| CVE-2022-22825 |
lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. |
Important |
expat |
否 |
完成修复 |
2022-03-17 |
2026-01-09 |
| CVE-2022-22824 |
defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. |
Important |
expat |
否 |
完成修复 |
2022-03-17 |
2026-01-09 |
| CVE-2022-22823 |
build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. |
Important |
expat |
否 |
完成修复 |
2022-03-17 |
2026-01-09 |
| CVE-2022-22822 |
addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. |
Important |
expat |
否 |
完成修复 |
2022-03-17 |
2026-01-09 |
| CVE-2021-23632 |
All versions of package git are vulnerable to Remote Code Execution (RCE) due to missing sanitization in the Git.git method, which allows execution of OS commands rather than just git commands. Steps to Reproduce 1. Create a file named exploit.js with the following content: js var Git = require("git").Git; var repo = new Git("repo-test"); var user_input = "version; date"; repo.git(user_input, function(err, result) { console.log(result); }) 2. In the same directory as exploit.js, run npm install git. 3. Run exploit.js: node exploit.js. You should see the outputs of both the git version and date command-lines. Note that the repo-test Git repository does not need to be present to make this PoC work. |
Critical |
git |
否 |
完成修复 |
2022-03-17 |
2025-12-29 |
| CVE-2021-39711 |
In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel |
Low |
kernel |
是 |
完成修复 |
2022-03-16 |
2026-01-23 |
| CVE-2021-39275 |
ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier. |
Important |
httpd:2.4, httpd |
否 |
完成修复 |
2022-03-15 |
2026-01-09 |
| CVE-2021-34798 |
Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier. |
Important |
httpd:2.4, httpd |
否 |
完成修复 |
2022-03-15 |
2026-01-09 |
| CVE-2022-26981 |
Liblouis through 3.21.0 has a buffer overflow in compilePassOpcode in compileTranslationTable.c (called, indirectly, by tools/lou_checktable.c). |
Important |
liblouis |
否 |
完成修复 |
2022-03-13 |
2026-01-06 |
| CVE-2022-25315 |
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames. |
Important |
cmake, expat, thunderbird, firefox, mingw-expat |
否 |
完成修复 |
2022-03-11 |
2026-01-04 |
| CVE-2022-25236 |
xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs. |
Important |
firefox, expat, mingw-expat, thunderbird |
否 |
完成修复 |
2022-03-11 |
2026-01-09 |
| CVE-2022-25235 |
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context. |
Important |
xmlrpc-c, expat, thunderbird, firefox, mingw-expat |
否 |
完成修复 |
2022-03-11 |
2026-01-08 |
| CVE-2021-39715 |
In __show_regs of process.c, there is a possible leak of kernel memory and addresses due to log information disclosure. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-178379135References: Upstream kernel |
Moderate |
kernel |
否 |
完成修复 |
2022-03-07 |
2025-12-23 |
| CVE-2022-24921 |
regexp.Compile in Go before 1.16.15 and 1.17.x before 1.17.8 allows stack exhaustion via a deeply nested expression. |
Moderate |
golang, go-toolset:an8 |
是 |
完成修复 |
2022-03-05 |
2025-12-17 |
| CVE-2022-24724 |
cmark-gfm is GitHub's extended version of the C reference implementation of CommonMark. Prior to versions 0.29.0.gfm.3 and 0.28.3.gfm.21, an integer overflow in cmark-gfm's table row parsing `table.c:row_from_string` may lead to heap memory corruption when parsing tables who's marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution depending on how and where `cmark-gfm` is used. If `cmark-gfm` is used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE) in applications employing affected versions of the `cmark-gfm` library. This vulnerability has been patched in the following cmark-gfm versions 0.29.0.gfm.3 and 0.28.3.gfm.21. A workaround is available. The vulnerability exists in the table markdown extensions of cmark-gfm. Disabling the table extension will prevent this vulnerability from being triggered. |
Important |
pandoc |
否 |
完成修复 |
2022-03-03 |
2026-01-05 |
| CVE-2022-24723 |
URI.js is a Javascript URL mutation library. Before version 1.19.9, whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly. This issue has been patched in version 1.19.9. Removing leading whitespace from values before passing them to URI.parse can be used as a workaround. |
