curl |
CVE-2017-1000257 |
严重 |
7.54.0-r0 |
7.56.1-r0 |
curl: IMAP FETCH response out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000257
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-10-31 21:29 修改: 2018-11-13 11:29
|
curl |
CVE-2017-8816 |
严重 |
7.54.0-r0 |
7.57.0-r0 |
curl: NTLM buffer overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8816
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-11-29 18:29 修改: 2018-11-13 11:29
|
curl |
CVE-2017-8817 |
严重 |
7.54.0-r0 |
7.57.0-r0 |
curl: FTP wildcard out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8817
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-11-29 18:29 修改: 2018-11-13 11:29
|
curl |
CVE-2017-8818 |
严重 |
7.54.0-r0 |
7.57.0-r0 |
curl: Out-of-bound access in SSL related cleanup code
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8818
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-11-29 18:29 修改: 2017-12-20 20:56
|
curl |
CVE-2018-0500 |
严重 |
7.54.0-r0 |
7.61.0-r0 |
curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0500
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-07-11 13:29 修改: 2020-08-24 17:37
|
curl |
CVE-2018-1000005 |
严重 |
7.54.0-r0 |
7.58.0-r0 |
curl: Out-of-bounds read in code handling HTTP/2 trailers
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000005
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-01-24 22:29 修改: 2019-06-18 22:15
|
curl |
CVE-2018-1000120 |
严重 |
7.54.0-r0 |
7.59.0-r0 |
curl: FTP path trickery leads to NIL byte out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000120
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-03-14 18:29 修改: 2019-06-18 22:15
|
curl |
CVE-2018-1000122 |
严重 |
7.54.0-r0 |
7.59.0-r0 |
curl: RTSP RTP buffer over-read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000122
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-03-14 18:29 修改: 2019-10-03 00:03
|
curl |
CVE-2018-1000300 |
严重 |
7.54.0-r0 |
7.60.0-r0 |
curl: FTP shutdown response heap-based buffer overflow can potentially lead to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000300
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-05-24 13:29 修改: 2020-08-24 17:37
|
curl |
CVE-2018-1000301 |
严重 |
7.54.0-r0 |
7.60.0-r0 |
curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000301
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-05-24 13:29 修改: 2019-10-03 00:03
|
curl |
CVE-2018-14618 |
严重 |
7.54.0-r0 |
7.61.1-r0 |
curl: NTLM password overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14618
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-09-05 19:29 修改: 2019-04-22 17:48
|
curl |
CVE-2018-16839 |
严重 |
7.54.0-r0 |
7.61.1-r1 |
curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16839
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-10-31 18:29 修改: 2023-11-07 02:53
|
curl |
CVE-2018-16840 |
严重 |
7.54.0-r0 |
7.61.1-r1 |
curl: Use-after-free when closing "easy" handle in Curl_close()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16840
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-10-31 18:29 修改: 2019-10-09 23:36
|
curl |
CVE-2018-16842 |
严重 |
7.54.0-r0 |
7.61.1-r1 |
curl: Heap-based buffer over-read in the curl tool warning formatting
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16842
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-10-31 19:29 修改: 2019-08-06 17:15
|
curl |
CVE-2019-3822 |
严重 |
7.54.0-r0 |
7.61.1-r2 |
curl: NTLMv2 type-3 header stack buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3822
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
libcurl |
CVE-2017-1000257 |
严重 |
7.54.0-r0 |
7.56.1-r0 |
curl: IMAP FETCH response out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000257
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-10-31 21:29 修改: 2018-11-13 11:29
|
libcurl |
CVE-2017-8816 |
严重 |
7.54.0-r0 |
7.57.0-r0 |
curl: NTLM buffer overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8816
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-11-29 18:29 修改: 2018-11-13 11:29
|
libcurl |
CVE-2017-8817 |
严重 |
7.54.0-r0 |
7.57.0-r0 |
curl: FTP wildcard out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8817
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-11-29 18:29 修改: 2018-11-13 11:29
|
libcurl |
CVE-2017-8818 |
严重 |
7.54.0-r0 |
7.57.0-r0 |
curl: Out-of-bound access in SSL related cleanup code
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-8818
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-11-29 18:29 修改: 2017-12-20 20:56
|
libcurl |
CVE-2018-0500 |
严重 |
7.54.0-r0 |
7.61.0-r0 |
curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0500
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-07-11 13:29 修改: 2020-08-24 17:37
|
libcurl |
CVE-2018-1000005 |
严重 |
7.54.0-r0 |
7.58.0-r0 |
curl: Out-of-bounds read in code handling HTTP/2 trailers
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000005
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-01-24 22:29 修改: 2019-06-18 22:15
|
libcurl |
CVE-2018-1000120 |
严重 |
7.54.0-r0 |
7.59.0-r0 |
curl: FTP path trickery leads to NIL byte out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000120
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-03-14 18:29 修改: 2019-06-18 22:15
|
libcurl |
CVE-2018-1000122 |
严重 |
7.54.0-r0 |
7.59.0-r0 |
curl: RTSP RTP buffer over-read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000122
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-03-14 18:29 修改: 2019-10-03 00:03
|
libcurl |
CVE-2018-1000300 |
严重 |
7.54.0-r0 |
7.60.0-r0 |
curl: FTP shutdown response heap-based buffer overflow can potentially lead to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000300
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-05-24 13:29 修改: 2020-08-24 17:37
|
libcurl |
CVE-2018-1000301 |
严重 |
7.54.0-r0 |
7.60.0-r0 |
curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000301
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-05-24 13:29 修改: 2019-10-03 00:03
|
libcurl |
CVE-2018-14618 |
严重 |
7.54.0-r0 |
7.61.1-r0 |
curl: NTLM password overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14618
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-09-05 19:29 修改: 2019-04-22 17:48
|
libcurl |
CVE-2018-16839 |
严重 |
7.54.0-r0 |
7.61.1-r1 |
curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16839
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-10-31 18:29 修改: 2023-11-07 02:53
|
libcurl |
CVE-2018-16840 |
严重 |
7.54.0-r0 |
7.61.1-r1 |
curl: Use-after-free when closing "easy" handle in Curl_close()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16840
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-10-31 18:29 修改: 2019-10-09 23:36
|
libcurl |
CVE-2018-16842 |
严重 |
7.54.0-r0 |
7.61.1-r1 |
curl: Heap-based buffer over-read in the curl tool warning formatting
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16842
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-10-31 19:29 修改: 2019-08-06 17:15
|
libcurl |
CVE-2019-3822 |
严重 |
7.54.0-r0 |
7.61.1-r2 |
curl: NTLMv2 type-3 header stack buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3822
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
busybox |
CVE-2017-16544 |
高危 |
1.26.2-r5 |
1.26.2-r9 |
busybox: Insufficient sanitization of filenames when autocompleting
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-16544
镜像层: sha256:404361ced64e208b54937071ef96722b59d45df96dea1652d655e961625ee5bd
发布日期: 2017-11-20 15:29 修改: 2022-10-28 19:29
|
curl |
CVE-2017-1000254 |
高危 |
7.54.0-r0 |
7.56.0-r0 |
curl: FTP PWD response parser out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000254
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-10-06 13:29 修改: 2023-11-07 02:37
|
curl |
CVE-2018-1000121 |
高危 |
7.54.0-r0 |
7.59.0-r0 |
curl: LDAP NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000121
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-03-14 18:29 修改: 2019-07-23 23:15
|
curl |
CVE-2018-16890 |
高危 |
7.54.0-r0 |
7.61.1-r2 |
curl: NTLM type-2 heap out-of-bounds buffer read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16890
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2019-02-06 20:29 修改: 2023-11-07 02:53
|
curl |
CVE-2019-3823 |
高危 |
7.54.0-r0 |
7.61.1-r2 |
curl: SMTP end-of-response out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3823
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
libcurl |
CVE-2017-1000254 |
高危 |
7.54.0-r0 |
7.56.0-r0 |
curl: FTP PWD response parser out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000254
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-10-06 13:29 修改: 2023-11-07 02:37
|
libcurl |
CVE-2018-1000121 |
高危 |
7.54.0-r0 |
7.59.0-r0 |
curl: LDAP NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000121
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2018-03-14 18:29 修改: 2019-07-23 23:15
|
libcurl |
CVE-2018-16890 |
高危 |
7.54.0-r0 |
7.61.1-r2 |
curl: NTLM type-2 heap out-of-bounds buffer read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16890
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2019-02-06 20:29 修改: 2023-11-07 02:53
|
libcurl |
CVE-2019-3823 |
高危 |
7.54.0-r0 |
7.61.1-r2 |
curl: SMTP end-of-response out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3823
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
musl |
CVE-2017-15650 |
高危 |
1.1.16-r9 |
1.1.16-r14 |
musl libc before 1.1.17 has a buffer overflow via crafted DNS replies ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15650
镜像层: sha256:404361ced64e208b54937071ef96722b59d45df96dea1652d655e961625ee5bd
发布日期: 2017-10-19 23:29 修改: 2017-11-08 16:21
|
musl-utils |
CVE-2017-15650 |
高危 |
1.1.16-r9 |
1.1.16-r14 |
musl libc before 1.1.17 has a buffer overflow via crafted DNS replies ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15650
镜像层: sha256:404361ced64e208b54937071ef96722b59d45df96dea1652d655e961625ee5bd
发布日期: 2017-10-19 23:29 修改: 2017-11-08 16:21
|
curl |
CVE-2017-1000099 |
中危 |
7.54.0-r0 |
7.55.0-r0 |
curl: FILE buffer read out of bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000099
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-10-05 01:29 修改: 2017-11-01 19:23
|
curl |
CVE-2017-1000100 |
中危 |
7.54.0-r0 |
7.55.0-r0 |
curl: TFTP sends more than buffer size
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000100
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-10-05 01:29 修改: 2018-11-13 11:29
|
libcurl |
CVE-2017-1000099 |
中危 |
7.54.0-r0 |
7.55.0-r0 |
curl: FILE buffer read out of bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000099
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-10-05 01:29 修改: 2017-11-01 19:23
|
libcurl |
CVE-2017-1000100 |
中危 |
7.54.0-r0 |
7.55.0-r0 |
curl: TFTP sends more than buffer size
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000100
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-10-05 01:29 修改: 2018-11-13 11:29
|
libcurl |
CVE-2017-1000101 |
中危 |
7.54.0-r0 |
7.55.0-r0 |
curl: URL globbing out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000101
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-10-05 01:29 修改: 2018-11-13 11:29
|
curl |
CVE-2017-1000101 |
中危 |
7.54.0-r0 |
7.55.0-r0 |
curl: URL globbing out of bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000101
镜像层: sha256:5a1e010b930d4cfae9e3a8f712f4f737ca3ce8480ec7f9b0cd062348bc56cd4e
发布日期: 2017-10-05 01:29 修改: 2018-11-13 11:29
|
busybox |
CVE-2017-15873 |
中危 |
1.26.2-r5 |
1.26.2-r9 |
busybox: Integer overflow in the get_next_block function
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-15873
镜像层: sha256:404361ced64e208b54937071ef96722b59d45df96dea1652d655e961625ee5bd
发布日期: 2017-10-24 20:29 修改: 2021-02-18 14:43
|