apk-tools |
CVE-2021-36159 |
严重 |
2.10.4-r2 |
2.10.7-r0 |
libfetch: an out of boundary read while libfetch uses strtol to parse the relevant numbers into address bytes leads to information leak or crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-36159
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2021-08-03 14:15 修改: 2023-11-07 03:36
|
apk-tools |
CVE-2021-30139 |
高危 |
2.10.4-r2 |
2.10.6-r0 |
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30139
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2021-04-21 16:15 修改: 2021-04-22 18:21
|
busybox |
CVE-2021-28831 |
高危 |
1.30.1-r3 |
1.30.1-r5 |
busybox: invalid free or segmentation fault via malformed gzip data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28831
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2021-03-19 05:15 修改: 2023-11-07 03:32
|
krb5-libs |
CVE-2020-28196 |
高危 |
1.17-r0 |
1.17.2-r0 |
krb5: unbounded recursion via an ASN.1-encoded Kerberos message in lib/krb5/asn.1/asn1_encode.c may lead to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28196
镜像层: sha256:e1c1f46b85cc05d2ca7a9f9cd0fcc863f796332abcb561fd6c35f39fc6cc4072
发布日期: 2020-11-06 08:15 修改: 2023-11-07 03:21
|
libcrypto1.1 |
CVE-2021-23840 |
高危 |
1.1.1g-r0 |
1.1.1j-r0 |
openssl: integer overflow in CipherUpdate
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23840
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2021-3450 |
高危 |
1.1.1g-r0 |
1.1.1k-r0 |
openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3450
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2021-03-25 15:15 修改: 2023-11-07 03:38
|
libssl1.1 |
CVE-2021-23840 |
高危 |
1.1.1g-r0 |
1.1.1j-r0 |
openssl: integer overflow in CipherUpdate
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23840
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2021-3450 |
高危 |
1.1.1g-r0 |
1.1.1k-r0 |
openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3450
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2021-03-25 15:15 修改: 2023-11-07 03:38
|
ssl_client |
CVE-2021-28831 |
高危 |
1.30.1-r3 |
1.30.1-r5 |
busybox: invalid free or segmentation fault via malformed gzip data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28831
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2021-03-19 05:15 修改: 2023-11-07 03:32
|
libcrypto1.1 |
CVE-2021-3449 |
中危 |
1.1.1g-r0 |
1.1.1k-r0 |
openssl: NULL pointer dereference in signature_algorithms processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3449
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2021-03-25 15:15 修改: 2024-06-21 19:15
|
binutils |
CVE-2021-3487 |
中危 |
2.32-r1 |
2.33.1-r1 |
binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3487
镜像层: sha256:0b769f8830c114163f2ceafc3781fb5eb864d83c595e3ff1d47f783a416a8ed9
发布日期: 2021-04-15 14:15 修改: 2023-11-20 05:15
|
libcrypto1.1 |
CVE-2020-1971 |
中危 |
1.1.1g-r0 |
1.1.1i-r0 |
openssl: EDIPARTYNAME NULL pointer de-reference
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1971
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2020-12-08 16:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2020-1971 |
中危 |
1.1.1g-r0 |
1.1.1i-r0 |
openssl: EDIPARTYNAME NULL pointer de-reference
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1971
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2020-12-08 16:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2021-23841 |
中危 |
1.1.1g-r0 |
1.1.1j-r0 |
openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23841
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2021-3449 |
中危 |
1.1.1g-r0 |
1.1.1k-r0 |
openssl: NULL pointer dereference in signature_algorithms processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3449
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2021-03-25 15:15 修改: 2024-06-21 19:15
|
musl-utils |
CVE-2020-28928 |
中危 |
1.1.22-r3 |
1.1.22-r4 |
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinati ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28928
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2020-11-24 18:15 修改: 2023-11-07 03:21
|
libcrypto1.1 |
CVE-2021-23841 |
中危 |
1.1.1g-r0 |
1.1.1j-r0 |
openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23841
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2021-23839 |
低危 |
1.1.1g-r0 |
1.1.1j-r0 |
openssl: incorrect SSLv2 rollback protection
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23839
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2021-23839 |
低危 |
1.1.1g-r0 |
1.1.1j-r0 |
openssl: incorrect SSLv2 rollback protection
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23839
镜像层: sha256:1b3ee35aacca9866b01dd96e870136266bde18006ac2f0d6eb706c798d1fa3c3
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|