Moderate |
dotnet3.1 |
否 |
完成修复 |
2022-03-03 |
2025-12-05 |
| CVE-2022-21716 |
Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as `nc -rv localhost 22 < /dev/zero`. A patch is available in version 22.2.0. There are currently no known workarounds. |
Important |
python-twisted |
否 |
完成修复 |
2022-03-03 |
2026-01-04 |
| CVE-2021-38578 |
Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize. |
Important |
edk2 |
否 |
完成修复 |
2022-03-03 |
2026-01-08 |
| CVE-2022-0711 |
A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability. |
Important |
haproxy |
否 |
完成修复 |
2022-03-02 |
2026-01-05 |
| CVE-2021-40438 |
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier. |
Important |
httpd:2.4, httpd |
否 |
完成修复 |
2022-03-02 |
2026-01-09 |
| CVE-2021-3667 |
An improper locking issue was found in the virStoragePoolLookupByTargetPath API of libvirt. It occurs in the storagePoolLookupByTargetPath function where a locked virStoragePoolObj object is not properly released on ACL permission failure. Clients connecting to the read-write socket with limited ACL permissions could use this flaw to acquire the lock and prevent other users from accessing storage pool/volume APIs, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. |
Low |
libvirt |
否 |
完成修复 |
2022-03-02 |
2025-12-18 |
| CVE-2021-3631 |
A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity. |
Low |
libvirt |
否 |
完成修复 |
2022-03-02 |
2025-12-18 |
| CVE-2021-38201 |
net/sunrpc/xdr.c in the Linux kernel before 5.13.4 allows remote attackers to cause a denial of service (xdr_set_page_base slab-out-of-bounds access) by performing many NFS 4.2 READ_PLUS operations. |
Important |
kernel:4.19, kernel(RHCK)4.18, kernel:4.18, kernel:6.6, kernel:5.10 |
是 |
完成修复 |
2022-02-28 |
2025-12-04 |
| CVE-2022-24407 |
In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement. |
Important |
cyrus-sasl |
否 |
完成修复 |
2022-02-24 |
2026-01-06 |
| CVE-2021-3752 |
A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. |
Important |
kernel:4.19, kernel(RHCK)4.18, kernel:4.18, kernel:6.6, kernel:5.10 |
是 |
完成修复 |
2022-02-24 |
2025-12-04 |
| CVE-2022-22817 |
PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. |
Important |
python-pillow |
否 |
完成修复 |
2022-02-23 |
2026-01-04 |
| CVE-2022-24052 |
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190. |
Important |
mariadb |
否 |
完成修复 |
2022-02-18 |
2026-01-04 |
| CVE-2022-24051 |
MariaDB CONNECT Storage Engine Format String Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16193. |
Important |
mariadb |
否 |
完成修复 |
2022-02-18 |
2026-01-04 |
| CVE-2022-24050 |
MariaDB CONNECT Storage Engine Use-After-Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16207. |
Important |
mariadb |
否 |
完成修复 |
2022-02-18 |
2026-01-04 |
| CVE-2022-24048 |
MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191. |
Important |
mariadb |
否 |
完成修复 |
2022-02-18 |
2026-01-04 |
| CVE-2021-41819 |
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby. |
Important |
ruby:3.3, ruby:2.6, ruby:3.0, ruby, ruby:2.7, ruby:2.5 |
否 |
完成修复 |
2022-02-18 |
2026-01-04 |
| CVE-2021-41817 |
Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1. |
Important |
ruby:2.6, ruby:3.0, ruby, ruby:2.7, ruby:2.5 |
否 |
完成修复 |
2022-02-18 |
2026-01-04 |
| CVE-2016-20013 |
sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password. |
Important |
libxcrypt |
否 |
完成修复 |
2022-02-18 |
2025-12-29 |
| CVE-2022-25265 |
In the Linux kernel through 5.16.10, certain binary files may have the exec-all attribute if they were built in approximately 2003 (e.g., with GCC 3.2.2 and Linux kernel 2.4.20). This can cause execution of bytes located in supposedly non-executable regions of a file. |
Important |
kernel, kernel(RHCK)4.18, kernel:4.18, kernel:6.6, kernel:4.19, kernel:5.10 |
是 |
完成修复 |
2022-02-16 |
2025-12-04 |
| CVE-2022-0613 |
Authorization Bypass Through User-Controlled Key in NPM urijs prior to 1.19.8. |
Moderate |
dotnet3.1, dotnet5.0 |
否 |
完成修复 |
2022-02-16 |
2025-12-05 |
| CVE-2021-3781 |
