| CVE-2021-41092 |
Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH. |
Important |
docker |
否 |
完成修复 |
2021-10-04 |
2026-01-08 |
| CVE-2021-40324 |
Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data. |
Important |
cobbler |
否 |
完成修复 |
2021-10-04 |
2026-01-08 |
| CVE-2021-40323 |
Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection. |
Important |
cobbler |
否 |
完成修复 |
2021-10-04 |
2026-01-08 |
| CVE-2021-32762 |
Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network replies. This is a result of a vulnerability in the underlying hiredis library which does not perform an overflow check before calling the calloc() heap allocation function. This issue only impacts systems with heap allocators that do not perform their own overflow checks. Most modern systems do and are therefore not likely to be affected. Furthermore, by default redis-sentinel uses the jemalloc allocator which is also not vulnerable. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. |
Important |
redis, redis:6, redis:5 |
否 |
完成修复 |
2021-10-04 |
2026-01-04 |
| CVE-2021-32672 |
Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14. |
Moderate |
redis |
否 |
完成修复 |
2021-10-04 |
2026-01-25 |
| CVE-2021-41106 |
JWT is a library to work with JSON Web Token and JSON Web Signature. Prior to versions 3.4.6, 4.0.4, and 4.1.5, users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\\JWT\\Signer\\Key\\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents. The HMAC hashing functions take any string as input and, since users can issue and validate tokens, users are lead to believe that everything works properly. Versions 3.4.6, 4.0.4, and 4.1.5 have been patched to always load the file contents, deprecated the `Lcobucci\\JWT\\Signer\\Key\\LocalFileReference`, and suggest `Lcobucci\\JWT\\Signer\\Key\\InMemory` as the alternative. As a workaround, use `Lcobucci\\JWT\\Signer\\Key\\InMemory` instead of `Lcobucci\\JWT\\Signer\\Key\\LocalFileReference` to create the instances of one's keys. |
Low |
python-jwt |
否 |
完成修复 |
2021-09-28 |
2026-01-25 |
| CVE-2021-39246 |
Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network). |
Moderate |
kernel |
否 |
完成修复 |
2021-09-24 |
2025-12-23 |
| CVE-2021-2464 |
Vulnerability in Oracle Linux (component: OSwatcher). Supported versions that are affected are 7 and 8. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Linux executes to compromise Oracle Linux. Successful attacks of this vulnerability can result in takeover of Oracle Linux. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). |
Important |
kernel |
否 |
完成修复 |
2021-09-24 |
2025-12-04 |
| CVE-2021-33035 |
Apache OpenOffice opens dBase/DBF documents and shows the contents as spreadsheets. DBF are database files with data organized in fields. When reading DBF data the size of certain fields is not checked: the data is just copied into local variables. A carefully crafted document could overflow the allocated space, leading to the execution of arbitrary code by altering the contents of the program stack. This issue affects Apache OpenOffice up to and including version 4.1.10 |
Important |
libreoffice |
否 |
完成修复 |
2021-09-23 |
2026-01-05 |
| CVE-2020-21468 |
** DISPUTED ** A segmentation fault in the redis-server component of Redis 5.0.7 leads to a denial of service (DOS). NOTE: the vendor cannot reproduce this issue in a released version, such as 5.0.7. |
Important |
redis, redis:6, redis:5 |
否 |
完成修复 |
2021-09-20 |
2026-01-04 |
| CVE-2021-3807 |
ansi-regex is vulnerable to Inefficient Regular Expression Complexity |
Important |
nodejs:14, nodejs:16, nodejs |
否 |
完成修复 |
2021-09-17 |
2026-01-06 |
| CVE-2021-41079 |
Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service. |
Important |
tomcat |
否 |
完成修复 |
2021-09-15 |
2026-01-04 |
| CVE-2021-40346 |
An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs. |
