curl |
CVE-2021-22945 |
严重 |
7.59.0-12.ph2 |
7.78.0-2.ph2 |
curl: use-after-free and double-free in MQTT sending
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22945
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-09-23 13:15 修改: 2024-03-27 15:04
|
curl |
CVE-2022-22623 |
严重 |
7.59.0-12.ph2 |
7.82.0-1.ph2 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22623
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-03-18 18:15 修改: 2023-11-07 03:43
|
curl |
CVE-2022-32207 |
严重 |
7.59.0-12.ph2 |
7.83.1-2.ph2 |
curl: Unpreserved file permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32207
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
curl-libs |
CVE-2021-22945 |
严重 |
7.59.0-12.ph2 |
7.78.0-2.ph2 |
curl: use-after-free and double-free in MQTT sending
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22945
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-09-23 13:15 修改: 2024-03-27 15:04
|
curl-libs |
CVE-2022-22623 |
严重 |
7.59.0-12.ph2 |
7.82.0-1.ph2 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22623
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-03-18 18:15 修改: 2023-11-07 03:43
|
curl-libs |
CVE-2022-32207 |
严重 |
7.59.0-12.ph2 |
7.83.1-2.ph2 |
curl: Unpreserved file permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32207
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
expat-libs |
CVE-2022-22822 |
严重 |
2.2.9-1.ph2 |
2.2.9-3.ph2 |
expat: Integer overflow in addBinding in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22822
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-01-10 14:12 修改: 2022-10-06 15:29
|
expat-libs |
CVE-2022-22823 |
严重 |
2.2.9-1.ph2 |
2.2.9-3.ph2 |
expat: Integer overflow in build_model in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22823
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47
|
expat-libs |
CVE-2022-22824 |
严重 |
2.2.9-1.ph2 |
2.2.9-3.ph2 |
expat: Integer overflow in defineAttribute in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22824
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47
|
expat-libs |
CVE-2022-23852 |
严重 |
2.2.9-1.ph2 |
2.2.9-4.ph2 |
expat: Integer overflow in function XML_GetBuffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23852
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-01-24 02:15 修改: 2022-10-29 02:44
|
expat-libs |
CVE-2022-25235 |
严重 |
2.2.9-1.ph2 |
2.2.9-6.ph2 |
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25235
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-02-16 01:15 修改: 2023-11-07 03:44
|
expat-libs |
CVE-2022-25236 |
严重 |
2.2.9-1.ph2 |
2.2.9-6.ph2 |
expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25236
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-02-16 01:15 修改: 2023-11-07 03:44
|
expat-libs |
CVE-2022-25315 |
严重 |
2.2.9-1.ph2 |
2.2.9-7.ph2 |
expat: Integer overflow in storeRawNames()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25315
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44
|
glibc |
CVE-2021-33574 |
严重 |
2.26-22.ph2 |
2.26-23.ph2 |
glibc: mq_notify does not handle separately allocated thread attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33574
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-05-25 22:15 修改: 2023-11-07 03:35
|
glibc |
CVE-2021-35942 |
严重 |
2.26-22.ph2 |
2.26-25.ph2 |
glibc: Arbitrary read in wordexp()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-35942
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-07-22 18:15 修改: 2023-11-07 03:36
|
glibc |
CVE-2022-23218 |
严重 |
2.26-22.ph2 |
2.26-27.ph2 |
glibc: Stack-based buffer overflow in svcunix_create via long pathnames
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23218
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:37
|
glibc |
CVE-2022-23219 |
严重 |
2.26-22.ph2 |
2.26-27.ph2 |
glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23219
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-01-14 07:15 修改: 2022-11-08 13:32
|
lua |
CVE-2022-28805 |
严重 |
5.3.4-1.ph2 |
5.3.4-2.ph2 |
lua: heap buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28805
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-04-08 06:15 修改: 2024-06-20 14:44
|
nss-libs |
CVE-2020-12403 |
严重 |
3.44-4.ph2 |
3.44-5.ph2 |
nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12403
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-05-27 19:15 修改: 2023-03-24 16:15
