| apk-tools | CVE-2021-36159 | 严重 | 2.10.5-r1 | 2.10.7-r0 | libfetch: an out of boundary read while libfetch uses strtol to parse the relevant numbers into address bytes leads to information leak or crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36159 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-08-03 14:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | curl | CVE-2021-22945 | 严重 | 7.69.1-r3 | 7.79.0-r0 | curl: use-after-free and double-free in MQTT sending 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22945 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-09-23 13:15 修改: 2024-03-27 15:04 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-3711 | 严重 | 1.1.1i-r0 | 1.1.1l-r0 | openssl: SM2 Decryption Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcurl | CVE-2021-22945 | 严重 | 7.69.1-r3 | 7.79.0-r0 | curl: use-after-free and double-free in MQTT sending 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22945 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-09-23 13:15 修改: 2024-03-27 15:04 | 
                            
                            
                                | libssl1.1 | CVE-2021-3711 | 严重 | 1.1.1i-r0 | 1.1.1l-r0 | openssl: SM2 Decryption Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | zlib | CVE-2022-37434 | 严重 | 1.2.11-r3 | 1.2.12-r2 | zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37434 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2022-08-05 07:15 修改: 2023-07-19 00:56 | 
                            
                            
                                | busybox | CVE-2021-42381 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42381 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42382 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42382 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42383 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42383 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42384 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42384 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42385 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42385 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42386 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42386 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2022-28391 | 高危 | 1.31.1-r19 | 1.31.1-r22 | busybox: remote attackers may execute arbitrary code if netstat is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28391 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2022-04-03 21:15 修改: 2022-08-11 18:44 | 
                            
                            
                                | apk-tools | CVE-2021-30139 | 高危 | 2.10.5-r1 | 2.10.6-r0 | 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30139 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-04-21 16:15 修改: 2021-04-22 18:21 | 
                            
                            
                                | curl | CVE-2021-22901 | 高危 | 7.69.1-r3 | 7.77.0-r0 | curl: Use-after-free in TLS session handling when using OpenSSL TLS backend 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22901 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | curl | CVE-2021-22946 | 高危 | 7.69.1-r3 | 7.79.0-r0 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | curl | CVE-2022-22576 | 高危 | 7.69.1-r3 | 7.79.1-r1 | curl: OAUTH2 bearer bypass in connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | curl | CVE-2022-27775 | 高危 | 7.69.1-r3 | 7.79.1-r1 | curl: bad local IPv6 connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27775 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | busybox | CVE-2021-28831 | 高危 | 1.31.1-r19 | 1.31.1-r20 | busybox: invalid free or segmentation fault via malformed gzip data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28831 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-03-19 05:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-23840 | 高危 | 1.1.1i-r0 | 1.1.1j-r0 | openssl: integer overflow in CipherUpdate 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23840 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-3450 | 高危 | 1.1.1i-r0 | 1.1.1k-r0 | openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3450 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-03-25 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-3712 | 高危 | 1.1.1i-r0 | 1.1.1l-r0 | openssl: Read buffer overruns processing ASN.1 strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2022-0778 | 高危 | 1.1.1i-r0 | 1.1.1n-r0 | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | busybox | CVE-2021-42378 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42378 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libcurl | CVE-2021-22901 | 高危 | 7.69.1-r3 | 7.77.0-r0 | curl: Use-after-free in TLS session handling when using OpenSSL TLS backend 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22901 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcurl | CVE-2021-22946 | 高危 | 7.69.1-r3 | 7.79.0-r0 | curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22946 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcurl | CVE-2022-22576 | 高危 | 7.69.1-r3 | 7.79.1-r1 | curl: OAUTH2 bearer bypass in connection re-use 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-22576 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2022-05-26 17:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | libcurl | CVE-2022-27775 | 高危 | 7.69.1-r3 | 7.79.1-r1 | curl: bad local IPv6 connection reuse 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27775 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | busybox | CVE-2021-42379 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42379 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libssl1.1 | CVE-2021-23840 | 高危 | 1.1.1i-r0 | 1.1.1j-r0 | openssl: integer overflow in CipherUpdate 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23840 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2021-3450 | 高危 | 1.1.1i-r0 | 1.1.1k-r0 | openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3450 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-03-25 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libssl1.1 | CVE-2021-3712 | 高危 | 1.1.1i-r0 | 1.1.1l-r0 | openssl: Read buffer overruns processing ASN.1 strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2022-0778 | 高危 | 1.1.1i-r0 | 1.1.1n-r0 | openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0778 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2022-03-15 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | ssl_client | CVE-2021-28831 | 高危 | 1.31.1-r19 | 1.31.1-r20 | busybox: invalid free or segmentation fault via malformed gzip data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28831 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-03-19 05:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | ssl_client | CVE-2021-42378 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42378 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42379 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42379 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42380 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42380 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42381 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42381 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42382 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42382 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42383 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42383 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42384 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42384 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42385 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42385 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42386 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42386 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2022-28391 | 高危 | 1.31.1-r19 | 1.31.1-r22 | busybox: remote attackers may execute arbitrary code if netstat is used 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-28391 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2022-04-03 21:15 修改: 2022-08-11 18:44 | 
                            
