musl |
CVE-2019-14697 |
严重 |
1.1.20-r4 |
1.1.20-r5 |
musl libc through 1.1.23 has an x87 floating-point stack adjustment im ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14697
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2019-08-06 16:15 修改: 2023-03-03 17:43
|
musl-utils |
CVE-2019-14697 |
严重 |
1.1.20-r4 |
1.1.20-r5 |
musl libc through 1.1.23 has an x87 floating-point stack adjustment im ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14697
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2019-08-06 16:15 修改: 2023-03-03 17:43
|
libcrypto1.1 |
CVE-2021-23840 |
高危 |
1.1.1b-r1 |
1.1.1j-r0 |
openssl: integer overflow in CipherUpdate
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23840
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2021-3450 |
高危 |
1.1.1b-r1 |
1.1.1k-r0 |
openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3450
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2021-03-25 15:15 修改: 2023-11-07 03:38
|
libssl1.1 |
CVE-2020-1967 |
高危 |
1.1.1b-r1 |
1.1.1g-r0 |
openssl: Segmentation fault in SSL_check_chain causes denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1967
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2020-04-21 14:15 修改: 2023-11-07 03:19
|
libssl1.1 |
CVE-2021-23840 |
高危 |
1.1.1b-r1 |
1.1.1j-r0 |
openssl: integer overflow in CipherUpdate
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23840
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2021-3450 |
高危 |
1.1.1b-r1 |
1.1.1k-r0 |
openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3450
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2021-03-25 15:15 修改: 2023-11-07 03:38
|
libxml2 |
CVE-2019-19956 |
高危 |
2.9.9-r1 |
2.9.9-r2 |
libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19956
镜像层: sha256:2afcd0d16ff2678b36787c1608d0dcf3ed93d407080f7b2d642c4e3714879fa4
发布日期: 2019-12-24 16:15 修改: 2023-11-07 03:07
|
libxslt |
CVE-2019-18197 |
高危 |
1.1.33-r1 |
1.1.33-r2 |
libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-18197
镜像层: sha256:2afcd0d16ff2678b36787c1608d0dcf3ed93d407080f7b2d642c4e3714879fa4
发布日期: 2019-10-18 21:15 修改: 2020-08-24 17:37
|
icu-libs |
CVE-2020-10531 |
高危 |
62.1-r0 |
62.1-r1 |
ICU: Integer overflow in UnicodeString::doAppend()
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10531
镜像层: sha256:2afcd0d16ff2678b36787c1608d0dcf3ed93d407080f7b2d642c4e3714879fa4
发布日期: 2020-03-12 19:15 修改: 2023-11-07 03:14
|
libcrypto1.1 |
CVE-2020-1967 |
高危 |
1.1.1b-r1 |
1.1.1g-r0 |
openssl: Segmentation fault in SSL_check_chain causes denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1967
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2020-04-21 14:15 修改: 2023-11-07 03:19
|
libgcrypt |
CVE-2019-13627 |
中危 |
1.8.4-r0 |
1.8.5-r0 |
libgcrypt: ECDSA timing attack allowing private key leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13627
镜像层: sha256:2afcd0d16ff2678b36787c1608d0dcf3ed93d407080f7b2d642c4e3714879fa4
发布日期: 2019-09-25 15:15 修改: 2021-07-21 11:39
|
libcrypto1.1 |
CVE-2019-1547 |
中危 |
1.1.1b-r1 |
1.1.1d-r0 |
openssl: side-channel weak encryption vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1547
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2019-09-10 17:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2019-1549 |
中危 |
1.1.1b-r1 |
1.1.1d-r0 |
openssl: information disclosure in fork()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1549
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2019-09-10 17:15 修改: 2023-11-07 03:08
|
libcrypto1.1 |
CVE-2019-1551 |
中危 |
1.1.1b-r1 |
1.1.1d-r2 |
openssl: Integer overflow in RSAZ modular exponentiation on x86_64
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1551
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2019-12-06 18:15 修改: 2023-11-07 03:08
|
libssl1.1 |
CVE-2019-1547 |
中危 |
1.1.1b-r1 |
1.1.1d-r0 |
openssl: side-channel weak encryption vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1547
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2019-09-10 17:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2019-1549 |
中危 |
1.1.1b-r1 |
1.1.1d-r0 |
openssl: information disclosure in fork()
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1549
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2019-09-10 17:15 修改: 2023-11-07 03:08
|
libssl1.1 |
CVE-2019-1551 |
中危 |
1.1.1b-r1 |
1.1.1d-r2 |
openssl: Integer overflow in RSAZ modular exponentiation on x86_64
