pingweak-badges-api
Installation
Install from the command line using your preferred container software:
Docker
docker pull oci.registry.sudovanilla.org/pingweak-badges-api:latest Podman
podman pull oci.registry.sudovanilla.org/pingweak-badges-api:latest Vulnerabilities
CRITICAL
zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6
CVE-2023-45853
CRITICAL
zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6
MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.
Reference: https://avd.aquasec.com/nvd/cve-2023-45853
HIGH
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
CVE-2023-31484
HIGH
perl: CPAN.pm does not verify TLS certificates when downloading distributions over HTTPS
CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.
Reference: https://avd.aquasec.com/nvd/cve-2023-31484
HIGH
perl: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes
CVE-2024-56406
HIGH
perl: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes
A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`. $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;' Segmentation fault (core dumped) It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.
Reference: https://avd.aquasec.com/nvd/cve-2024-56406
HIGH
gnutls: Vulnerability in GnuTLS otherName SAN export
CVE-2025-32988
HIGH
gnutls: Vulnerability in GnuTLS otherName SAN export
A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.
Reference: https://avd.aquasec.com/nvd/cve-2025-32988
HIGH
gnutls: Vulnerability in GnuTLS certtool template parsing
CVE-2025-32990
HIGH
gnutls: Vulnerability in GnuTLS certtool template parsing
A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.
Reference: https://avd.aquasec.com/nvd/cve-2025-32990
HIGH
database/sql: Postgres Scan Race Condition
CVE-2025-47907
HIGH
database/sql: Postgres Scan Race Condition
Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.
Reference: https://avd.aquasec.com/nvd/cve-2025-47907
HIGH
glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH
CVE-2025-4802
HIGH
glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH
Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
Reference: https://avd.aquasec.com/nvd/cve-2025-4802
HIGH
devalue prototype pollution vulnerability
CVE-2025-57820
HIGH
devalue prototype pollution vulnerability
Svelte devalue is a utility library. Prior to version 5.3.2, a string passed to devalue.parse could represent an object with a __proto__ property and devalue.parse does not check that an index is numeric. This could result in assigning prototypes to objects and properties, leading to prototype pollution. This issue has been fixed in version 5.3.2
Reference: https://avd.aquasec.com/nvd/cve-2025-57820
HIGH
golang: archive/tar: Unbounded allocation when parsing GNU sparse map
CVE-2025-58183
HIGH
golang: archive/tar: Unbounded allocation when parsing GNU sparse map
tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.
Reference: https://avd.aquasec.com/nvd/cve-2025-58183
HIGH
linux-pam: Linux-pam directory Traversal
CVE-2025-6020
HIGH
linux-pam: Linux-pam directory Traversal
A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.
Reference: https://avd.aquasec.com/nvd/cve-2025-6020