                            
                                | busybox | CVE-2021-42380 | 高危 | 1.31.1-r19 | 1.31.1-r21 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42380 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | zlib | CVE-2018-25032 | 高危 | 1.2.11-r3 | 1.2.12-r0 | zlib: A flaw found in zlib when compressing (not decompressing) certain inputs 漏洞详情: https://avd.aquasec.com/nvd/cve-2018-25032 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2022-03-25 09:15 修改: 2023-11-07 02:56 | 
                            
                            
                                | curl | CVE-2021-22923 | 中危 | 7.69.1-r3 | 7.78.0-r0 | curl: Metalink download sends credentials 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22923 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | curl | CVE-2021-22925 | 中危 | 7.69.1-r3 | 7.78.0-r0 | curl: Incorrect fix for CVE-2021-22898 TELNET stack contents disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22925 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-23841 | 中危 | 1.1.1i-r0 | 1.1.1j-r0 | openssl: NULL pointer dereference in X509_issuer_and_serial_hash() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23841 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-3449 | 中危 | 1.1.1i-r0 | 1.1.1k-r0 | openssl: NULL pointer dereference in signature_algorithms processing 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3449 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-03-25 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2021-23841 | 中危 | 1.1.1i-r0 | 1.1.1j-r0 | openssl: NULL pointer dereference in X509_issuer_and_serial_hash() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23841 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2021-3449 | 中危 | 1.1.1i-r0 | 1.1.1k-r0 | openssl: NULL pointer dereference in signature_algorithms processing 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3449 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-03-25 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | curl | CVE-2021-22947 | 中危 | 7.69.1-r3 | 7.79.0-r0 | curl: Server responses received before STARTTLS processed after TLS handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03 | 
                            
                            
                                | curl | CVE-2022-27774 | 中危 | 7.69.1-r3 | 7.79.1-r1 | curl: credential leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | curl | CVE-2022-27776 | 中危 | 7.69.1-r3 | 7.79.1-r1 | curl: auth/cookie leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | busybox | CVE-2021-42374 | 中危 | 1.31.1-r19 | 1.31.1-r21 | busybox: out-of-bounds read in unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42374 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | curl | CVE-2021-22876 | 中危 | 7.69.1-r3 | 7.76.0-r0 | curl: Leak of authentication credentials in URL via automatic Referer 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22876 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-04-01 18:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | libcurl | CVE-2021-22876 | 中危 | 7.69.1-r3 | 7.76.0-r0 | curl: Leak of authentication credentials in URL via automatic Referer 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22876 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-04-01 18:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | libcurl | CVE-2021-22922 | 中危 | 7.69.1-r3 | 7.78.0-r0 | curl: Content not matching hash in Metalink is not being discarded 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22922 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcurl | CVE-2021-22923 | 中危 | 7.69.1-r3 | 7.78.0-r0 | curl: Metalink download sends credentials 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22923 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libcurl | CVE-2021-22925 | 中危 | 7.69.1-r3 | 7.78.0-r0 | curl: Incorrect fix for CVE-2021-22898 TELNET stack contents disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22925 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | libcurl | CVE-2021-22947 | 中危 | 7.69.1-r3 | 7.79.0-r0 | curl: Server responses received before STARTTLS processed after TLS handshake 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22947 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-09-29 20:15 修改: 2024-03-27 15:03 | 
                            
