apk-tools |
CVE-2021-36159 |
严重 |
2.10.4-r2 |
2.10.7-r0 |
libfetch: an out of boundary read while libfetch uses strtol to parse the relevant numbers into address bytes leads to information leak or crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36159
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2021-08-03 14:15 修改: 2023-11-07 03:36
|
bind-libs |
CVE-2021-25216 |
严重 |
9.14.8-r0 |
9.16.15-r0 |
bind: Vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25216
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2021-04-29 01:15 修改: 2022-05-03 16:04
|
bind-tools |
CVE-2021-25216 |
严重 |
9.14.8-r0 |
9.16.15-r0 |
bind: Vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25216
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2021-04-29 01:15 修改: 2022-05-03 16:04
|
bind-libs |
CVE-2020-8616 |
高危 |
9.14.8-r0 |
9.14.12-r0 |
bind: BIND does not sufficiently limit the number of fetches performed when processing referrals
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8616
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-05-19 14:15 修改: 2023-11-07 03:26
|
bind-libs |
CVE-2020-8620 |
高危 |
9.14.8-r0 |
9.16.6-r0 |
bind: A specially crafted large TCP payload can trigger an assertion failure in tcpdns.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8620
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-08-21 21:15 修改: 2022-06-02 20:34
|
bind-libs |
CVE-2020-8621 |
高危 |
9.14.8-r0 |
9.16.6-r0 |
bind: Attempting QNAME minimization after forwarding can lead to an assertion failure in resolver.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8621
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-08-21 21:15 修改: 2022-04-28 18:27
|
bind-libs |
CVE-2020-8623 |
高危 |
9.14.8-r0 |
9.16.6-r0 |
bind: remotely triggerable assertion failure in pk11.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8623
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-08-21 21:15 修改: 2023-11-07 03:26
|
bind-libs |
CVE-2020-8625 |
高危 |
9.14.8-r0 |
9.16.11-r2 |
bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8625
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2021-02-17 23:15 修改: 2023-11-07 03:26
|
bind-libs |
CVE-2021-25215 |
高危 |
9.14.8-r0 |
9.16.15-r0 |
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25215
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2021-04-29 01:15 修改: 2023-11-07 03:31
|
apk-tools |
CVE-2021-30139 |
高危 |
2.10.4-r2 |
2.10.6-r0 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30139
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2021-04-21 16:15 修改: 2021-04-22 18:21
|
bind-tools |
CVE-2020-8616 |
高危 |
9.14.8-r0 |
9.14.12-r0 |
bind: BIND does not sufficiently limit the number of fetches performed when processing referrals
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8616
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-05-19 14:15 修改: 2023-11-07 03:26
|
bind-tools |
CVE-2020-8620 |
高危 |
9.14.8-r0 |
9.16.6-r0 |
bind: A specially crafted large TCP payload can trigger an assertion failure in tcpdns.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8620
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-08-21 21:15 修改: 2022-06-02 20:34
|
bind-tools |
CVE-2020-8621 |
高危 |
9.14.8-r0 |
9.16.6-r0 |
bind: Attempting QNAME minimization after forwarding can lead to an assertion failure in resolver.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8621
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-08-21 21:15 修改: 2022-04-28 18:27
|
bind-tools |
CVE-2020-8623 |
高危 |
9.14.8-r0 |
9.16.6-r0 |
bind: remotely triggerable assertion failure in pk11.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8623
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-08-21 21:15 修改: 2023-11-07 03:26
|
bind-tools |
CVE-2020-8625 |
高危 |
9.14.8-r0 |
9.16.11-r2 |
bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8625
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2021-02-17 23:15 修改: 2023-11-07 03:26
|
bind-tools |
CVE-2021-25215 |
高危 |
9.14.8-r0 |
9.16.15-r0 |
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25215
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2021-04-29 01:15 修改: 2023-11-07 03:31
|
busybox |
CVE-2021-28831 |
高危 |
1.30.1-r2 |
1.30.1-r5 |
busybox: invalid free or segmentation fault via malformed gzip data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28831
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2021-03-19 05:15 修改: 2023-11-07 03:32
|