Important |
haproxy |
否 |
完成修复 |
2021-09-08 |
2026-01-05 |
| CVE-2021-24591 |
The Highlight WordPress plugin before 0.9.3 does not sanitise its CustomCSS setting, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed |
Moderate |
highlight |
否 |
完成修复 |
2021-09-06 |
2026-01-25 |
| CVE-2021-39135 |
`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. 1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) 2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2. |
Important |
nodejs:14, nodejs:16, nodejs, nodejs:12 |
否 |
完成修复 |
2021-08-31 |
2026-01-05 |
| CVE-2021-39134 |
`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `"foo": "file:/some/path"`. Another package, `pwn-b` could define a dependency such as `FOO: "file:foo.tgz"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. |
Important |
nodejs:14, nodejs:16, nodejs, nodejs:12 |
否 |
完成修复 |
2021-08-31 |
2026-01-05 |
| CVE-2021-34558 |
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic. |
Moderate |
golang, container-tools:an8, go-toolset:an8 |
是 |
完成修复 |
2021-08-30 |
2025-12-11 |
| CVE-2021-33196 |
In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive's header) can cause a NewReader or OpenReader panic. |
Important |
golang, container-tools:2.0, buildah, container-tools:3.0, container-tools:an8, container-tools:4.0, container-tools:1.0, go-toolset:an8 |
是 |
完成修复 |
2021-08-30 |
2025-12-11 |
| CVE-2021-31162 |
In the standard library in Rust before 1.52.0, a double free can occur in the Vec::from_iter function if freeing the element panics. |
Moderate |
rust-toolset:an8, rust-toolset, rust |
否 |
完成修复 |
2021-08-30 |
2025-12-16 |
| CVE-2021-28879 |
In the standard library in Rust before 1.52.0, the Zip implementation can report an incorrect size due to an integer overflow. This bug can lead to a buffer overflow when a consumed Zip iterator is used again. |
Moderate |
rust-toolset:an8, rust |
否 |
完成修复 |
2021-08-30 |
2025-12-16 |
| CVE-2021-28878 |
In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait. |
Important |
rust-toolset:an8, rust |
否 |
完成修复 |
2021-08-30 |
2025-12-16 |
| CVE-2021-28877 |
In the standard library in Rust before 1.51.0, the Zip implementation calls __iterator_get_unchecked() for the same index more than once when nested. This bug can lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait. |
Important |
rust-toolset:an8, rust |
否 |
完成修复 |
2021-08-30 |
2025-12-16 |
| CVE-2021-28875 |
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow. |
Important |
rust-toolset:an8, rust |
否 |
完成修复 |
2021-08-30 |
2025-12-16 |
| CVE-2021-40145 |
** DISPUTED ** gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka LibGD) through 2.3.2 has a double free. NOTE: the vendor's position is "The GD2 image format is a proprietary image format of libgd. It has to be regarded as being obsolete, and should only be used for development and testing purposes." |
Important |
gd |
否 |
完成修复 |
2021-08-25 |
2026-01-07 |
| CVE-2021-32066 |
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack." |
Important |
ruby, ruby:3.0, ruby:2.6, ruby:2.5, ruby:2.7, ruby:3.3 |
否 |
完成修复 |
2021-08-25 |
2026-01-04 |
| CVE-2021-30860 |
An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
Important |
poppler |
否 |
完成修复 |
2021-08-24 |
2026-01-04 |
| CVE-2021-29985 |
A use-after-free vulnerability in media channels could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 78.13, Thunderbird < 91, Firefox ESR < 78.13, and Firefox < 91. |
Important |
firefox, thunderbird |
否 |
完成修复 |
2021-08-24 |
2026-01-04 |
| CVE-2020-10543 |
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow. |
Important |
perl |
否 |
完成修复 |
2021-08-18 |
2026-01-05 |
| CVE-2021-39242 |
An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It can lead to a situation with an attacker-controlled HTTP Host header, because a mismatch between Host and authority is mishandled. |