|
nss-libs |
CVE-2021-43527 |
严重 |
3.44-4.ph2 |
3.44-6.ph2 |
nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43527
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-12-08 22:15 修改: 2023-02-23 01:40
|
openssl |
CVE-2022-1292 |
严重 |
1.0.2y-1.ph2 |
1.0.2ze-1.ph2 |
openssl: c_rehash script allows command injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1292
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-05-03 16:15 修改: 2023-11-07 03:41
|
openssl |
CVE-2022-2068 |
严重 |
1.0.2y-1.ph2 |
1.0.2ze-2.ph2 |
openssl: the c_rehash script allows command injection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2068
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-21 15:15 修改: 2023-11-07 03:46
|
sqlite-libs |
CVE-2021-20223 |
严重 |
3.32.1-2.ph2 |
3.32.1-3.ph2 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20223
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-08-25 20:15 修改: 2023-11-07 03:29
|
zlib |
CVE-2022-37434 |
严重 |
1.2.11-1.ph2 |
1.2.11-3.ph2 |
zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37434
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-08-05 07:15 修改: 2023-07-19 00:56
|
curl-libs |
CVE-2022-27781 |
高危 |
7.59.0-12.ph2 |
7.83.1-1.ph2 |
curl: CERTINFO never-ending busy-loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01
|
curl-libs |
CVE-2022-27782 |
高危 |
7.59.0-12.ph2 |
7.83.1-1.ph2 |
curl: TLS and SSH connection too eager reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01
|
curl-libs |
CVE-2022-3221 |
高危 |
7.59.0-12.ph2 |
7.86.0-1.ph2 |
rdiffweb CSRF vulnerability in profile's SSH keys can lead to unauthorized access
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3221
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-09-15 09:15 修改: 2022-09-18 01:29
|
curl-libs |
CVE-2022-42915 |
高危 |
7.59.0-12.ph2 |
7.86.0-1.ph2 |
curl: HTTP proxy double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42915
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-10-29 20:15 修改: 2024-03-27 14:59
|
curl-libs |
CVE-2022-42916 |
高危 |
7.59.0-12.ph2 |
7.86.0-1.ph2 |
curl: HSTS bypass via IDN
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42916
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-10-29 02:15 修改: 2024-03-27 14:59
|
curl-libs |
CVE-2022-43551 |
高危 |
7.59.0-12.ph2 |
7.86.0-3.ph2 |
curl: HSTS bypass via IDN
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43551
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-12-23 15:15 修改: 2024-03-27 14:58
|
curl |
CVE-2022-22576 |
高危 |
7.59.0-12.ph2 |
7.82.0-2.ph2 |
curl: OAUTH2 bearer bypass in connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02
|
curl |
CVE-2022-27775 |
高危 |
7.59.0-12.ph2 |
7.83.1-1.ph2 |
curl: bad local IPv6 connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27775
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
curl |
CVE-2022-27780 |
高危 |
7.59.0-12.ph2 |
7.83.1-1.ph2 |
curl: percent-encoded path separator in URL host
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27780
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-08-07 19:35
|
curl |
CVE-2022-27781 |
高危 |
7.59.0-12.ph2 |
7.83.1-1.ph2 |
curl: CERTINFO never-ending busy-loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27781
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01
|
curl |
CVE-2022-27782 |
高危 |
7.59.0-12.ph2 |
7.83.1-1.ph2 |
curl: TLS and SSH connection too eager reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27782
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01
|
curl |
CVE-2022-3221 |
高危 |
7.59.0-12.ph2 |
7.86.0-1.ph2 |
rdiffweb CSRF vulnerability in profile's SSH keys can lead to unauthorized access
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3221
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-09-15 09:15 修改: 2022-09-18 01:29
|
curl |
CVE-2022-42915 |
高危 |
7.59.0-12.ph2 |
7.86.0-1.ph2 |
curl: HTTP proxy double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42915
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-10-29 20:15 修改: 2024-03-27 14:59
|
expat-libs |
CVE-2021-45960 |
高危 |
2.2.9-1.ph2 |
2.2.9-3.ph2 |
expat: Large number of prefixed XML attributes on a single tag can crash libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45960
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-01-01 19:15 修改: 2022-10-06 19:08
|
expat-libs |