A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. |
Important |
ghostscript |
否 |
完成修复 |
2022-02-16 |
2026-01-07 |
| CVE-2022-23639 |
crossbeam-utils provides atomics, synchronization primitives, scoped threads, and other utilities for concurrent programming in Rust. crossbeam-utils prior to version 0.8.7 incorrectly assumed that the alignment of `{i,u}64` was always the same as `Atomic{I,U}64`. However, the alignment of `{i,u}64` on a 32-bit target can be smaller than `Atomic{I,U}64`. This can cause unaligned memory accesses and data race. Crates using `fetch_*` methods with `AtomicCell<{i,u}64>` are affected by this issue. 32-bit targets without `Atomic{I,U}64` and 64-bit targets are not affected by this issue. This has been fixed in crossbeam-utils 0.8.7. There are currently no known workarounds. |
Important |
librsvg2, thunderbird, firefox, mozjs52, rust |
否 |
完成修复 |
2022-02-15 |
2026-01-04 |
| CVE-2022-0582 |
Unaligned access in the CSN.1 protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file |
Moderate |
wireshark |
否 |
完成修复 |
2022-02-14 |
2026-01-25 |
| CVE-2022-23634 |
Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. Upgrading to a patched Rails _or_ Puma version fixes the vulnerability. |
Important |
libdb |
否 |
完成修复 |
2022-02-11 |
2026-01-08 |
| CVE-2021-33115 |
Improper input validation for some Intel(R) PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. |
Important |
linux-firmware |
否 |
完成修复 |
2022-02-09 |
2026-01-05 |
| CVE-2021-33113 |
Improper input validation for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and Killer(TM) WiFi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access. |
Important |
linux-firmware |
否 |
完成修复 |
2022-02-09 |
2026-01-05 |
| CVE-2021-33061 |
Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access. |
Moderate |
kernel 4.19, kernel(ANCK)5.10 |
否 |
完成修复 |
2022-02-09 |
2025-12-23 |
| CVE-2021-0164 |
Improper access control in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access. |
Important |
linux-firmware |
否 |
完成修复 |
2022-02-09 |
2026-01-05 |
| CVE-2021-0066 |
Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access. |
Important |
linux-firmware |
否 |
完成修复 |
2022-02-09 |
2026-01-05 |
| CVE-2020-9492 |
In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization header to remote URL without proper verification. |
Important |
lucene |
否 |
完成修复 |
2022-02-09 |
2026-01-05 |
| CVE-2022-21241 |
Cross-site scripting vulnerability in CSV+ prior to 0.8.1 allows a remote unauthenticated attacker to inject an arbitrary script or an arbitrary OS command via a specially crafted CSV file that contains HTML a tag. |
Critical |
ocaml-csv |
否 |
完成修复 |
2022-02-08 |
2026-01-10 |
| CVE-2020-12965 |
When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage. |
Important |
kernel, kernel:5.10 |
否 |
完成修复 |
2022-02-04 |
2025-12-04 |
| CVE-2022-21351 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H). |
Important |
mariadb:10.3, mysql, mysql:8.0, mariadb, mariadb:10.5 |
否 |
完成修复 |
2022-01-19 |
2026-01-04 |
| CVE-2022-21673 |
Grafana is an open-source platform for monitoring and observability. In affected versions when a data source has the Forward OAuth Identity feature enabled, sending a query to that datasource with an API token (and no other user credentials) will forward the OAuth Identity of the most recently logged-in user. This can allow API token holders to retrieve data for which they may not have intended access. This attack relies on the Grafana instance having data sources that support the Forward OAuth Identity feature, the Grafana instance having a data source with the Forward OAuth Identity feature toggled on, the Grafana instance having OAuth enabled, and the Grafana instance having usable API keys. This issue has been patched in versions 7.5.13 and 8.3.4. |
Moderate |
grafana |
否 |
完成修复 |
2022-01-18 |
2026-01-25 |
| CVE-2022-0500 |
A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel’s BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system. |
Important |
kernel:4.19, kernel:4.18, kernel, kernel:6.6, kernel:5.10 |
是 |
