| CVE-2021-32921 |
An issue was discovered in Prosody before 0.11.9. It does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker. |
Moderate |
lua |
否 |
完成修复 |
2021-05-13 |
2026-01-25 |
| CVE-2021-32918 |
An issue was discovered in Prosody before 0.11.9. Default settings are susceptible to remote unauthenticated denial-of-service (DoS) attacks via memory exhaustion when running under Lua 5.2 or Lua 5.3. |
Important |
lua |
否 |
完成修复 |
2021-05-13 |
2026-01-04 |
| CVE-2021-34141 |
An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by constructing specific string objects. NOTE: the vendor states that this reported code behavior is "completely harmless." |
Moderate |
numpy |
否 |
完成修复 |
2021-05-11 |
2026-01-25 |
| CVE-2021-29369 |
The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands. |
Critical |
gnuplot |
否 |
完成修复 |
2021-05-03 |
2026-01-10 |
| CVE-2021-25631 |
In the LibreOffice 7-1 series in versions prior to 7.1.2, and in the 7-0 series in versions prior to 7.0.5, the denylist can be circumvented by manipulating the link so it doesn't match the denylist but results in ShellExecute attempting to launch an executable type. |
Important |
libreoffice |
否 |
完成修复 |
2021-05-03 |
2026-01-05 |
| CVE-2020-16845 |
Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs. |
Important |
gcc, golang, xz, go-toolset:an8 |
是 |
完成修复 |
2021-04-29 |
2025-12-10 |
| CVE-2020-14040 |
The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String. |
Important |
golang, go-toolset:an8 |
是 |
完成修复 |
2021-04-29 |
2025-12-10 |
| CVE-2021-29476 |
Requests is a HTTP library written in PHP. Requests mishandles deserialization in FilteredIterator. The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0. |
Critical |
python-requests |
否 |
完成修复 |
2021-04-27 |
2026-01-09 |
| CVE-2020-36326 |
PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation. |
Critical |
php |
否 |
完成修复 |
2021-04-27 |
2026-01-09 |
| CVE-2019-25042 |
** DISPUTED ** Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited. |
Moderate |
unbound |
否 |
完成修复 |
2021-04-27 |
2026-01-25 |
| CVE-2019-25041 |
** DISPUTED ** Unbound before 1.9.5 allows an assertion failure via a compressed name in dname_pkt_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited. |
Moderate |
unbound |
否 |
完成修复 |
2021-04-27 |
2026-01-25 |
| CVE-2019-25040 |
** DISPUTED ** Unbound before 1.9.5 allows an infinite loop via a compressed name in dname_pkt_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited. |
Moderate |
unbound |
否 |
完成修复 |
2021-04-27 |
2026-01-25 |
| CVE-2019-25039 |
** DISPUTED ** Unbound before 1.9.5 allows an integer overflow in a size calculation in respip/respip.c. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited. |
Moderate |
unbound |
否 |
完成修复 |
2021-04-27 |
2026-01-25 |
| CVE-2019-25038 |
** DISPUTED ** Unbound before 1.9.5 allows an integer overflow in a size calculation in dnscrypt/dnscrypt.c. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited. |
Moderate |
unbound |
否 |
完成修复 |
2021-04-27 |
2026-01-25 |
| CVE-2019-25037 |
** DISPUTED ** Unbound before 1.9.5 allows an assertion failure and denial of service in dname_pkt_copy via an invalid packet. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited. |
Moderate |
unbound |
否 |
完成修复 |
2021-04-27 |
2026-01-25 |
| CVE-2019-25036 |
** DISPUTED ** Unbound before 1.9.5 allows an assertion failure and denial of service in synth_cname. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited. |
Moderate |
unbound |
否 |
完成修复 |
2021-04-27 |
2026-01-25 |
| CVE-2019-25035 |
** DISPUTED ** Unbound before 1.9.5 allows an out-of-bounds write in sldns_bget_token_par. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited. |
Moderate |
unbound |
否 |
完成修复 |
2021-04-27 |
2026-01-25 |
| CVE-2019-25034 |
** DISPUTED ** Unbound before 1.9.5 allows an integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited. |
Moderate |
unbound |
否 |
完成修复 |
2021-04-27 |
2026-01-25 |
| CVE-2019-25032 |
** DISPUTED ** Unbound before 1.9.5 allows an integer overflow in the regional allocator via regional_alloc. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited. |
Moderate |
unbound |
否 |
完成修复 |
2021-04-27 |
2026-01-25 |
| CVE-2021-3472 |
A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can lead to a local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Important |
