------------------------------------------------------+ | org.jetbrains.kotlin:kotlin-stdlib | CVE-2020-29582 | | 1.3.72 | 1.4.21 | kotlin: vulnerable Java | | | | | | | API was used for temporary | | | | | | | file and folder creation... | | | | | | | -->avd.aquasec.com/nvd/cve-2020-29582 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2022-24329 | | | 1.6.0 | kotlin: Not possible to | | | | | | | lock dependencies for | | | | | | | Multiplatform Gradle Projects | | | | | | | -->avd.aquasec.com/nvd/cve-2022-24329 | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | org.json:json | CVE-2022-45688 | HIGH | 20200518 | 20230227 | json stack overflow vulnerability | | | | | | | -->avd.aquasec.com/nvd/cve-2022-45688 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2023-5072 | | | 20231013 | JSON-java: parser | | | | | | | confusion leads to OOM | | | | | | | -->avd.aquasec.com/nvd/cve-2023-5072 | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | org.springframework.boot:spring-boot | CVE-2023-34055 | MEDIUM | 2.3.4.RELEASE | 2.7.18, 3.0.13, 3.1.6 | spring-boot: | | | | | | | org.springframework.boot:spring-boot-actuator | | | | | | | class vulnerable to denial of service | | | | | | | -->avd.aquasec.com/nvd/cve-2023-34055 | +-------------------------------------------------------------+------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | org.springframework.boot:spring-boot-actuator-autoconfigure | CVE-2023-20873 | CRITICAL | | 3.0.6, 2.7.11 | spring-boot: Security | | | | | | | Bypass With Wildcard Pattern | | | | | | | Matching on Cloud Foundry | | | | | | | -->avd.aquasec.com/nvd/cve-2023-20873 | +-------------------------------------------------------------+------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | org.springframework.boot:spring-boot-autoconfigure | CVE-2023-20883 | HIGH | | 3.0.7, 2.7.12, 2.6.15, 2.5.15 | spring-boot: Spring Boot | | | | | | | Welcome Page DoS Vulnerability | | | | | | | -->avd.aquasec.com/nvd/cve-2023-20883 | +-------------------------------------------------------------+------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | org.springframework.boot:spring-boot-starter-web | CVE-2022-22965 | CRITICAL | | 2.5.12, 2.6.6 | spring-framework: RCE via | | | | | | | Data Binding on JDK 9+ | | | | | | | -->avd.aquasec.com/nvd/cve-2022-22965 | +-------------------------------------------------------------+------------------+ +-------------------+--------------------------------+----------------------------------------------------------------+ | org.springframework.data:spring-data-mongodb | CVE-2022-22980 | | 3.0.4.RELEASE | 3.4.1, 3.3.5 | Spring Data MongoDB: SpEL in | | | | | | | query methods allow code injection | | | | | | | -->avd.aquasec.com/nvd/cve-2022-22980 | +-------------------------------------------------------------+------------------+ +-------------------+--------------------------------+----------------------------------------------------------------+ | org.springframework:spring-beans | CVE-2022-22965 | | 5.2.9.RELEASE | 5.2.20.RELEASE, 5.3.18 | spring-framework: RCE via | | | | | | | Data Binding on JDK 9+ | | | | | | | -->avd.aquasec.com/nvd/cve-2022-22965 | + +------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | | CVE-2022-22970 | HIGH | | 5.2.22.RELEASE, 5.3.20 | springframework: DoS via data binding | | | | | | | to multipartFile or servlet part | | | | | | | -->avd.aquasec.com/nvd/cve-2022-22970 | +-------------------------------------------------------------+------------------+ + +--------------------------------+----------------------------------------------------------------+ | org.springframework:spring-context | CVE-2022-22968 | | | 5.3.19, 5.2.21 | Spring Framework: Data | | | | | | | Binding Rules Vulnerability | | | | | | | -->avd.aquasec.com/nvd/cve-2022-22968 | +-------------------------------------------------------------+------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | org.springframework:spring-core | CVE-2021-22060 | MEDIUM | | 5.3.14, 5.2.19 | springframework: Additional Log | | | | | | | Injection in Spring Framework | | | | | | | (follow-up to CVE-2021-22096) | | | | | | | -->avd.aquasec.com/nvd/cve-2021-22060 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2021-22096 | | | 5.3.11, 5.2.18 | springframework: malicious | | | | | | | input leads to insertion | | | | | | | of additional log entries | | | | | | | -->avd.aquasec.com/nvd/cve-2021-22096 | +-------------------------------------------------------------+------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | org.springframework:spring-expression | CVE-2023-20863 | HIGH | | 6.0.8, 5.3.27, 5.2.24.RELEASE | springframework: Spring | | | | | | | Expression DoS Vulnerability | | | | | | | -->avd.aquasec.com/nvd/cve-2023-20863 | + +------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | | CVE-2022-22950 | MEDIUM | | 5.3.17, 5.2.20.RELEASE | spring-expression: Denial of service | | | | | | | via specially crafted SpEL expression | | | | | | | -->avd.aquasec.com/nvd/cve-2022-22950 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2023-20861 | | | 6.0.7, 5.3.26, 5.2.23.RELEASE | springframework: Spring | | | | | | | Expression DoS Vulnerability | | | | | | | -->avd.aquasec.com/nvd/cve-2023-20861 | +-------------------------------------------------------------+------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | org.springframework:spring-web | CVE-2016-1000027 | CRITICAL | | 6.0.0 | spring: HttpInvokerServiceExporter | | | | | | | readRemoteInvocation method | | | | | | | untrusted java deserialization | | | | | | | -->avd.aquasec.com/nvd/cve-2016-1000027 | + +------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | | CVE-2021-22118 | HIGH | | 5.2.15, 5.3.7 | spring-web: (re)creating the | | | | | | | temporary storage directory | | | | | | | could result in a privilege... | | | | | | | -->avd.aquasec.com/nvd/cve-2021-22118 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2024-22243 | | | 6.1.4, 6.0.17, 5.3.32 | springframework: URL | | | | | | | Parsing with Host Validation | | | | | | | -->avd.aquasec.com/nvd/cve-2024-22243 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2024-22259 | | | 6.1.5, 6.0.18, 5.3.33 | springframework: URL | | | | | | | Parsing with Host Validation | | | | | | | -->avd.aquasec.com/nvd/cve-2024-22259 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2024-22262 | | | 5.3.34, 6.0.19, 6.1.6 | springframework: URL | | | | | | | Parsing with Host Validation | | | | | | | -->avd.aquasec.com/nvd/cve-2024-22262 | +-------------------------------------------------------------+------------------+----------+ +--------------------------------+----------------------------------------------------------------+ | org.springframework:spring-webmvc | CVE-2022-22965 | CRITICAL | | 5.2.20.RELEASE, 5.3.18 | spring-framework: RCE via | | | | | | | Data Binding on JDK 9+ | | | | | | | -->avd.aquasec.com/nvd/cve-2022-22965 | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+ | org.yaml:snakeyaml | CVE-2022-1471 | HIGH | 1.26 | 2.0 | SnakeYaml: Constructor | | | | | | | Deserialization | | | | | | | Remote Code Execution | | | | | | | -->avd.aquasec.com/nvd/cve-2022-1471 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2022-25857 | | | 1.31 | snakeyaml: Denial of Service | | | | | | | due to missing nested depth | | | | | | | limitation for collections... | | | | | | | -->avd.aquasec.com/nvd/cve-2022-25857 | + +------------------+----------+ + +----------------------------------------------------------------+ | | CVE-2022-38749 | MEDIUM | | | snakeyaml: Uncaught exception in | | | | | | | org.yaml.snakeyaml.composer.Composer.composeSequenceNode | | | | | | | -->avd.aquasec.com/nvd/cve-2022-38749 | + +------------------+ + + +----------------------------------------------------------------+ | | CVE-2022-38750 | | | | snakeyaml: Uncaught exception in | | | | | | | org.yaml.snakeyaml.constructor.BaseConstructor.constructObject | | | | | | | -->avd.aquasec.com/nvd/cve-2022-38750 | + +------------------+ + + +----------------------------------------------------------------+ | | CVE-2022-38751 | | | | snakeyaml: Uncaught exception in | | | | | | | java.base/java.util.regex.Pattern$Ques.match | | | | | | | -->avd.aquasec.com/nvd/cve-2022-38751 | + +------------------+ + +--------------------------------+----------------------------------------------------------------+ | | CVE-2022-38752 | | | 1.32 | snakeyaml: Uncaught exception in | | | | | | | java.base/java.util.ArrayList.hashCode | | | | | | | -->avd.aquasec.com/nvd/cve-2022-38752 | + +------------------+ + + +----------------------------------------------------------------+ | | CVE-2022-41854 | | | | dev-java/snakeyaml: | | | | | | | DoS via stack overflow | | | | | | | -->avd.aquasec.com/nvd/cve-2022-41854 | +-------------------------------------------------------------+------------------+----------+-------------------+--------------------------------+----------------------------------------------------------------+