完成修复 |
2022-01-14 |
2025-12-04 |
| CVE-2020-29050 |
SphinxSearch in Sphinx Technologies Sphinx through 3.1.1 allows directory traversal (in conjunction with CVE-2019-14511) because the mysql client can be used for CALL SNIPPETS and load_file operations on a full pathname (e.g., a file in the /etc directory). NOTE: this is unrelated to CMUSphinx. |
Important |
python-sphinx |
否 |
完成修复 |
2022-01-10 |
2026-01-04 |
| CVE-2021-43816 |
containerd is an open source container runtime. On installations using SELinux, such as EL8 (CentOS, RHEL), Fedora, or SUSE MicroOS, with containerd since v1.5.0-beta.0 as the backing container runtime interface (CRI), an unprivileged pod scheduled to the node may bind mount, via hostPath volume, any privileged, regular file on disk for complete read/write access (sans delete). Such is achieved by placing the in-container location of the hostPath volume mount at either `/etc/hosts`, `/etc/hostname`, or `/etc/resolv.conf`. These locations are being relabeled indiscriminately to match the container process-label which effectively elevates permissions for savvy containers that would not normally be able to access privileged host files. This issue has been resolved in version 1.5.9. Users are advised to upgrade as soon as possible. |
Important |
containerd |
否 |
完成修复 |
2022-01-06 |
2026-01-07 |
| CVE-2021-22569 |
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions. |
Important |
protobuf-c, protobuf |
否 |
完成修复 |
2022-01-06 |
2026-01-09 |
| CVE-2021-45115 |
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack. |
Important |
python-django |
否 |
完成修复 |
2022-01-05 |
2026-01-04 |
| CVE-2022-0480 |
A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks. |
Low |
kernel:5.10, kernel:4.19, kernel:6.6 |
是 |
完成修复 |
2022-01-03 |
2026-01-23 |
| CVE-2021-38576 |
A BIOS bug in firmware for a particular PC model leaves the Platform authorization value empty. This can be used to permanently brick the TPM in multiple ways, as well as to non-permanently DoS the system. |
Important |
edk2 |
否 |
完成修复 |
2022-01-03 |
2026-01-08 |
| CVE-2020-23026 |
A NULL pointer dereference in the main() function dhry_1.c of dhrystone 2.1 causes a denial of service (DoS). |
Important |
dhrystone |
否 |
完成修复 |
2022-01-03 |
2026-01-08 |
| CVE-2021-45942 |
OpenEXR 3.1.x before 3.1.4 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask). NOTE: db217f2 may be inapplicable. |
Moderate |
OpenEXR |
否 |
完成修复 |
2022-01-01 |
2026-01-25 |
| CVE-2021-4185 |
Infinite loop in the RTMPT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file |
Important |
wireshark |
否 |
完成修复 |
2021-12-29 |
2026-01-05 |
| CVE-2021-45720 |
An issue was discovered in the lru crate before 0.7.1 for Rust. The iterators have a use-after-free, as demonstrated by an access after a pop operation. |
Important |
389-ds-base |
否 |
完成修复 |
2021-12-26 |
2026-01-06 |
| CVE-2021-3712 |
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y). |
Important |
openssl |
否 |
完成修复 |
2021-12-23 |
2026-01-09 |
| CVE-2021-36317 |
Dell EMC Avamar Server version 19.4 contains a plain-text password storage vulnerability in AvInstaller. A local attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account. |
Moderate |
rust |
否 |
完成修复 |
2021-12-21 |
2025-12-16 |
| CVE-2021-44717 |
Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion. |
Moderate |
container-tools:4.0, container-tools:2.0, go-toolset:an8, runc, container-tools:3.0, container-tools:an8, golang, container-tools:1.0 |
是 |
完成修复 |
2021-12-20 |
2025-12-11 |
| CVE-2021-44716 |
net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests. |
Important |
grafana, golang, grafana-pcp, go-toolset:an8 |
是 |
完成修复 |
2021-12-20 |
2025-12-17 |
| CVE-2021-45078 |
stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699. |
Important |
binutils |
否 |
完成修复 |
2021-12-15 |
2025-12-11 |
| CVE-2020-4496 |
The IBM Spectrum Protect Plus 10.1.0.0 through 10.1.8.x server connection to an IBM Spectrum Protect Plus workload agent is subject to a man-in-the-middle attack due to improper certificate validation. IBM X-Force ID: 182046. |
Moderate |