xorg-x11-server |
否 |
完成修复 |
2021-04-26 |
2026-01-04 |
| CVE-2021-22884 |
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160. |
Important |
nodejs, nodejs:14, nodejs:12, nodejs:10 |
否 |
完成修复 |
2021-04-26 |
2026-01-06 |
| CVE-2019-25033 |
** DISPUTED ** Unbound before 1.9.5 allows an integer overflow in the regional allocator via the ALIGN_UP macro. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited. |
Moderate |
unbound |
否 |
完成修复 |
2021-04-26 |
2026-01-25 |
| CVE-2021-29469 |
Node-redis is a Node.js Redis client. Before version 3.1.1, when a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service. The issue is patched in version 3.1.1. |
Important |
redis |
否 |
完成修复 |
2021-04-23 |
2026-01-04 |
| CVE-2021-22207 |
Excessive memory consumption in MS-WSP dissector in Wireshark 3.4.0 to 3.4.4 and 3.2.0 to 3.2.12 allows denial of service via packet injection or crafted capture file |
Moderate |
wireshark |
否 |
完成修复 |
2021-04-23 |
2026-01-25 |
| CVE-2020-12663 |
Unbound before 1.10.1 has an infinite loop via malformed DNS answers received from upstream servers. |
Important |
unbound |
否 |
完成修复 |
2021-04-22 |
2026-01-06 |
| CVE-2020-12662 |
Unbound before 1.10.1 has Insufficient Control of Network Message Volume, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records. |
Important |
unbound |
否 |
完成修复 |
2021-04-22 |
2026-01-06 |
| CVE-2021-3156 |
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. |
Important |
sudo |
否 |
完成修复 |
2021-04-21 |
2026-01-08 |
| CVE-2021-29462 |
The Portable SDK for UPnP Devices is an SDK for development of UPnP device and control point applications. The server part of pupnp (libupnp) appears to be vulnerable to DNS rebinding attacks because it does not check the value of the `Host` header. This can be mitigated by using DNS revolvers which block DNS-rebinding attacks. The vulnerability is fixed in version 1.14.6 and later. |
Important |
libupnp |
否 |
完成修复 |
2021-04-21 |
2026-01-04 |
| CVE-2021-29457 |
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4. |
Important |
exiv2 |
否 |
完成修复 |
2021-04-19 |
2026-01-07 |
| CVE-2021-27608 |
An unquoted service path in SAPSetup, version - 9.0, could lead to privilege escalation during the installation process that is performed when an executable file is registered. This could further lead to complete compromise of confidentiality, Integrity and Availability. |
Important |
setup |
否 |
完成修复 |
2021-04-14 |
2026-01-09 |
| CVE-2021-27905 |
The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2. |
Important |
lucene |
否 |
完成修复 |
2021-04-13 |
2026-01-05 |
| CVE-2018-25008 |
In the standard library in Rust before 1.29.0, there is weak synchronization in the Arc::get_mut method. This synchronization issue can be lead to memory safety issues through race conditions. |
Moderate |
rust |
否 |
完成修复 |
2021-04-13 |
2025-12-17 |
| CVE-2017-20004 |
In the standard library in Rust before 1.19.0, there is a synchronization problem in the MutexGuard object. MutexGuards can be used across threads with any types, allowing for memory safety issues through race conditions. |
Moderate |
rust |
否 |
完成修复 |
2021-04-13 |
2025-12-17 |
| CVE-2021-29943 |
When using ConfigurableInternodeAuthHadoopPlugin for authentication, Apache Solr versions prior to 8.8.2 would forward/proxy distributed requests using server credentials instead of original client credentials. This would result in incorrect authorization resolution on the receiving hosts. |
Important |
lucene |
否 |
完成修复 |
2021-04-12 |
2026-01-05 |
| CVE-2020-36318 |
In the standard library in Rust before 1.49.0, VecDeque::make_contiguous has a bug that pops the same element more than once under certain condition. This bug could result in a use-after-free or double free. |
Low |
rust-toolset |
否 |
完成修复 |
2021-04-11 |
2025-12-17 |
| CVE-2020-36317 |
In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string APIs assume that UTF-8 encoding is used on the same string. |
Moderate |
rust-toolset:an8, rust |
否 |
完成修复 |
2021-04-11 |
2025-12-16 |
| CVE-2015-20001 |
In the standard library in Rust before 1.2.0, BinaryHeap is not panic-safe. The binary heap is left in an inconsistent state when the comparison of generic elements inside sift_up or sift_down_range panics. This bug leads to a drop of zeroed memory as an arbitrary type, which can result in a memory safety violation. |