Important |
haproxy |
否 |
完成修复 |
2021-08-17 |
2026-01-05 |
| CVE-2021-39241 |
An issue was discovered in HAProxy 2.0 before 2.0.24, 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. An HTTP method name may contain a space followed by the name of a protected resource. It is possible that a server would interpret this as a request for that protected resource, such as in the "GET /admin? HTTP/1.1 /static/images HTTP/1.1" example. |
Important |
haproxy |
否 |
完成修复 |
2021-08-17 |
2026-01-05 |
| CVE-2021-39240 |
An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It does not ensure that the scheme and path portions of a URI have the expected characters. For example, the authority field (as observed on a target HTTP/2 server) might differ from what the routing rules were intended to achieve. |
Important |
haproxy |
否 |
完成修复 |
2021-08-17 |
2026-01-05 |
| CVE-2021-29987 |
After requesting multiple permissions, and closing the first permission panel, subsequent permission panels will be displayed in a different position but still record a click in the default location, making it possible to trick a user into accepting a permission they did not want to. *This bug only affects Firefox on Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox < 91 and Thunderbird < 91. |
Moderate |
thunderbird, firefox |
否 |
完成修复 |
2021-08-17 |
2026-01-24 |
| CVE-2021-29982 |
Due to incorrect JIT optimization, we incorrectly interpreted data from the wrong type of object, resulting in the potential leak of a single bit of memory. This vulnerability affects Firefox < 91 and Thunderbird < 91. |
Moderate |
thunderbird, firefox |
否 |
完成修复 |
2021-08-17 |
2026-01-24 |
| CVE-2021-29981 |
An issue present in lowering/register allocation could have led to obscure but deterministic register confusion failures in JITted code that would lead to a potentially exploitable crash. This vulnerability affects Firefox < 91 and Thunderbird < 91. |
Important |
thunderbird |
否 |
完成修复 |
2021-08-17 |
2026-01-05 |
| CVE-2020-28165 |
The EasyCorp ZenTao PMS 12.4.2 application suffers from an arbitrary file upload vulnerability. An attacker can upload arbitrary webshell to the server by using the downloadZipPackage() function. |
Important |
jetty |
否 |
完成修复 |
2021-08-12 |
2026-01-06 |
| CVE-2021-38511 |
An issue was discovered in the tar crate before 0.4.36 for Rust. When symlinks are present in a TAR archive, extraction can create arbitrary directories via .. traversal. |
Moderate |
tar |
否 |
完成修复 |
2021-08-10 |
2026-01-25 |
| CVE-2021-36221 |
Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort. |
Moderate |
golang, container-tools:2.0, buildah, container-tools:3.0, container-tools:an8, container-tools:4.0, container-tools:1.0, go-toolset:an8 |
是 |
完成修复 |
2021-08-08 |
2025-12-11 |
| CVE-2021-29922 |
library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. |
Moderate |
rust-toolset |
否 |
完成修复 |
2021-08-07 |
2025-12-16 |
| CVE-2021-29971 |
If a user had granted a permission to a webpage and saved that grant, any webpage running on the same host - irrespective of scheme or port - would be granted that permission. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 90. |
Important |
firefox |
否 |
完成修复 |
2021-08-06 |
2026-01-04 |
| CVE-2021-28216 |
BootPerformanceTable pointer is read from an NVRAM variable in PEI. Recommend setting PcdFirmwarePerformanceDataTableS3Support to FALSE. |
Important |
edk2 |
否 |
完成修复 |
2021-08-05 |
2026-01-08 |
| CVE-2021-32803 |
The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.\nThe npm package "tar" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. |
Important |
nodejs, nodejs:12 (Anolis OS 8.4), nodejs:12, nodejs:14, nodejs:12 (Anolis OS 8.2) |
否 |
完成修复 |
2021-08-03 |
2026-01-06 |
| CVE-2021-30569 |
Use after free in sqlite in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