busybox-extras |
CVE-2021-28831 |
高危 |
1.30.1-r3 |
1.30.1-r5 |
busybox: invalid free or segmentation fault via malformed gzip data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28831
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2021-03-19 05:15 修改: 2023-11-07 03:32
|
curl |
CVE-2020-8169 |
高危 |
7.66.0-r0 |
7.66.0-r1 |
libcurl: partial password leak over DNS on HTTP redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8169
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-12-14 20:15 修改: 2024-03-27 16:04
|
curl |
CVE-2020-8177 |
高危 |
7.66.0-r0 |
7.66.0-r1 |
curl: Incorrect argument check can allow remote servers to overwrite local files
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8177
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-12-14 20:15 修改: 2024-03-27 16:04
|
curl |
CVE-2020-8231 |
高危 |
7.66.0-r0 |
7.66.0-r2 |
curl: Expired pointer dereference via multi API with CURLOPT_CONNECT_ONLY option set
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8231
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-12-14 20:15 修改: 2024-03-27 16:04
|
curl |
CVE-2020-8285 |
高危 |
7.66.0-r0 |
7.66.0-r3 |
curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8285
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-12-14 20:15 修改: 2024-03-27 15:47
|
curl |
CVE-2020-8286 |
高危 |
7.66.0-r0 |
7.66.0-r3 |
curl: Inferior OCSP verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8286
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-12-14 20:15 修改: 2024-03-27 15:47
|
json-c |
CVE-2020-12762 |
高危 |
0.13.1-r0 |
0.13.1-r1 |
libfastjson: integer overflow and out-of-bounds write via a large JSON file
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12762
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-05-09 18:15 修改: 2023-11-07 03:15
|
krb5-libs |
CVE-2020-28196 |
高危 |
1.17-r0 |
1.17.2-r0 |
krb5: unbounded recursion via an ASN.1-encoded Kerberos message in lib/krb5/asn.1/asn1_encode.c may lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28196
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-11-06 08:15 修改: 2023-11-07 03:21
|
libcrypto1.1 |
CVE-2020-1967 |
高危 |
1.1.1d-r0 |
1.1.1g-r0 |
openssl: Segmentation fault in SSL_check_chain causes denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1967
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2020-04-21 14:15 修改: 2023-11-07 03:19
|
libcrypto1.1 |
CVE-2021-23840 |
高危 |
1.1.1d-r0 |
1.1.1j-r0 |
openssl: integer overflow in CipherUpdate
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23840
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2021-3450 |
高危 |
1.1.1d-r0 |
1.1.1k-r0 |
openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3450
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2021-03-25 15:15 修改: 2023-11-07 03:38
|
libcurl |
CVE-2020-8169 |
高危 |
7.66.0-r0 |
7.66.0-r1 |
libcurl: partial password leak over DNS on HTTP redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8169
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-12-14 20:15 修改: 2024-03-27 16:04
|
libcurl |
CVE-2020-8177 |
高危 |
7.66.0-r0 |
7.66.0-r1 |
curl: Incorrect argument check can allow remote servers to overwrite local files
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8177
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-12-14 20:15 修改: 2024-03-27 16:04
|
libcurl |
CVE-2020-8231 |
高危 |
7.66.0-r0 |
7.66.0-r2 |
curl: Expired pointer dereference via multi API with CURLOPT_CONNECT_ONLY option set
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8231
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-12-14 20:15 修改: 2024-03-27 16:04
|
libcurl |
CVE-2020-8285 |
高危 |
7.66.0-r0 |
7.66.0-r3 |
curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8285
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-12-14 20:15 修改: 2024-03-27 15:47
|
libcurl |
CVE-2020-8286 |
高危 |
7.66.0-r0 |
7.66.0-r3 |
curl: Inferior OCSP verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8286
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-12-14 20:15 修改: 2024-03-27 15:47
|
libssl1.1 |
CVE-2020-1967 |
高危 |
1.1.1d-r0 |
1.1.1g-r0 |
openssl: Segmentation fault in SSL_check_chain causes denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1967
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2020-04-21 14:15 修改: 2023-11-07 03:19
|
libssl1.1 |
CVE-2021-23840 |
高危 |
1.1.1d-r0 |
1.1.1j-r0 |
openssl: integer overflow in CipherUpdate
