| apk-tools | CVE-2021-36159 | 严重 | 2.10.4-r2 | 2.10.7-r0 | libfetch: an out of boundary read while libfetch uses strtol to parse the relevant numbers into address bytes leads to information leak or crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36159 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2021-08-03 14:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | bind-libs | CVE-2021-25216 | 严重 | 9.14.8-r0 | 9.16.15-r0 | bind: Vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25216 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2021-04-29 01:15 修改: 2022-05-03 16:04 | 
                            
                            
                                | bind-tools | CVE-2021-25216 | 严重 | 9.14.8-r0 | 9.16.15-r0 | bind: Vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25216 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2021-04-29 01:15 修改: 2022-05-03 16:04 | 
                            
                            
                                | bind-libs | CVE-2020-8616 | 高危 | 9.14.8-r0 | 9.14.12-r0 | bind: BIND does not sufficiently limit the number of fetches performed when processing referrals 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8616 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-05-19 14:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | bind-libs | CVE-2020-8620 | 高危 | 9.14.8-r0 | 9.16.6-r0 | bind: A specially crafted large TCP payload can trigger an assertion failure in tcpdns.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8620 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-08-21 21:15 修改: 2022-06-02 20:34 | 
                            
                            
                                | bind-libs | CVE-2020-8621 | 高危 | 9.14.8-r0 | 9.16.6-r0 | bind: Attempting QNAME minimization after forwarding can lead to an assertion failure in resolver.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8621 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-08-21 21:15 修改: 2022-04-28 18:27 | 
                            
                            
                                | bind-libs | CVE-2020-8623 | 高危 | 9.14.8-r0 | 9.16.6-r0 | bind: remotely triggerable assertion failure in pk11.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8623 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-08-21 21:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | bind-libs | CVE-2020-8625 | 高危 | 9.14.8-r0 | 9.16.11-r2 | bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8625 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2021-02-17 23:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | bind-libs | CVE-2021-25215 | 高危 | 9.14.8-r0 | 9.16.15-r0 | bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25215 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2021-04-29 01:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | apk-tools | CVE-2021-30139 | 高危 | 2.10.4-r2 | 2.10.6-r0 | 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30139 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2021-04-21 16:15 修改: 2021-04-22 18:21 | 
                            
                            
                                | bind-tools | CVE-2020-8616 | 高危 | 9.14.8-r0 | 9.14.12-r0 | bind: BIND does not sufficiently limit the number of fetches performed when processing referrals 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8616 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-05-19 14:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | bind-tools | CVE-2020-8620 | 高危 | 9.14.8-r0 | 9.16.6-r0 | bind: A specially crafted large TCP payload can trigger an assertion failure in tcpdns.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8620 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-08-21 21:15 修改: 2022-06-02 20:34 | 
                            
                            
                                | bind-tools | CVE-2020-8621 | 高危 | 9.14.8-r0 | 9.16.6-r0 | bind: Attempting QNAME minimization after forwarding can lead to an assertion failure in resolver.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8621 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-08-21 21:15 修改: 2022-04-28 18:27 | 
                            
                            
                                | bind-tools | CVE-2020-8623 | 高危 | 9.14.8-r0 | 9.16.6-r0 | bind: remotely triggerable assertion failure in pk11.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8623 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-08-21 21:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | bind-tools | CVE-2020-8625 | 高危 | 9.14.8-r0 | 9.16.11-r2 | bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8625 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2021-02-17 23:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | bind-tools | CVE-2021-25215 | 高危 | 9.14.8-r0 | 9.16.15-r0 | bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25215 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2021-04-29 01:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | busybox | CVE-2021-28831 | 高危 | 1.30.1-r2 | 1.30.1-r5 | busybox: invalid free or segmentation fault via malformed gzip data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28831 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2021-03-19 05:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | busybox-extras | CVE-2021-28831 | 高危 | 1.30.1-r3 | 1.30.1-r5 | busybox: invalid free or segmentation fault via malformed gzip data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28831 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2021-03-19 05:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | curl | CVE-2020-8169 | 高危 | 7.66.0-r0 | 7.66.0-r1 | libcurl: partial password leak over DNS on HTTP redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8169 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-12-14 20:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | curl | CVE-2020-8177 | 高危 | 7.66.0-r0 | 7.66.0-r1 | curl: Incorrect argument check can allow remote servers to overwrite local files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8177 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-12-14 20:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | curl | CVE-2020-8231 | 高危 | 7.66.0-r0 | 7.66.0-r2 | curl: Expired pointer dereference via multi API with CURLOPT_CONNECT_ONLY option set 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8231 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-12-14 20:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | curl | CVE-2020-8285 | 高危 | 7.66.0-r0 | 7.66.0-r3 | curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8285 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-12-14 20:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | curl | CVE-2020-8286 | 高危 | 7.66.0-r0 | 7.66.0-r3 | curl: Inferior OCSP verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8286 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-12-14 20:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | json-c | CVE-2020-12762 | 高危 | 0.13.1-r0 | 0.13.1-r1 | libfastjson: integer overflow and out-of-bounds write via a large JSON file 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12762 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-05-09 18:15 修改: 2023-11-07 03:15 | 
                            