Important |
sqlite |
否 |
完成修复 |
2021-08-03 |
2026-01-09 |
| CVE-2021-33195 |
Go before 1.15.13 and 1.16.x before 1.16.5 has functions for DNS lookups that do not validate replies from DNS servers, and thus a return value may contain an unsafe injection (e.g., XSS) that does not conform to the RFC1035 format. |
Important |
golang, container-tools:2.0, buildah, container-tools:an8, container-tools:3.0, container-tools:4.0, go-toolset:an8 |
是 |
完成修复 |
2021-08-02 |
2025-12-11 |
| CVE-2021-37595 |
In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_RANGE File Contents Request PDU. |
Critical |
freerdp |
否 |
完成修复 |
2021-07-30 |
2026-01-09 |
| CVE-2021-37594 |
In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_SIZE File Contents Request PDU. |
Critical |
freerdp |
否 |
完成修复 |
2021-07-30 |
2026-01-10 |
| CVE-2015-2100 |
Multiple stack-based buffer overflows in WebGate eDVR Manager and Control Center allow remote attackers to execute arbitrary code via unspecified vectors to the (1) TCPDiscover or (2) TCPDiscover2 function in the WESPDiscovery.WESPDiscoveryCtrl.1 control. |
Important |
control-center |
否 |
完成修复 |
2021-07-22 |
2026-01-07 |
| CVE-2015-2099 |
Multiple buffer overflows in WebGate Control Center allow remote attackers to execute arbitrary code via unspecified vectors to the (1) GetRecFileInfo function in the FileConverter.FileConverterCtrl.1 control, (2) Login function in the LoginContoller.LoginControllerCtrl.1 control, or (3) GetThumbnail function in the WESPPlayback.WESPPlaybackCtrl.1 control. |
Important |
control-center |
否 |
完成修复 |
2021-07-22 |
2026-01-07 |
| CVE-2021-32761 |
Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, leak arbitrary heap contents or trigger remote code execution. The vulnerability involves changing the default `proto-max-bulk-len` configuration parameter to a very large value and constructing specially crafted commands bit commands. This problem only affects Redis on 32-bit platforms, or compiled as a 32-bit binary. Redis versions 5.0.`3m 6.0.15, and 6.2.5 contain patches for this issue. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `proto-max-bulk-len` configuration parameter. This can be done using ACL to restrict unprivileged users from using the CONFIG SET command. |
Important |
redis, redis:6, redis:5 |
否 |
完成修复 |
2021-07-21 |
2026-01-04 |
| CVE-2021-2432 |
Vulnerability in the Java SE product of Oracle Java SE (component: JNDI). The supported version that is affected is Java SE: 7u301. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). |
Moderate |
java-11-openjdk |
否 |
完成修复 |
2021-07-21 |
2025-12-05 |
| CVE-2020-15660 |
Missing checks on Content-Type headers in geckodriver before 0.27.0 could lead to a CSRF vulnerability, that might, when paired with a specifically prepared request, lead to remote code execution. |
Moderate |
firefox |
否 |
完成修复 |
2021-07-20 |
2026-01-24 |
| CVE-2021-3520 |
There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well. |
Important |
lz4 |
否 |
完成修复 |
2021-07-16 |
2026-01-04 |
| CVE-2021-30465 |
runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition. |
Important |
container-tools:2.0, container-tools:3.0, container-tools:an8, container-tools:4.0, container-tools:1.0, runc, container-tools:2.0 (Anolis OS 8.4), container-tools:2.0 (Anolis OS 8.2) |
否 |
完成修复 |
2021-07-15 |
2026-01-07 |
| CVE-2021-29742 |
IBM Security Verify Access Docker 10.0.0 could allow a user to impersonate another user on the system. IBM X-Force ID: 201483. |
Important |
docker |
否 |
完成修复 |
2021-07-15 |
2026-01-08 |
| CVE-2021-25217 |
In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted. |
Important |
dhcp (Anolis OS 8.4), dhcp, dhcp (Anolis OS 8.2) |
否 |
完成修复 |
2021-07-15 |
2026-01-06 |
| CVE-2021-20533 |
IBM Security Verify Access Docker 10.0.0 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 198813 |