CVE-2021-46143 |
高危 |
2.2.9-1.ph2 |
2.2.9-3.ph2 |
expat: Integer overflow in doProlog in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46143
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-01-06 04:15 修改: 2022-10-06 19:11
|
expat-libs |
CVE-2022-22825 |
高危 |
2.2.9-1.ph2 |
2.2.9-3.ph2 |
expat: Integer overflow in lookup in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22825
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-01-10 14:12 修改: 2022-10-06 14:47
|
expat-libs |
CVE-2022-22826 |
高危 |
2.2.9-1.ph2 |
2.2.9-3.ph2 |
expat: Integer overflow in nextScaffoldPart in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22826
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-01-10 14:12 修改: 2022-10-06 12:44
|
expat-libs |
CVE-2022-22827 |
高危 |
2.2.9-1.ph2 |
2.2.9-3.ph2 |
expat: Integer overflow in storeAtts in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22827
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-01-10 14:12 修改: 2022-10-06 12:52
|
expat-libs |
CVE-2022-23990 |
高危 |
2.2.9-1.ph2 |
2.2.9-5.ph2 |
expat: integer overflow in the doProlog function
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23990
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-01-26 19:15 修改: 2023-11-07 03:44
|
expat-libs |
CVE-2022-25314 |
高危 |
2.2.9-1.ph2 |
2.2.9-7.ph2 |
expat: Integer overflow in copyString()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25314
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44
|
expat-libs |
CVE-2022-40674 |
高危 |
2.2.9-1.ph2 |
2.2.9-9.ph2 |
expat: a use-after-free in the doContent function in xmlparse.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-40674
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-09-14 11:15 修改: 2023-11-07 03:52
|
expat-libs |
CVE-2022-43680 |
高危 |
2.2.9-1.ph2 |
2.2.9-10.ph2 |
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43680
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-10-24 14:15 修改: 2024-01-21 02:08
|
curl |
CVE-2022-42916 |
高危 |
7.59.0-12.ph2 |
7.86.0-1.ph2 |
curl: HSTS bypass via IDN
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-42916
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-10-29 02:15 修改: 2024-03-27 14:59
|
curl |
CVE-2022-43551 |
高危 |
7.59.0-12.ph2 |
7.86.0-3.ph2 |
curl: HSTS bypass via IDN
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43551
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-12-23 15:15 修改: 2024-03-27 14:58
|
curl |
CVE-2021-22901 |
高危 |
7.59.0-12.ph2 |
7.75.0-2.ph2 |
curl: Use-after-free in TLS session handling when using OpenSSL TLS backend
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22901
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:12
|
curl |
CVE-2021-22926 |
高危 |
7.59.0-12.ph2 |
7.78.0-1.ph2 |
curl: CURLOPT_SSLCERT mixup with Secure Transport
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22926
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11
|
glibc |
CVE-2021-38604 |
高危 |
2.26-22.ph2 |
2.26-26.ph2 |
glibc: NULL pointer dereference in helper_thread() in mq_notify.c while handling NOTIFY_REMOVED messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-38604
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-08-12 16:15 修改: 2023-11-07 03:37
|
glibc |
CVE-2021-3999 |
高危 |
2.26-22.ph2 |
2.26-28.ph2 |
glibc: Off-by-one buffer overflow/underflow in getcwd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3999
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-08-24 16:15 修改: 2023-02-12 23:43
|
krb5 |
CVE-2020-28196 |
高危 |
1.17-1.ph2 |
1.17-2.ph2 |
krb5: unbounded recursion via an ASN.1-encoded Kerberos message in lib/krb5/asn.1/asn1_encode.c may lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28196
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2020-11-06 08:15 修改: 2023-11-07 03:21
|
krb5 |
CVE-2021-36222 |
高危 |
1.17-1.ph2 |
1.17-2.ph2 |
krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36222
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-07-22 18:15 修改: 2021-11-28 23:19
|
curl |
CVE-2021-22946 |
高危 |
7.59.0-12.ph2 |
7.78.0-2.ph2 |
curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12
|
lua |
CVE-2022-33099 |
高危 |
5.3.4-1.ph2 |
5.3.4-3.ph2 |
lua: heap buffer overflow in luaG_errormsg() in ldebug.c due to uncontrolled recursion in error handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-33099