                            
                                | krb5-libs | CVE-2020-28196 | 高危 | 1.17-r0 | 1.17.2-r0 | krb5: unbounded recursion via an ASN.1-encoded Kerberos message in lib/krb5/asn.1/asn1_encode.c may lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28196 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-11-06 08:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libcrypto1.1 | CVE-2020-1967 | 高危 | 1.1.1d-r0 | 1.1.1g-r0 | openssl: Segmentation fault in SSL_check_chain causes denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1967 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2020-04-21 14:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-23840 | 高危 | 1.1.1d-r0 | 1.1.1j-r0 | openssl: integer overflow in CipherUpdate 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23840 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-3450 | 高危 | 1.1.1d-r0 | 1.1.1k-r0 | openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3450 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2021-03-25 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libcurl | CVE-2020-8169 | 高危 | 7.66.0-r0 | 7.66.0-r1 | libcurl: partial password leak over DNS on HTTP redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8169 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-12-14 20:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | libcurl | CVE-2020-8177 | 高危 | 7.66.0-r0 | 7.66.0-r1 | curl: Incorrect argument check can allow remote servers to overwrite local files 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8177 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-12-14 20:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | libcurl | CVE-2020-8231 | 高危 | 7.66.0-r0 | 7.66.0-r2 | curl: Expired pointer dereference via multi API with CURLOPT_CONNECT_ONLY option set 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8231 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-12-14 20:15 修改: 2024-03-27 16:04 | 
                            
                            
                                | libcurl | CVE-2020-8285 | 高危 | 7.66.0-r0 | 7.66.0-r3 | curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8285 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-12-14 20:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | libcurl | CVE-2020-8286 | 高危 | 7.66.0-r0 | 7.66.0-r3 | curl: Inferior OCSP verification 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8286 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-12-14 20:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | libssl1.1 | CVE-2020-1967 | 高危 | 1.1.1d-r0 | 1.1.1g-r0 | openssl: Segmentation fault in SSL_check_chain causes denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1967 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2020-04-21 14:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | libssl1.1 | CVE-2021-23840 | 高危 | 1.1.1d-r0 | 1.1.1j-r0 | openssl: integer overflow in CipherUpdate 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23840 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2021-3450 | 高危 | 1.1.1d-r0 | 1.1.1k-r0 | openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3450 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2021-03-25 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libxml2 | CVE-2019-19956 | 高危 | 2.9.9-r2 | 2.9.9-r3 | libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19956 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2019-12-24 16:15 修改: 2023-11-07 03:07 | 
                            
                            
                                | libxml2 | CVE-2021-3517 | 高危 | 2.9.9-r2 | 2.9.9-r5 | libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3517 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2021-05-19 14:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libxml2 | CVE-2021-3518 | 高危 | 2.9.9-r2 | 2.9.9-r5 | libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3518 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2021-05-18 12:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | nghttp2-libs | CVE-2020-11080 | 高危 | 1.39.2-r0 | 1.39.2-r1 | nghttp2: overly large SETTINGS frames can lead to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11080 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-06-03 23:15 修改: 2023-11-07 03:14 | 
                            
                            
                                | ssl_client | CVE-2021-28831 | 高危 | 1.30.1-r2 | 1.30.1-r5 | busybox: invalid free or segmentation fault via malformed gzip data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28831 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2021-03-19 05:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | tcpdump | CVE-2020-8037 | 高危 | 4.9.3-r0 | 4.9.3-r1 | tcpdump: ppp decapsulator can be convinced to allocate a large amount of memory 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8037 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-11-04 18:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | libcrypto1.1 | CVE-2020-1971 | 中危 | 1.1.1d-r0 | 1.1.1i-r0 | openssl: EDIPARTYNAME NULL pointer de-reference 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1971 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2020-12-08 16:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-23841 | 中危 | 1.1.1d-r0 | 1.1.1j-r0 | openssl: NULL pointer dereference in X509_issuer_and_serial_hash() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23841 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-3449 | 中危 | 1.1.1d-r0 | 1.1.1k-r0 | openssl: NULL pointer dereference in signature_algorithms processing 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3449 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2021-03-25 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | bind-libs | CVE-2020-8618 | 中危 | 9.14.8-r0 | 9.16.4-r0 | bind: A buffer boundary check assertion in rdataset.c can fail incorrectly during zone transfer 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8618 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-06-17 22:15 修改: 2022-10-07 13:08 | 
                            