Important |
docker |
否 |
完成修复 |
2021-07-15 |
2026-01-08 |
| CVE-2021-22921 |
Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking. |
Important |
nodejs |
否 |
完成修复 |
2021-07-12 |
2026-01-06 |
| CVE-2021-20024 |
Multiple Out-of-Bound read vulnerability in SonicWall Switch when handling LLDP Protocol allows an attacker to cause a system instability or potentially read sensitive information from the memory locations. |
Important |
perl-Switch |
否 |
完成修复 |
2021-07-09 |
2026-01-04 |
| CVE-2012-2666 |
golang/go in 1.0.2 fixes all.bash on shared machines. dotest() in src/pkg/debug/gosym/pclntab_test.go creates a temporary file with predicable name and executes it as shell script. |
Important |
golang |
是 |
完成修复 |
2021-07-09 |
2025-12-11 |
| CVE-2021-32715 |
hyper is an HTTP library for rust. hyper's HTTP/1 server code had a flaw that incorrectly parses and accepts requests with a `Content-Length` header with a prefixed plus sign, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that doesn't parse such `Content-Length` headers, but forwards them, can result in "request smuggling" or "desync attacks". The flaw exists in all prior versions of hyper prior to 0.14.10, if built with `rustc` v1.5.0 or newer. The vulnerability is patched in hyper version 0.14.10. Two workarounds exist: One may reject requests manually that contain a plus sign prefix in the `Content-Length` header or ensure any upstream proxy handles `Content-Length` headers with a plus sign prefix. |
Moderate |
rust |
否 |
完成修复 |
2021-07-07 |
2025-12-16 |
| CVE-2021-32714 |
hyper is an HTTP library for Rust. In versions prior to 0.14.10, hyper's HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstream HTTP proxy that allows chunk sizes larger than hyper does, can result in "request smuggling" or "desync attacks." The vulnerability is patched in version 0.14.10. Two possible workarounds exist. One may reject requests manually that contain a `Transfer-Encoding` header or ensure any upstream proxy rejects `Transfer-Encoding` chunk sizes greater than what fits in 64-bit unsigned integers. |
Moderate |
rust |
否 |
完成修复 |
2021-07-07 |
2025-12-16 |
| CVE-2021-35331 |
** DISPUTED ** In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow code execution via a crafted file. NOTE: multiple third parties dispute the significance of this finding. |
Important |
tcl |
否 |
完成修复 |
2021-07-05 |
2026-01-04 |
| CVE-2021-33516 |
An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc. |
Important |
gupnp, gupnp (Anolis OS 8.4), gupnp (Anolis OS 8.2) |
否 |
完成修复 |
2021-07-05 |
2026-01-05 |
| CVE-2021-27219 |
An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption. |
Important |
glib2 (Anolis OS 8.4), glib2, glib2 (Anolis OS 8.2) |
否 |
完成修复 |
2021-07-05 |
2026-01-09 |
| CVE-2020-36329 |
A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Important |
libwebp, libwebp (Anolis OS 8.4), libwebp (Anolis OS 8.2) |
否 |
完成修复 |
2021-07-05 |
2026-01-05 |
| CVE-2020-36328 |
A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Important |
libwebp, libwebp (Anolis OS 8.4), libwebp (Anolis OS 8.2) |
否 |
完成修复 |
2021-07-05 |
2026-01-05 |
| CVE-2018-25011 |
A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow was found in PutLE16(). The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Important |
libwebp, libwebp (Anolis OS 8.4), libwebp (Anolis OS 8.2) |
否 |
完成修复 |
2021-07-05 |
2026-01-05 |
| CVE-2021-35042 |
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application. |
Important |
python-django |
否 |
完成修复 |
2021-07-02 |
2026-01-04 |
| CVE-2021-36081 |
Tesseract OCR 5.0.0-alpha-20201231 has a one_ell_conflict use-after-free during a strpbrk call. |
Important |
tesseract |
否 |
完成修复 |
2021-06-30 |
2026-01-05 |
| CVE-2021-35942 |
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations. |