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23840
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2021-3450 |
高危 |
1.1.1d-r0 |
1.1.1k-r0 |
openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3450
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2021-03-25 15:15 修改: 2023-11-07 03:38
|
libxml2 |
CVE-2019-19956 |
高危 |
2.9.9-r2 |
2.9.9-r3 |
libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19956
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2019-12-24 16:15 修改: 2023-11-07 03:07
|
libxml2 |
CVE-2021-3517 |
高危 |
2.9.9-r2 |
2.9.9-r5 |
libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3517
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2021-05-19 14:15 修改: 2023-11-07 03:38
|
libxml2 |
CVE-2021-3518 |
高危 |
2.9.9-r2 |
2.9.9-r5 |
libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3518
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2021-05-18 12:15 修改: 2023-11-07 03:38
|
nghttp2-libs |
CVE-2020-11080 |
高危 |
1.39.2-r0 |
1.39.2-r1 |
nghttp2: overly large SETTINGS frames can lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11080
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-06-03 23:15 修改: 2023-11-07 03:14
|
ssl_client |
CVE-2021-28831 |
高危 |
1.30.1-r2 |
1.30.1-r5 |
busybox: invalid free or segmentation fault via malformed gzip data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28831
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2021-03-19 05:15 修改: 2023-11-07 03:32
|
tcpdump |
CVE-2020-8037 |
高危 |
4.9.3-r0 |
4.9.3-r1 |
tcpdump: ppp decapsulator can be convinced to allocate a large amount of memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8037
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-11-04 18:15 修改: 2023-11-07 03:26
|
libcrypto1.1 |
CVE-2020-1971 |
中危 |
1.1.1d-r0 |
1.1.1i-r0 |
openssl: EDIPARTYNAME NULL pointer de-reference
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1971
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2020-12-08 16:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2021-23841 |
中危 |
1.1.1d-r0 |
1.1.1j-r0 |
openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23841
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2021-3449 |
中危 |
1.1.1d-r0 |
1.1.1k-r0 |
openssl: NULL pointer dereference in signature_algorithms processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3449
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2021-03-25 15:15 修改: 2024-06-21 19:15
|
bind-libs |
CVE-2020-8618 |
中危 |
9.14.8-r0 |
9.16.4-r0 |
bind: A buffer boundary check assertion in rdataset.c can fail incorrectly during zone transfer
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8618
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-06-17 22:15 修改: 2022-10-07 13:08
|
bind-libs |
CVE-2020-8619 |
中危 |
9.14.8-r0 |
9.16.4-r0 |
bind: asterisk character in an empty non-terminal can cause an assertion failure in rbtdb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8619
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-06-17 22:15 修改: 2023-11-07 03:26
|
bind-libs |
CVE-2020-8622 |
中危 |
9.14.8-r0 |
9.16.6-r0 |
bind: truncated TSIG response can lead to an assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8622
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-08-21 21:15 修改: 2023-11-07 03:26
|
bind-libs |
CVE-2020-8624 |
中危 |
9.14.8-r0 |
9.16.6-r0 |
bind: incorrect enforcement of update-policy rules of type "subdomain"
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8624
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-08-21 21:15 修改: 2023-11-07 03:26
|
bind-libs |
CVE-2021-25214 |
中危 |
9.14.8-r0 |
9.16.15-r0 |
bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25214
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2021-04-29 01:15 修改: 2023-11-07 03:31
|
bind-libs |
CVE-2020-8617 |
中危 |
9.14.8-r0 |
9.14.12-r0 |
bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8617
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-05-19 14:15 修改: 2023-11-07 03:26
|
bind-tools |
CVE-2020-8617 |
中危 |
9.14.8-r0 |
9.14.12-r0 |
bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8617
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-05-19 14:15 修改: 2023-11-07 03:26
|
bind-tools |
CVE-2020-8618 |
中危 |
9.14.8-r0 |
9.16.4-r0 |
bind: A buffer boundary check assertion in rdataset.c can fail incorrectly during zone transfer
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8618
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-06-17 22:15 修改: 2022-10-07 13:08
