| apk-tools | CVE-2021-36159 | 严重 | 2.10.4-r3 | 2.10.7-r0 | libfetch: an out of boundary read while libfetch uses strtol to parse the relevant numbers into address bytes leads to information leak or crash 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36159 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-08-03 14:15 修改: 2023-11-07 03:36 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-3711 | 严重 | 1.1.1d-r3 | 1.1.1l-r0 | openssl: SM2 Decryption Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2021-3711 | 严重 | 1.1.1d-r3 | 1.1.1l-r0 | openssl: SM2 Decryption Buffer Overflow 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3711 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | python3 | CVE-2021-3177 | 严重 | 3.8.2-r0 | 3.8.2-r2 | python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3177 镜像层: sha256:c4ab1acc66b90312daf2a617bb7c37fdd976119d285411eead7282bd19cfaeba 发布日期: 2021-01-19 06:15 修改: 2023-11-07 03:37 | 
                            
                            
                                | zlib | CVE-2022-37434 | 严重 | 1.2.11-r3 | 1.2.11-r4 | zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field 漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37434 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2022-08-05 07:15 修改: 2023-07-19 00:56 | 
                            
                            
                                | busybox | CVE-2021-42380 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42380 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42381 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42381 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42382 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42382 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42383 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42383 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42384 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42384 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42385 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42385 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42386 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42386 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | apk-tools | CVE-2021-30139 | 高危 | 2.10.4-r3 | 2.10.6-r0 | 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30139 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-04-21 16:15 修改: 2021-04-22 18:21 | 
                            
                            
                                | libcrypto1.1 | CVE-2020-1967 | 高危 | 1.1.1d-r3 | 1.1.1g-r0 | openssl: Segmentation fault in SSL_check_chain causes denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1967 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2020-04-21 14:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-23840 | 高危 | 1.1.1d-r3 | 1.1.1j-r0 | openssl: integer overflow in CipherUpdate 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23840 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-3450 | 高危 | 1.1.1d-r3 | 1.1.1k-r0 | openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3450 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-03-25 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-3712 | 高危 | 1.1.1d-r3 | 1.1.1l-r0 | openssl: Read buffer overruns processing ASN.1 strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | busybox | CVE-2021-28831 | 高危 | 1.31.1-r9 | 1.31.1-r10 | busybox: invalid free or segmentation fault via malformed gzip data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28831 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-03-19 05:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | libssl1.1 | CVE-2020-1967 | 高危 | 1.1.1d-r3 | 1.1.1g-r0 | openssl: Segmentation fault in SSL_check_chain causes denial of service 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1967 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2020-04-21 14:15 修改: 2023-11-07 03:19 | 
                            
                            
                                | libssl1.1 | CVE-2021-23840 | 高危 | 1.1.1d-r3 | 1.1.1j-r0 | openssl: integer overflow in CipherUpdate 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23840 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2021-3450 | 高危 | 1.1.1d-r3 | 1.1.1k-r0 | openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3450 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-03-25 15:15 修改: 2023-11-07 03:38 | 
                            
                            
                                | libssl1.1 | CVE-2021-3712 | 高危 | 1.1.1d-r3 | 1.1.1l-r0 | openssl: Read buffer overruns processing ASN.1 strings 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3712 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-08-24 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | busybox | CVE-2021-42378 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42378 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | sqlite-libs | CVE-2020-11655 | 高危 | 3.30.1-r1 | 3.30.1-r2 | sqlite: malformed window-function query leads to DoS 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-11655 镜像层: sha256:c4ab1acc66b90312daf2a617bb7c37fdd976119d285411eead7282bd19cfaeba 发布日期: 2020-04-09 03:15 修改: 2022-04-08 10:34 | 
                            
                            
                                | ssl_client | CVE-2021-28831 | 高危 | 1.31.1-r9 | 1.31.1-r10 | busybox: invalid free or segmentation fault via malformed gzip data 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28831 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-03-19 05:15 修改: 2023-11-07 03:32 | 
                            
                            
                                | ssl_client | CVE-2021-42378 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42378 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42379 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42379 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42380 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42380 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42381 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42381 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42382 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42382 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42383 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42383 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42384 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42384 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42385 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42385 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | ssl_client | CVE-2021-42386 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42386 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42379 | 高危 | 1.31.1-r9 | 1.31.1-r11 | busybox: use-after-free in awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42379 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | busybox | CVE-2021-42374 | 中危 | 1.31.1-r9 | 1.31.1-r11 | busybox: out-of-bounds read in unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42374 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libssl1.1 | CVE-2020-1971 | 中危 | 1.1.1d-r3 | 1.1.1i-r0 | openssl: EDIPARTYNAME NULL pointer de-reference 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1971 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2020-12-08 16:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2021-23841 | 中危 | 1.1.1d-r3 | 1.1.1j-r0 | openssl: NULL pointer dereference in X509_issuer_and_serial_hash() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23841 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2021-3449 | 中危 | 1.1.1d-r3 | 1.1.1k-r0 | openssl: NULL pointer dereference in signature_algorithms processing 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3449 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-03-25 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | musl | CVE-2020-28928 | 中危 | 1.1.24-r0 | 1.1.24-r3 | In musl libc through 1.2.1, wcsnrtombs mishandles particular combinati ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28928 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2020-11-24 18:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | musl-utils | CVE-2020-28928 | 中危 | 1.1.24-r0 | 1.1.24-r3 | In musl libc through 1.2.1, wcsnrtombs mishandles particular combinati ... 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28928 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2020-11-24 18:15 修改: 2023-11-07 03:21 | 
                            
                            
                                | libcrypto1.1 | CVE-2020-1971 | 中危 | 1.1.1d-r3 | 1.1.1i-r0 | openssl: EDIPARTYNAME NULL pointer de-reference 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1971 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2020-12-08 16:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | python3 | CVE-2020-14422 | 中危 | 3.8.2-r0 | 3.8.2-r1 | python: DoS via inefficiency in IPv{4,6}Interface classes 漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14422 镜像层: sha256:c4ab1acc66b90312daf2a617bb7c37fdd976119d285411eead7282bd19cfaeba 发布日期: 2020-06-18 14:15 修改: 2023-11-07 03:17 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-23841 | 中危 | 1.1.1d-r3 | 1.1.1j-r0 | openssl: NULL pointer dereference in X509_issuer_and_serial_hash() 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23841 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | ssl_client | CVE-2021-42374 | 中危 | 1.31.1-r9 | 1.31.1-r11 | busybox: out-of-bounds read in unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42374 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-11-15 21:15 修改: 2023-11-07 03:39 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-3449 | 中危 | 1.1.1d-r3 | 1.1.1k-r0 | openssl: NULL pointer dereference in signature_algorithms processing 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3449 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-03-25 15:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libssl1.1 | CVE-2021-23839 | 低危 | 1.1.1d-r3 | 1.1.1j-r0 | openssl: incorrect SSLv2 rollback protection 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23839 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 | 
                            
                            
                                | libcrypto1.1 | CVE-2021-23839 | 低危 | 1.1.1d-r3 | 1.1.1j-r0 | openssl: incorrect SSLv2 rollback protection 漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23839 镜像层: sha256:5216338b40a7b96416b8b9858974bbe4acc3096ee60acbc4dfb1ee02aecceb10 发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15 |