Moderate |
glibc |
否 |
完成修复 |
2021-06-30 |
2025-12-11 |
| CVE-2020-36404 |
Keystone Engine 0.9.2 has an invalid free in llvm_ks::SmallVectorImpl::~SmallVectorImpl. |
Important |
kernel |
否 |
完成修复 |
2021-06-30 |
2025-12-04 |
| CVE-2020-36402 |
Solidity 0.7.5 has a stack-use-after-return issue in smtutil::CHCSmtLib2Interface::querySolver. NOTE: c39a5e2b7a3fabbf687f53a2823fc087be6c1a7e is cited in the OSV "fixed" field but does not have a code change. |
Important |
kernel |
否 |
完成修复 |
2021-06-30 |
2025-12-04 |
| CVE-2021-3620 |
A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality. |
Important |
ansible-core |
否 |
完成修复 |
2021-06-25 |
2026-01-06 |
| CVE-2020-36394 |
pam_setquota.c in the pam_setquota module before 2020-05-29 for Linux-PAM allows local attackers to set their quota on an arbitrary filesystem, in certain situations where the attacker's home directory is a FUSE filesystem mounted under /home. |
Important |
pam |
否 |
完成修复 |
2021-06-22 |
2026-01-09 |
| CVE-2010-2525 |
A flaw was discovered in gfs2 file system’s handling of acls (access control lists). An unprivileged local attacker could exploit this flaw to gain access or execute any file stored in the gfs2 file system. |
Important |
kernel |
是 |
完成修复 |
2021-06-22 |
2025-12-04 |
| CVE-2021-3603 |
PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names. |
Important |
php |
否 |
完成修复 |
2021-06-17 |
2026-01-04 |
| CVE-2021-34812 |
Use of hard-coded credentials vulnerability in php component in Synology Calendar before 2.4.0-0761 allows remote attackers to obtain sensitive information via unspecified vectors. |
Important |
ocaml-calendar |
否 |
完成修复 |
2021-06-17 |
2026-01-05 |
| CVE-2021-34551 |
PHPMailer before 6.5.0 on Windows allows remote code execution if lang_path is untrusted data and has a UNC pathname. |
Important |
php |
否 |
完成修复 |
2021-06-16 |
2026-01-04 |
| CVE-2021-20566 |
IBM Resilient SOAR V38.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 199238. |
Moderate |
kernel |
否 |
完成修复 |
2021-06-16 |
2025-12-17 |
| CVE-2021-33560 |
Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP. |
Moderate |
libgcrypt |
否 |
完成修复 |
2021-06-08 |
2026-01-25 |
| CVE-2021-30535 |
Double free in ICU in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
Important |
icu |
否 |
完成修复 |
2021-06-07 |
2026-01-05 |
| CVE-2018-25015 |
An issue was discovered in the Linux kernel before 4.14.16. There is a use-after-free in net/sctp/socket.c for a held lock after a peel off, aka CID-a0ff660058b8. |
Important |
kernel |
是 |
完成修复 |
2021-06-07 |
2025-12-04 |
| CVE-2017-20005 |
NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module. |
Important |
nginx |
否 |
完成修复 |
2021-06-06 |
2026-01-06 |
| CVE-2021-30475 |
aom_dsp/noise_model.c in libaom in AOMedia before 2021-03-24 has a buffer overflow. |
Important |
aom |
否 |
完成修复 |
2021-06-04 |
2026-01-06 |
| CVE-2020-24870 |
Libraw before 0.20.1 has a stack buffer overflow via LibRaw::identify_process_dng_fields in identify.cpp. |
Important |
LibRaw |
否 |
完成修复 |
2021-06-02 |
2026-01-05 |
| CVE-2009-0948 |
Multiple buffer overflows in the (1) cdf_read_sat, (2) cdf_read_long_sector_chain, and (3) cdf_read_ssat function in file before 5.02. |
Critical |
file, filesystem |
否 |
完成修复 |
2021-06-02 |
2026-01-10 |
| CVE-2009-0947 |
Multiple integer overflows in the (1) cdf_read_property_info and (2) cdf_read_sat functions in file before 5.02. |
Critical |
file, file-roller |
否 |
完成修复 |
2021-06-02 |
2026-01-10 |
| CVE-2021-33503 |
An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.\nA flaw was found in python-urllib3. When provided with a URL containing many @ characters in the authority component, the authority's regular expression exhibits catastrophic backtracking. This flaw causes a denial of service if a URL is passed as a parameter or redirected via an HTTP redirect. The highest threat from this vulnerability is to system availability. |