                            
                                | bind-libs | CVE-2020-8619 | 中危 | 9.14.8-r0 | 9.16.4-r0 | bind: asterisk character in an empty non-terminal can cause an assertion failure in rbtdb.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8619 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-06-17 22:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | bind-libs | CVE-2020-8622 | 中危 | 9.14.8-r0 | 9.16.6-r0 | bind: truncated TSIG response can lead to an assertion failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8622 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-08-21 21:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | bind-libs | CVE-2020-8624 | 中危 | 9.14.8-r0 | 9.16.6-r0 | bind: incorrect enforcement of update-policy rules of type "subdomain" 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8624 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-08-21 21:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | bind-libs | CVE-2021-25214 | 中危 | 9.14.8-r0 | 9.16.15-r0 | bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25214 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2021-04-29 01:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | bind-libs | CVE-2020-8617 | 中危 | 9.14.8-r0 | 9.14.12-r0 | bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8617 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-05-19 14:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | bind-tools | CVE-2020-8617 | 中危 | 9.14.8-r0 | 9.14.12-r0 | bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8617 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-05-19 14:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | bind-tools | CVE-2020-8618 | 中危 | 9.14.8-r0 | 9.16.4-r0 | bind: A buffer boundary check assertion in rdataset.c can fail incorrectly during zone transfer 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8618 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-06-17 22:15 修改: 2022-10-07 13:08 | 
                            
                            
                                | libssl1.1 | CVE-2019-1551 | 中危 | 1.1.1d-r0 | 1.1.1d-r2 | openssl: Integer overflow in RSAZ modular exponentiation on x86_64 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1551 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2019-12-06 18:15 修改: 2023-11-07 03:08 | 
                            
                            
                                | libssl1.1 | CVE-2020-1971 | 中危 | 1.1.1d-r0 | 1.1.1i-r0 | openssl: EDIPARTYNAME NULL pointer de-reference 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1971 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2020-12-08 16:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2021-23841 | 中危 | 1.1.1d-r0 | 1.1.1j-r0 | openssl: NULL pointer dereference in X509_issuer_and_serial_hash() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23841 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2021-3449 | 中危 | 1.1.1d-r0 | 1.1.1k-r0 | openssl: NULL pointer dereference in signature_algorithms processing 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3449 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2021-03-25 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | bind-tools | CVE-2020-8619 | 中危 | 9.14.8-r0 | 9.16.4-r0 | bind: asterisk character in an empty non-terminal can cause an assertion failure in rbtdb.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8619 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-06-17 22:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | libcom_err | CVE-2019-5188 | 中危 | 1.45.2-r1 | 1.45.5-r0 | e2fsprogs: Out-of-bounds write in e2fsck/rehash.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-5188 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-01-08 16:15 修改: 2023-11-07 03:11 | 
                            
                            
                                | bind-tools | CVE-2020-8622 | 中危 | 9.14.8-r0 | 9.16.6-r0 | bind: truncated TSIG response can lead to an assertion failure 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8622 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-08-21 21:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | libxml2 | CVE-2020-24977 | 中危 | 2.9.9-r2 | 2.9.9-r4 | libxml2: Buffer overflow vulnerability in xmlEncodeEntitiesInternal() in entities.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24977 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-09-04 00:15 修改: 2023-11-07 03:20 | 
                            
                            
                                | libxml2 | CVE-2021-3537 | 中危 | 2.9.9-r2 | 2.9.9-r5 | libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3537 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2021-05-14 20:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | musl | CVE-2020-28928 | 中危 | 1.1.22-r3 | 1.1.22-r4 | In musl libc through 1.2.1, wcsnrtombs mishandles particular combinati ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28928 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2020-11-24 18:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | musl-utils | CVE-2020-28928 | 中危 | 1.1.22-r3 | 1.1.22-r4 | In musl libc through 1.2.1, wcsnrtombs mishandles particular combinati ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28928 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2020-11-24 18:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | bind-tools | CVE-2020-8624 | 中危 | 9.14.8-r0 | 9.16.6-r0 | bind: incorrect enforcement of update-policy rules of type "subdomain" 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8624 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2020-08-21 21:15 修改: 2023-11-07 03:26 | 
                            
                            
                                | bind-tools | CVE-2021-25214 | 中危 | 9.14.8-r0 | 9.16.15-r0 | bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25214 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2021-04-29 01:15 修改: 2023-11-07 03:31 | 
                            
                            
                                | libcrypto1.1 | CVE-2019-1551 | 中危 | 1.1.1d-r0 | 1.1.1d-r2 | openssl: Integer overflow in RSAZ modular exponentiation on x86_64 漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1551 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2019-12-06 18:15 修改: 2023-11-07 03:08 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-23839 | 低危 | 1.1.1d-r0 | 1.1.1j-r0 | openssl: incorrect SSLv2 rollback protection 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23839 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2021-23839 | 低危 | 1.1.1d-r0 | 1.1.1j-r0 | openssl: incorrect SSLv2 rollback protection 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23839 镜像层: sha256:77cae8ab23bf486355d1b3191259705374f4a11d483b24964d2f729dd8c076a0 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | curl | CVE-2021-22898 | 低危 | 7.66.0-r0 | 7.66.0-r4 | curl: TELNET stack contents disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | libcurl | CVE-2021-22898 | 低危 | 7.66.0-r0 | 7.66.0-r4 | curl: TELNET stack contents disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898 镜像层: sha256:d64de5d9767b24aca88a06ce4ac7bcbaea46864bad4f62b0d65d076e92e54aa1 发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47 |