                            
                                | libcurl | CVE-2022-27774 | 中危 | 7.69.1-r3 | 7.79.1-r1 | curl: credential leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27774 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | ssl_client | CVE-2021-42374 | 中危 | 1.31.1-r19 | 1.31.1-r21 | busybox: out-of-bounds read in unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42374 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libcurl | CVE-2022-27776 | 中危 | 7.69.1-r3 | 7.79.1-r1 | curl: auth/cookie leak on redirect 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27776 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2022-06-02 14:15 修改: 2024-03-27 15:02 | 
                            
                            
                                | curl | CVE-2021-22922 | 中危 | 7.69.1-r3 | 7.78.0-r0 | curl: Content not matching hash in Metalink is not being discarded 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22922 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:12 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-23839 | 低危 | 1.1.1i-r0 | 1.1.1j-r0 | openssl: incorrect SSLv2 rollback protection 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23839 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | curl | CVE-2021-22924 | 低危 | 7.69.1-r3 | 7.78.0-r0 | curl: Bad connection reuse due to flawed path name checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22924 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | curl | CVE-2020-8284 | 低危 | 7.69.1-r3 | 7.74.0-r0 | curl: FTP PASV command response can cause curl to connect to arbitrary host 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8284 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2020-12-14 20:15 修改: 2024-04-08 22:50 | 
                            
                            
                                | libcurl | CVE-2020-8284 | 低危 | 7.69.1-r3 | 7.74.0-r0 | curl: FTP PASV command response can cause curl to connect to arbitrary host 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-8284 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2020-12-14 20:15 修改: 2024-04-08 22:50 | 
                            
                            
                                | libcurl | CVE-2021-22890 | 低危 | 7.69.1-r3 | 7.76.0-r0 | curl: TLS 1.3 session ticket mix-up with HTTPS proxy host 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22890 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-04-01 18:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | libssl1.1 | CVE-2021-23839 | 低危 | 1.1.1i-r0 | 1.1.1j-r0 | openssl: incorrect SSLv2 rollback protection 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23839 镜像层: sha256:777b2c648970480f50f5b4d0af8f9a8ea798eea43dbcf40ce4a8c7118736bdcf 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcurl | CVE-2021-22898 | 低危 | 7.69.1-r3 | 7.77.0-r0 | curl: TELNET stack contents disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | libcurl | CVE-2021-22924 | 低危 | 7.69.1-r3 | 7.78.0-r0 | curl: Bad connection reuse due to flawed path name checks 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22924 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-08-05 21:15 修改: 2024-03-27 15:11 | 
                            
                            
                                | curl | CVE-2021-22890 | 低危 | 7.69.1-r3 | 7.76.0-r0 | curl: TLS 1.3 session ticket mix-up with HTTPS proxy host 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22890 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-04-01 18:15 修改: 2024-03-27 15:47 | 
                            
                            
                                | curl | CVE-2021-22898 | 低危 | 7.69.1-r3 | 7.77.0-r0 | curl: TELNET stack contents disclosure 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-22898 镜像层: sha256:6cac81ec4bd80ef5e6913a5fed62cf4fa82b5c158c0b40cce7e77a587d2ee64e 发布日期: 2021-06-11 16:15 修改: 2024-03-27 15:47 |