Important |
python39:3.9, python-urllib3 |
否 |
完成修复 |
2021-06-01 |
2026-01-09 |
| CVE-2021-33183 |
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability container volume management component in Synology Docker before 18.09.0-0515 allows local users to read or write arbitrary files via unspecified vectors. |
Important |
docker |
否 |
完成修复 |
2021-06-01 |
2026-01-08 |
| CVE-2020-1716 |
A flaw was found in the ceph-ansible playbook where it contained hardcoded passwords that were being used as default passwords while deploying Ceph services. Any authenticated attacker can abuse this flaw to brute-force Ceph deployments, and gain administrator access to Ceph clusters via the Ceph dashboard to initiate read, write, and delete Ceph clusters and also modify Ceph cluster configurations. Versions before ceph-ansible 6.0.0alpha1 are affected. |
Important |
ceph |
否 |
完成修复 |
2021-05-28 |
2026-01-08 |
| CVE-2013-4536 |
An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process. |
Important |
qemu, qemu-kvm |
否 |
完成修复 |
2021-05-28 |
2025-12-09 |
| CVE-2021-31535 |
LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests with a name longer than the maximum size allowed by the protocol (and also longer than the maximum packet size for normal-sized packets). The user-controlled data exceeding the maximum size is then interpreted by the server as additional X protocol requests and executed, e.g., to disable X server authorization completely. For example, if the victim encounters malicious terminal control sequences for color codes, then the attacker may be able to take full control of the running graphical session. |
Moderate |
libX11 |
否 |
完成修复 |
2021-05-27 |
2026-01-25 |
| CVE-2020-14301 |
An information disclosure vulnerability was found in libvirt in versions before 6.3.0. HTTP cookies used to access network-based disks were saved in the XML dump of the guest domain. This flaw allows an attacker to access potentially sensitive information in the domain configuration via the `dumpxml` command. |
Low |
libvirt, virt:an |
否 |
完成修复 |
2021-05-27 |
2025-12-18 |
| CVE-2008-2544 |
Mounting /proc filesystem via chroot command silently mounts it in read-write mode. The user could bypass the chroot environment and gain write access to files, he would never have otherwise. |
Low |
kernel 5.10, kernel 4.19 |
是 |
完成修复 |
2021-05-27 |
2026-01-23 |
| CVE-2021-33194 |
golang.org/x/net before v0.0.0-20210520170846-37e1c6afe023 allows attackers to cause a denial of service (infinite loop) via crafted ParseFragment input. |
Important |
golang, container-tools:2.0, buildah, container-tools:an8, container-tools:3.0, container-tools:4.0, container-tools:1.0, go-toolset:an8 |
是 |
完成修复 |
2021-05-26 |
2025-12-10 |
| CVE-2009-3721 |
Multiple directory traversal and buffer overflow vulnerabilities were discovered in yTNEF, and in Evolution's TNEF parser that is derived from yTNEF. A crafted email could cause these applications to write data in arbitrary locations on the filesystem, crash, or potentially execute arbitrary code when decoding attachments. |
Important |
evolution |
否 |
完成修复 |
2021-05-26 |
2026-01-07 |
| CVE-2021-33574 |
The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact. |
Low |
glibc |
否 |
完成修复 |
2021-05-25 |
2025-12-11 |
| CVE-2020-20178 |
Ethereum 0xe933c0cd9784414d5f278c114904f5a84b396919#code.sol latest version is affected by a denial of service vulnerability in the affected payout function. Once the length of this array is too long, it will result in an exception. Attackers can make attacks by creating a series of account addresses. |
Important |
openldap |
否 |
完成修复 |
2021-05-24 |
2026-01-09 |
| CVE-2021-41496 |
Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. |
Important |
numpy |
否 |
完成修复 |
2021-05-13 |
2026-01-05 |