kernel |
否 |
完成修复 |
2021-12-13 |
2025-12-17 |
| CVE-2021-44228 |
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. |
Critical |
log4j, java-1.8.0-openjdk, java-1.7.0-openjdk, java-11-openjdk, parfait:0.5, log4j:2, java-1.6.0-openjdk |
否 |
完成修复 |
2021-12-10 |
2025-12-05 |
| CVE-2021-43535 |
A use-after-free could have occured when an HTTP2 session object was released on a different thread, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 93, Thunderbird < 91.3, and Firefox ESR < 91.3. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2021-12-08 |
2026-01-04 |
| CVE-2021-43534 |
Mozilla developers and community members reported memory safety bugs present in Firefox 93 and Firefox ESR 91.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2021-12-08 |
2026-01-04 |
| CVE-2021-4048 |
An out-of-bounds read flaw was found in the CLARRV, DLARRV, SLARRV, and ZLARRV functions in lapack through version 3.10.0, as also used in OpenBLAS before version 0.3.18. Specially crafted inputs passed to these functions could cause an application using lapack to crash or possibly disclose portions of its memory. |
Moderate |
openblas |
否 |
完成修复 |
2021-12-08 |
2025-12-06 |
| CVE-2018-25020 |
The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c. |
Moderate |
kernel |
否 |
完成修复 |
2021-12-08 |
2025-12-23 |
| CVE-2021-44420 |
In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths. |
Important |
python-django |
否 |
完成修复 |
2021-12-07 |
2026-01-04 |
| CVE-2021-43565 |
There's an input validation flaw in golang.org/x/crypto's readCipherPacket() function. An unauthenticated attacker who sends an empty plaintext packet to a program linked with golang.org/x/crypto/ssh could cause a panic, potentially leading to denial of service. |
Important |
docker, golang, go-toolset:an8 |
是 |
完成修复 |
2021-12-02 |
2025-12-17 |
| CVE-2021-34599 |
Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack. |
Important |
git |
否 |
完成修复 |
2021-12-01 |
2026-01-06 |
| CVE-2021-38503 |
The iframe sandbox rules were not correctly applied to XSLT stylesheets, allowing an iframe to bypass restrictions such as executing scripts or navigating the top-level frame. This vulnerability affects Firefox < 94, Thunderbird < 91.3,and Firefox ESR < 91.3. |
Important |
thunderbird, firefox |
否 |
完成修复 |
2021-11-30 |
2026-01-04 |
| CVE-2021-44201 |
Cross-site scripting (XSS) was possible in notification pop-ups. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035 |
Moderate |
kernel |
否 |
完成修复 |
2021-11-29 |
2025-12-17 |
| CVE-2021-3656 |
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. |
Important |
kernel:4.19, kernel:4.18, kernel, kernel:6.6, kernel:5.10, kernel(RHCK)4.18 (Anolis OS 8.4), kernel(RHCK)4.18 (Anolis OS 8.2), kernel(ANCK)4.19 |
是 |
完成修复 |
2021-11-26 |
2025-12-04 |
| CVE-2021-3653 |
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7. |
Important |
kernel:4.19, kernel:4.18, kernel:6.6, kernel:5.10, kernel(RHCK)4.18 (Anolis OS 8.4), kernel(RHCK)4.18 (Anolis OS 8.2), kernel(ANCK)4.19 |
是 |
完成修复 |
2021-11-26 |
2025-12-04 |
| CVE-2021-26615 |
ARK library allows attackers to execute remote code via the parameter(path value) of Ark_NormalizeAndDupPAthNameW function because of an integer overflow. |
Important |
kernel |
否 |
完成修复 |
2021-11-26 |
2025-12-04 |
| CVE-2021-43267 |
An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type. |
Important |
kernel(RHCK)4.18 (Anolis OS 8.5), kernel, kernel(RHCK)4.18 (Anolis OS 8.4), kernel(ANCK) 5.10 |
是 |
完成修复 |
2021-11-23 |
2025-12-04 |
| CVE-2021-23217 |
NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller, which may allow a user with elevated privileges to instantiate a DMA write operation only within a specific time window timed to corrupt code execution, which may impact confidentiality, integrity, or availability. The scope impact may extend to other components. |
Important |
kernel |
否 |
完成修复 |
2021-11-20 |
2025-12-04 |
| CVE-2021-33058 |
Improper access control in the installer Intel(R)Administrative Tools for Intel(R) Network Adaptersfor Windowsbefore version 1.4.0.21 may allow an unauthenticated user to potentially enable escalation of privilege via local access. |