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-07-01 12:15 修改: 2023-11-07 03:48
|
ncurses-libs |
CVE-2021-39537 |
高危 |
6.1-1.ph2 |
6.1-2.ph2 |
ncurses: heap-based buffer overflow in _nc_captoinfo() in captoinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-39537
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-09-20 16:15 修改: 2023-12-03 20:15
|
ncurses-libs |
CVE-2022-29458 |
高危 |
6.1-1.ph2 |
6.1-3.ph2 |
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
nginx |
CVE-2021-23017 |
高危 |
1.16.1-2.ph2 |
1.16.1-3.ph2 |
nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23017
镜像层: sha256:f948e4c0caca45c8175f814cb8e6dc3f68b520bf9877b296816d799738026436
发布日期: 2021-06-01 13:15 修改: 2023-11-07 03:30
|
nginx |
CVE-2021-3618 |
高危 |
1.16.1-2.ph2 |
1.16.1-5.ph2 |
ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3618
镜像层: sha256:f948e4c0caca45c8175f814cb8e6dc3f68b520bf9877b296816d799738026436
发布日期: 2022-03-23 20:15 修改: 2023-02-09 02:03
|
nginx |
CVE-2022-41741 |
高危 |
1.16.1-2.ph2 |
1.16.1-6.ph2 |
nginx: Memory corruption in the ngx_http_mp4_module
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41741
镜像层: sha256:f948e4c0caca45c8175f814cb8e6dc3f68b520bf9877b296816d799738026436
发布日期: 2022-10-19 22:15 修改: 2023-11-07 03:52
|
curl-libs |
CVE-2021-22901 |
高危 |
7.59.0-12.ph2 |
7.75.0-2.ph2 |
curl: Use-after-free in TLS session handling when using OpenSSL TLS backend
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22901
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:12
|
curl-libs |
CVE-2021-22926 |
高危 |
7.59.0-12.ph2 |
7.78.0-1.ph2 |
curl: CURLOPT_SSLCERT mixup with Secure Transport
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22926
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11
|
curl-libs |
CVE-2021-22946 |
高危 |
7.59.0-12.ph2 |
7.78.0-2.ph2 |
curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12
|
curl-libs |
CVE-2022-22576 |
高危 |
7.59.0-12.ph2 |
7.82.0-2.ph2 |
curl: OAUTH2 bearer bypass in connection re-use
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02
|
openssl |
CVE-2021-3712 |
高危 |
1.0.2y-1.ph2 |
1.0.2za-1.ph2 |
openssl: Read buffer overruns processing ASN.1 strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15
|
openssl |
CVE-2022-0778 |
高危 |
1.0.2y-1.ph2 |
1.0.2za-2.ph2 |
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15
|
rpm-libs |
CVE-2021-20271 |
高危 |
4.13.0.2-3.ph2 |
4.13.0.2-4.ph2 |
rpm: Signature checks bypass via corrupted rpm package
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20271
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-03-26 17:15 修改: 2023-02-12 22:15
|
curl-libs |
CVE-2022-27775 |
高危 |
7.59.0-12.ph2 |
7.83.1-1.ph2 |
curl: bad local IPv6 connection reuse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27775
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
xz-libs |
CVE-2022-1271 |
高危 |
5.2.3-2.ph2 |
5.2.3-3.ph2 |
gzip: arbitrary-file-write vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1271
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-08-31 16:15 修改: 2024-08-26 10:47
|
curl-libs |
CVE-2022-27780 |
高危 |
7.59.0-12.ph2 |
7.83.1-1.ph2 |
curl: percent-encoded path separator in URL host
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27780
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-08-07 19:35
|
zlib |
CVE-2018-25032 |
高危 |
1.2.11-1.ph2 |
1.2.11-2.ph2 |
zlib: A flaw found in zlib when compressing (not decompressing) certain inputs
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-25032
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-03-25 09:15 修改: 2023-11-07 02:56
|
expat-libs |
CVE-2022-25313 |
中危 |
2.2.9-1.ph2 |
2.2.9-8.ph2 |
expat: Stack exhaustion in doctype parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25313
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-02-18 05:15 修改: 2023-11-07 03:44
|
curl-libs |
CVE-2021-22947 |
中危 |
7.59.0-12.ph2 |
7.78.0-2.ph2 |
curl: Server responses received before STARTTLS processed after TLS handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03
|
curl-libs |
CVE-2022-27774 |
中危 |
7.59.0-12.ph2 |
7.82.0-2.ph2 |
curl: credential leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
curl-libs |
CVE-2022-27776 |
中危 |
7.59.0-12.ph2 |
7.83.1-1.ph2 |
curl: auth/cookie leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
curl-libs |
CVE-2022-27779 |
中危 |