|
libssl1.1 |
CVE-2019-1551 |
中危 |
1.1.1d-r0 |
1.1.1d-r2 |
openssl: Integer overflow in RSAZ modular exponentiation on x86_64
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1551
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2019-12-06 18:15 修改: 2023-11-07 03:08
|
libssl1.1 |
CVE-2020-1971 |
中危 |
1.1.1d-r0 |
1.1.1i-r0 |
openssl: EDIPARTYNAME NULL pointer de-reference
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1971
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2020-12-08 16:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2021-23841 |
中危 |
1.1.1d-r0 |
1.1.1j-r0 |
openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23841
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2021-3449 |
中危 |
1.1.1d-r0 |
1.1.1k-r0 |
openssl: NULL pointer dereference in signature_algorithms processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3449
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2021-03-25 15:15 修改: 2024-06-21 19:15
|
bind-tools |
CVE-2020-8619 |
中危 |
9.14.8-r0 |
9.16.4-r0 |
bind: asterisk character in an empty non-terminal can cause an assertion failure in rbtdb.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8619
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-06-17 22:15 修改: 2023-11-07 03:26
|
libcom_err |
CVE-2019-5188 |
中危 |
1.45.2-r1 |
1.45.5-r0 |
e2fsprogs: Out-of-bounds write in e2fsck/rehash.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5188
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-01-08 16:15 修改: 2023-11-07 03:11
|
bind-tools |
CVE-2020-8622 |
中危 |
9.14.8-r0 |
9.16.6-r0 |
bind: truncated TSIG response can lead to an assertion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8622
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-08-21 21:15 修改: 2023-11-07 03:26
|
libxml2 |
CVE-2020-24977 |
中危 |
2.9.9-r2 |
2.9.9-r4 |
libxml2: Buffer overflow vulnerability in xmlEncodeEntitiesInternal() in entities.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24977
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-09-04 00:15 修改: 2023-11-07 03:20
|
libxml2 |
CVE-2021-3537 |
中危 |
2.9.9-r2 |
2.9.9-r5 |
libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3537
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2021-05-14 20:15 修改: 2023-11-07 03:38
|
musl |
CVE-2020-28928 |
中危 |
1.1.22-r3 |
1.1.22-r4 |
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinati ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28928
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2020-11-24 18:15 修改: 2023-11-07 03:21
|
musl-utils |
CVE-2020-28928 |
中危 |
1.1.22-r3 |
1.1.22-r4 |
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinati ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28928
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2020-11-24 18:15 修改: 2023-11-07 03:21
|
bind-tools |
CVE-2020-8624 |
中危 |
9.14.8-r0 |
9.16.6-r0 |
bind: incorrect enforcement of update-policy rules of type "subdomain"
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8624
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2020-08-21 21:15 修改: 2023-11-07 03:26
|
bind-tools |
CVE-2021-25214 |
中危 |
9.14.8-r0 |
9.16.15-r0 |
bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25214
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2021-04-29 01:15 修改: 2023-11-07 03:31
|
libcrypto1.1 |
CVE-2019-1551 |
中危 |
1.1.1d-r0 |
1.1.1d-r2 |
openssl: Integer overflow in RSAZ modular exponentiation on x86_64
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1551
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2019-12-06 18:15 修改: 2023-11-07 03:08
|
libcrypto1.1 |
CVE-2021-23839 |
低危 |
1.1.1d-r0 |
1.1.1j-r0 |
openssl: incorrect SSLv2 rollback protection
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23839
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2021-23839 |
低危 |
1.1.1d-r0 |
1.1.1j-r0 |
openssl: incorrect SSLv2 rollback protection
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23839
镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
curl |
CVE-2021-22898 |
低危 |
7.66.0-r0 |
7.66.0-r4 |
curl: TELNET stack contents disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47
|
libcurl |
CVE-2021-22898 |
低危 |
7.66.0-r0 |
7.66.0-r4 |
curl: TELNET stack contents disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898
镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1
发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47
|