Логотип exploitDog
bind:CVE-2024-35192
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-35192

Количество 5

Количество 5

nvd логотип

CVE-2024-35192

больше 1 года назад

Trivy is a security scanner. Prior to 0.51.2, if a malicious actor is able to trigger Trivy to scan container images from a crafted malicious registry, it could result in the leakage of credentials for legitimate registries such as AWS Elastic Container Registry (ECR), Google Cloud Artifact/Container Registry, or Azure Container Registry (ACR). These tokens can then be used to push/pull images from those registries to which the identity/user running Trivy has access. Systems are not affected if the default credential provider chain is unable to obtain valid credentials. This vulnerability only applies when scanning container images directly from a registry. This vulnerability is fixed in 0.51.2.

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2024-35192

больше 1 года назад

Trivy is a security scanner. Prior to 0.51.2, if a malicious actor is ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-xcq4-m2r3-cmrj

больше 1 года назад

Trivy possibly leaks registry credential when scanning images from malicious registries

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2024:0269-1

больше 1 года назад

Security update for trivy

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2024:0268-1

больше 1 года назад

Security update for trivy

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-35192

Trivy is a security scanner. Prior to 0.51.2, if a malicious actor is able to trigger Trivy to scan container images from a crafted malicious registry, it could result in the leakage of credentials for legitimate registries such as AWS Elastic Container Registry (ECR), Google Cloud Artifact/Container Registry, or Azure Container Registry (ACR). These tokens can then be used to push/pull images from those registries to which the identity/user running Trivy has access. Systems are not affected if the default credential provider chain is unable to obtain valid credentials. This vulnerability only applies when scanning container images directly from a registry. This vulnerability is fixed in 0.51.2.

CVSS3: 5.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-35192

Trivy is a security scanner. Prior to 0.51.2, if a malicious actor is ...

CVSS3: 5.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-xcq4-m2r3-cmrj

Trivy possibly leaks registry credential when scanning images from malicious registries

CVSS3: 5.5
0%
Низкий
больше 1 года назад
suse-cvrf логотип
openSUSE-SU-2024:0269-1

Security update for trivy

больше 1 года назад
suse-cvrf логотип
openSUSE-SU-2024:0268-1

Security update for trivy

больше 1 года назад

Уязвимостей на страницу