7.59.0-12.ph2 |
7.83.1-1.ph2 |
curl: cookie for trailing dot TLD
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27779
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
curl-libs |
CVE-2022-30115 |
中危 |
7.59.0-12.ph2 |
7.83.1-1.ph2 |
curl: HSTS bypass via trailing dot
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30115
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01
|
curl-libs |
CVE-2022-32205 |
中危 |
7.59.0-12.ph2 |
7.83.1-2.ph2 |
curl: Set-Cookie denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32205
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:01
|
curl-libs |
CVE-2022-32206 |
中危 |
7.59.0-12.ph2 |
7.83.1-2.ph2 |
curl: HTTP compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
curl-libs |
CVE-2022-32208 |
中危 |
7.59.0-12.ph2 |
7.83.1-2.ph2 |
curl: FTP-KRB bad message verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
krb5 |
CVE-2021-37750 |
中危 |
1.17-1.ph2 |
1.17-2.ph2 |
krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37750
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-08-23 05:15 修改: 2023-11-07 03:37
|
curl-libs |
CVE-2022-35260 |
中危 |
7.59.0-12.ph2 |
7.86.0-1.ph2 |
curl: .netrc parser out-of-bounds access
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35260
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-12-05 22:15 修改: 2024-03-27 15:00
|
curl-libs |
CVE-2022-43552 |
中危 |
7.59.0-12.ph2 |
7.86.0-3.ph2 |
curl: Use-after-free triggered by an HTTP proxy deny response
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35
|
curl |
CVE-2021-22925 |
中危 |
7.59.0-12.ph2 |
7.75.0-4.ph2 |
curl: Incorrect fix for CVE-2021-22898 TELNET stack contents disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22925
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11
|
curl |
CVE-2021-22947 |
中危 |
7.59.0-12.ph2 |
7.78.0-2.ph2 |
curl: Server responses received before STARTTLS processed after TLS handshake
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03
|
curl |
CVE-2022-27774 |
中危 |
7.59.0-12.ph2 |
7.82.0-2.ph2 |
curl: credential leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
curl |
CVE-2022-27776 |
中危 |
7.59.0-12.ph2 |
7.83.1-1.ph2 |
curl: auth/cookie leak on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
curl |
CVE-2022-27779 |
中危 |
7.59.0-12.ph2 |
7.83.1-1.ph2 |
curl: cookie for trailing dot TLD
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27779
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02
|
nginx |
CVE-2022-41742 |
中危 |
1.16.1-2.ph2 |
1.16.1-6.ph2 |
nginx: Memory disclosure in the ngx_http_mp4_module
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41742
镜像层: sha256:f948e4c0caca45c8175f814cb8e6dc3f68b520bf9877b296816d799738026436
发布日期: 2022-10-19 22:15 修改: 2023-11-07 03:52
|
curl |
CVE-2022-30115 |
中危 |
7.59.0-12.ph2 |
7.83.1-1.ph2 |
curl: HSTS bypass via trailing dot
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-30115
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:01
|
curl |
CVE-2022-32205 |
中危 |
7.59.0-12.ph2 |
7.83.1-2.ph2 |
curl: Set-Cookie denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32205
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:01
|
curl |
CVE-2022-32206 |
中危 |
7.59.0-12.ph2 |
7.83.1-2.ph2 |
curl: HTTP compression denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32206
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
curl |
CVE-2022-32208 |
中危 |
7.59.0-12.ph2 |
7.83.1-2.ph2 |
curl: FTP-KRB bad message verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-32208
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-07-07 13:15 修改: 2024-03-27 15:00
|
curl |
CVE-2022-35260 |
中危 |
7.59.0-12.ph2 |
7.86.0-1.ph2 |
curl: .netrc parser out-of-bounds access
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35260
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-12-05 22:15 修改: 2024-03-27 15:00
|
curl |
CVE-2022-43552 |
中危 |
7.59.0-12.ph2 |
7.86.0-3.ph2 |
curl: Use-after-free triggered by an HTTP proxy deny response
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-43552
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2023-02-09 20:15 修改: 2024-10-27 15:35
|
openssl |
CVE-2021-4160 |
中危 |
1.0.2y-1.ph2 |
1.0.2zc-1.ph2 |
openssl: Carry propagation bug in the MIPS32 and MIPS64 squaring procedure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4160