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1551
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2019-12-06 18:15 修改: 2023-11-07 03:08
|
libssl1.1 |
CVE-2020-1971 |
中危 |
1.1.1b-r1 |
1.1.1i-r0 |
openssl: EDIPARTYNAME NULL pointer de-reference
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1971
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2020-12-08 16:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2021-23841 |
中危 |
1.1.1b-r1 |
1.1.1j-r0 |
openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23841
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libssl1.1 |
CVE-2021-3449 |
中危 |
1.1.1b-r1 |
1.1.1k-r0 |
openssl: NULL pointer dereference in signature_algorithms processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3449
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2021-03-25 15:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2020-1971 |
中危 |
1.1.1b-r1 |
1.1.1i-r0 |
openssl: EDIPARTYNAME NULL pointer de-reference
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-1971
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2020-12-08 16:15 修改: 2024-06-21 19:15
|
libxml2 |
CVE-2020-24977 |
中危 |
2.9.9-r1 |
2.9.9-r3 |
libxml2: Buffer overflow vulnerability in xmlEncodeEntitiesInternal() in entities.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-24977
镜像层: sha256:2afcd0d16ff2678b36787c1608d0dcf3ed93d407080f7b2d642c4e3714879fa4
发布日期: 2020-09-04 00:15 修改: 2023-11-07 03:20
|
libcrypto1.1 |
CVE-2021-23841 |
中危 |
1.1.1b-r1 |
1.1.1j-r0 |
openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23841
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libxslt |
CVE-2019-13117 |
中危 |
1.1.33-r1 |
1.1.33-r3 |
libxslt: an xsl number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13117
镜像层: sha256:2afcd0d16ff2678b36787c1608d0dcf3ed93d407080f7b2d642c4e3714879fa4
发布日期: 2019-07-01 02:15 修改: 2023-11-07 03:03
|
libxslt |
CVE-2019-13118 |
中危 |
1.1.33-r1 |
1.1.33-r3 |
libxslt: read of uninitialized stack data due to too narrow xsl:number instruction and an invalid character
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13118
镜像层: sha256:2afcd0d16ff2678b36787c1608d0dcf3ed93d407080f7b2d642c4e3714879fa4
发布日期: 2019-07-01 02:15 修改: 2023-11-07 03:03
|
libcrypto1.1 |
CVE-2021-3449 |
中危 |
1.1.1b-r1 |
1.1.1k-r0 |
openssl: NULL pointer dereference in signature_algorithms processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3449
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2021-03-25 15:15 修改: 2024-06-21 19:15
|
musl |
CVE-2020-28928 |
中危 |
1.1.20-r4 |
1.1.20-r6 |
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinati ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28928
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2020-11-24 18:15 修改: 2023-11-07 03:21
|
libgcrypt |
CVE-2019-12904 |
中危 |
1.8.4-r0 |
1.8.4-r1 |
Libgcrypt: physical addresses being available to other processes leads to a flush-and-reload side-channel attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-12904
镜像层: sha256:2afcd0d16ff2678b36787c1608d0dcf3ed93d407080f7b2d642c4e3714879fa4
发布日期: 2019-06-20 00:15 修改: 2024-08-05 00:15
|
musl-utils |
CVE-2020-28928 |
中危 |
1.1.20-r4 |
1.1.20-r6 |
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinati ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-28928
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2020-11-24 18:15 修改: 2023-11-07 03:21
|
libcrypto1.1 |
CVE-2019-1563 |
低危 |
1.1.1b-r1 |
1.1.1d-r0 |
openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1563
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2019-09-10 17:15 修改: 2023-11-07 03:08
|
libssl1.1 |
CVE-2019-1563 |
低危 |
1.1.1b-r1 |
1.1.1d-r0 |
openssl: information disclosure in PKCS7_dataDecode and CMS_decrypt_set1_pkey
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-1563
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2019-09-10 17:15 修改: 2023-11-07 03:08
|
libssl1.1 |
CVE-2021-23839 |
低危 |
1.1.1b-r1 |
1.1.1j-r0 |
openssl: incorrect SSLv2 rollback protection
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23839
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|
libcrypto1.1 |
CVE-2021-23839 |
低危 |
1.1.1b-r1 |
1.1.1j-r0 |
openssl: incorrect SSLv2 rollback protection
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-23839
镜像层: sha256:f1b5933fe4b5f49bbe8258745cf396afe07e625bdab3168e364daf7c956b6b81
发布日期: 2021-02-16 17:15 修改: 2024-06-21 19:15
|