Important |
perl-version |
否 |
完成修复 |
2021-11-17 |
2026-01-04 |
| CVE-2021-37580 |
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0 |
Critical |
maven |
否 |
完成修复 |
2021-11-16 |
2026-01-10 |
| CVE-2021-27645 |
The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c. |
Low |
glibc |
否 |
完成修复 |
2021-11-09 |
2025-12-11 |
| CVE-2021-3928 |
vim is vulnerable to Use of Uninitialized Variable |
Important |
vim |
否 |
完成修复 |
2021-11-05 |
2026-01-04 |
| CVE-2021-29991 |
Firefox incorrectly accepted a newline in a HTTP/3 header, interpretting it as two separate headers. This allowed for a header splitting attack against servers using HTTP/3. This vulnerability affects Firefox < 91.0.1 and Thunderbird < 91.0.1. |
Important |
thunderbird |
否 |
完成修复 |
2021-11-03 |
2026-01-05 |
| CVE-2021-42697 |
Akka HTTP 10.1.x before 10.1.15 and 10.2.x before 10.2.7 can encounter stack exhaustion while parsing HTTP headers, which allows a remote attacker to conduct a Denial of Service attack by sending a User-Agent header with deeply nested comments. |
Important |
httpd |
否 |
完成修复 |
2021-11-02 |
2026-01-09 |
| CVE-2017-5123 |
Insufficient data validation in waitid allowed an user to escape sandboxes on Linux. |
Important |
kernel |
是 |
完成修复 |
2021-11-02 |
2025-12-04 |
| CVE-2021-42694 |
An issue was discovered in the character definitions of the Unicode Specification through 14.0. The specification allows an adversary to produce source code identifiers such as function names using homoglyphs that render visually identical to a target identifier. Adversaries can leverage this to inject code via adversarial identifier definitions in upstream software dependencies invoked deceptively in downstream software. |
Moderate |
rust |
否 |
完成修复 |
2021-11-01 |
2025-12-16 |
| CVE-2021-41035 |
In Eclipse Openj9 before version 0.29.0, the JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. |
Moderate |
java-11-openjdk |
否 |
完成修复 |
2021-10-25 |
2025-12-05 |
| CVE-2020-27304 |
The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal |
Important |
ceph |
否 |
完成修复 |
2021-10-21 |
2026-01-08 |
| CVE-2021-35619 |
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 19c and 21c. Difficult to exploit vulnerability allows low privileged attacker having Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java VM. CVSS 3.1 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H). |
Important |
java-1.8.0-openjdk |
否 |
完成修复 |
2021-10-20 |
2025-12-05 |
| CVE-2021-35610 |
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H). |
Important |
mariadb:10.5, mysql:8.0, mariadb, mysql |
否 |
完成修复 |
2021-10-20 |
2026-01-04 |
| CVE-2021-35560 |
Vulnerability in the Java SE product of Oracle Java SE (component: Deployment). The supported version that is affected is Java SE: 8u301. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). |
Important |
java-11-openjdk, icedtea-web, java-1.8.0-openjdk |
否 |
完成修复 |
2021-10-20 |
2025-12-05 |
| CVE-2021-35538 |
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.28. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability does not apply to Windows systems. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). |
Important |
kernel |
否 |
完成修复 |
2021-10-20 |
2025-12-04 |
| CVE-2021-26318 |
A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information. |
Moderate |
kernel |
否 |
完成修复 |
2021-10-13 |
2025-12-23 |
| CVE-2021-22930 |
Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior. |
Important |
nodejs:12 (Anolis OS 8.2), nodejs:12 (Anolis OS 8.4), nodejs:12, nodejs:14, nodejs |
否 |
完成修复 |
2021-10-12 |
2026-01-06 |
| CVE-2021-41116 |
Composer is an open source dependency manager for the PHP language. In affected versions windows users running Composer to install untrusted dependencies are subject to command injection and should upgrade their composer version. Other OSs and WSL are not affected. The issue has been resolved in composer versions 1.10.23 and 2.1.9. There are no workarounds for this issue. |
Important |
composer |
否 |
完成修复 |
2021-10-06 |
2026-01-07 |