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-01-28 22:15 修改: 2024-06-21 19:15
|
curl |
CVE-2021-22876 |
中危 |
7.59.0-12.ph2 |
7.75.0-1.ph2 |
curl: Leak of authentication credentials in URL via automatic Referer
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22876
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-04-01 18:15 修改: 2024-03-27 15:47
|
rpm-libs |
CVE-2021-20266 |
中危 |
4.13.0.2-3.ph2 |
4.14.2-1.ph2 |
rpm: missing length checks in hdrblobInit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20266
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-04-30 12:15 修改: 2023-11-07 03:29
|
rpm-libs |
CVE-2021-3421 |
中危 |
4.13.0.2-3.ph2 |
4.13.0.2-4.ph2 |
rpm: unsigned signature header leads to string injection into an rpm database
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3421
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-05-19 14:15 修改: 2023-11-07 03:37
|
rpm-libs |
CVE-2021-3521 |
中危 |
4.13.0.2-3.ph2 |
4.14.2-3.ph2 |
rpm: RPM does not require subkeys to have a valid binding signature
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3521
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-08-22 15:15 修改: 2023-02-12 23:41
|
curl |
CVE-2021-22897 |
中危 |
7.59.0-12.ph2 |
7.75.0-3.ph2 |
curl: Cipher settings shared for all connections when using schannel TLS backed
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22897
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47
|
curl-libs |
CVE-2021-22876 |
中危 |
7.59.0-12.ph2 |
7.75.0-1.ph2 |
curl: Leak of authentication credentials in URL via automatic Referer
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22876
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-04-01 18:15 修改: 2024-03-27 15:47
|
curl-libs |
CVE-2021-22897 |
中危 |
7.59.0-12.ph2 |
7.75.0-3.ph2 |
curl: Cipher settings shared for all connections when using schannel TLS backed
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22897
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47
|
curl-libs |
CVE-2021-22925 |
中危 |
7.59.0-12.ph2 |
7.75.0-4.ph2 |
curl: Incorrect fix for CVE-2021-22898 TELNET stack contents disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22925
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11
|
curl-libs |
CVE-2022-35252 |
低危 |
7.59.0-12.ph2 |
7.83.1-3.ph2 |
curl: Incorrect handling of control code characters in cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00
|
curl |
CVE-2021-22890 |
低危 |
7.59.0-12.ph2 |
7.75.0-1.ph2 |
curl: TLS 1.3 session ticket mix-up with HTTPS proxy host
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22890
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-04-01 18:15 修改: 2024-03-27 15:47
|
curl |
CVE-2021-22898 |
低危 |
7.59.0-12.ph2 |
7.75.0-2.ph2 |
curl: TELNET stack contents disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47
|
libsolv |
CVE-2021-3200 |
低危 |
0.6.26-5.ph2 |
0.6.26-6.ph2 |
libsolv: heap-based buffer overflow in testcase_read() in src/testcase.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3200
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-05-18 17:15 修改: 2022-07-30 03:45
|
curl |
CVE-2021-22924 |
低危 |
7.59.0-12.ph2 |
7.75.0-4.ph2 |
curl: Bad connection reuse due to flawed path name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22924
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11
|
curl |
CVE-2022-35252 |
低危 |
7.59.0-12.ph2 |
7.83.1-3.ph2 |
curl: Incorrect handling of control code characters in cookies
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-35252
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2022-09-23 14:15 修改: 2024-03-27 15:00
|
curl-libs |
CVE-2021-22890 |
低危 |
7.59.0-12.ph2 |
7.75.0-1.ph2 |
curl: TLS 1.3 session ticket mix-up with HTTPS proxy host
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22890
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-04-01 18:15 修改: 2024-03-27 15:47
|
curl-libs |
CVE-2021-22898 |
低危 |
7.59.0-12.ph2 |
7.75.0-2.ph2 |
curl: TELNET stack contents disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47
|
curl-libs |
CVE-2021-22924 |
低危 |
7.59.0-12.ph2 |
7.75.0-4.ph2 |
curl: Bad connection reuse due to flawed path name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22924
镜像层: sha256:23e1126e5547f315a2d6ec321fe61680bcd03fcbfcfaaa50eec3a5b0f3d50c6a
发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11
|