4get-modified
Installation
Install from the command line using your preferred container software:
Docker
docker pull oci.registry.sudovanilla.org/4get-modified:amd64 Podman
podman pull oci.registry.sudovanilla.org/4get-modified:amd64 Vulnerabilities
CRITICAL
libxml: Heap use after free (UAF) leads to Denial of service (DoS)
CVE-2025-49794
CRITICAL
libxml: Heap use after free (UAF) leads to Denial of service (DoS)
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
Reference: https://avd.aquasec.com/nvd/cve-2025-49794
CRITICAL
libxml: Type confusion leads to Denial of service (DoS)
CVE-2025-49796
CRITICAL
libxml: Type confusion leads to Denial of service (DoS)
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
Reference: https://avd.aquasec.com/nvd/cve-2025-49796
HIGH
libxml: Null pointer dereference leads to Denial of service (DoS)
CVE-2025-49795
HIGH
libxml: Null pointer dereference leads to Denial of service (DoS)
A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.
Reference: https://avd.aquasec.com/nvd/cve-2025-49795
HIGH
mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals
CVE-2025-55753
HIGH
mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals
An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
Reference: https://avd.aquasec.com/nvd/cve-2025-55753
HIGH
httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...
CVE-2025-58098
HIGH
httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...
Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. This issue affects Apache HTTP Server before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
Reference: https://avd.aquasec.com/nvd/cve-2025-58098
HIGH
httpd: Apache HTTP Server: NTLM Leakage on Windows via SSRF
CVE-2025-59775
HIGH
httpd: Apache HTTP Server: NTLM Leakage on Windows via SSRF
Server-Side Request Forgery (SSRF) vulnerability in Apache HTTP Server on Windows with AllowEncodedSlashes On and MergeSlashes Off allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.66, which fixes the issue.
Reference: https://avd.aquasec.com/nvd/cve-2025-59775
HIGH
libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2
CVE-2025-6021
HIGH
libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
Reference: https://avd.aquasec.com/nvd/cve-2025-6021
HIGH
libpng: LIBPNG buffer overflow
CVE-2025-64720
HIGH
libpng: LIBPNG buffer overflow
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha × 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.
Reference: https://avd.aquasec.com/nvd/cve-2025-64720
HIGH
libpng: LIBPNG heap buffer overflow
CVE-2025-65018
HIGH
libpng: LIBPNG heap buffer overflow
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.
Reference: https://avd.aquasec.com/nvd/cve-2025-65018
HIGH
libpng: LIBPNG out-of-bounds read in png_image_read_composite
CVE-2025-66293
HIGH
libpng: LIBPNG out-of-bounds read in png_image_read_composite
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng's simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng's internal state management. Upgrade to libpng 1.6.52 or later.
Reference: https://avd.aquasec.com/nvd/cve-2025-66293