Important |
rust |
否 |
完成修复 |
2021-04-11 |
2025-12-16 |
| CVE-2020-36309 |
ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in OpenResty allows unsafe characters in an argument when using the API to mutate a URI, or a request or response header. |
Moderate |
nginx |
否 |
完成修复 |
2021-04-06 |
2026-01-25 |
| CVE-2021-28832 |
VSCodeVim before 1.19.0 allows attackers to execute arbitrary code via a crafted workspace configuration. |
Important |
vim |
否 |
完成修复 |
2021-04-04 |
2026-01-06 |
| CVE-2020-9926 |
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, iCloud for Windows 7.20, macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra. Processing maliciously crafted XML may lead to an unexpected application termination or arbitrary code execution. |
Important |
libxml2 |
否 |
完成修复 |
2021-04-02 |
2026-01-09 |
| CVE-2020-27920 |
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, watchOS 7.1, tvOS 14.2. Processing maliciously crafted web content may lead to code execution. |
Important |
libxml2 |
否 |
完成修复 |
2021-04-02 |
2026-01-09 |
| CVE-2021-28165 |
In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame. |
Important |
jetty |
否 |
完成修复 |
2021-04-01 |
2026-01-06 |
| CVE-2021-20197 |
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink. |
Moderate |
binutils |
否 |
完成修复 |
2021-03-26 |
2025-12-11 |
| CVE-2019-10128 |
A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for EnterpriseDB-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, this allows a local attacker to read arbitrary data directory files, essentially bypassing database-imposed read access limitations. In plausible non-default configurations, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code. |
Important |
postgresql:15, postgresql |
否 |
完成修复 |
2021-03-19 |
2026-01-04 |
| CVE-2019-10127 |
A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for BigSQL-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code. An attacker having only the unprivileged Windows account can read arbitrary data directory files, essentially bypassing database-imposed read access limitations. An attacker having only the unprivileged Windows account can also delete certain data directory files. |
Important |
postgresql:15, postgresql |
否 |
完成修复 |
2021-03-19 |
2026-01-04 |
| CVE-2021-28667 |
StackStorm before 3.4.1, in some situations, has an infinite loop that consumes all available memory and disk space. This can occur if Python 3.x is used, the locale is not utf-8, and there is an attempt to log Unicode data (from an action or rule name). |
Important |
python |
否 |
完成修复 |
2021-03-17 |
2026-01-04 |
| CVE-2021-23169 |
A heap-buffer overflow was found in the copyIntoFrameBuffer function of OpenEXR in versions before 3.0.1. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled against OpenEXR.\nA heap-buffer overflow was found in the copyIntoFrameBuffer function of OpenEXR. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled against OpenEXR. |
Important |
OpenEXR |
否 |
完成修复 |
2021-03-17 |
2026-01-05 |
| CVE-2021-27290 |
ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.\nA flaw was found in ssri package. A malicious string provided by an attacker may lead to Regular Expression Denial of Service (ReDoS). This issue only affects consumers\nusing the strict option. The highest threat from this vulnerability is to availability. |
Important |
nodejs, nodejs:12 (Anolis OS 8.4), nodejs:12, nodejs:14, nodejs:12 (Anolis OS 8.2) |
否 |
完成修复 |
2021-03-12 |
2026-01-06 |
| CVE-2020-36278 |
Leptonica before 1.80.0 allows a heap-based buffer over-read in findNextBorderPixel in ccbord.c. |
Important |
leptonica |
否 |
完成修复 |
2021-03-12 |
2026-01-06 |
| CVE-2020-36281 |
Leptonica before 1.80.0 allows a heap-based buffer over-read in pixFewColorsOctcubeQuantMixed in colorquant1.c. |
Important |
leptonica |
否 |
完成修复 |
2021-03-11 |
2026-01-06 |
| CVE-2020-36280 |
Leptonica before 1.80.0 allows a heap-based buffer over-read in pixReadFromTiffStream, related to tiffio.c. |
Important |
leptonica |
否 |
完成修复 |
2021-03-11 |
2026-01-06 |
| CVE-2020-36279 |
Leptonica before 1.80.0 allows a heap-based buffer over-read in rasteropGeneralLow, related to adaptmap_reg.c and adaptmap.c. |
Important |
leptonica |
否 |
完成修复 |
2021-03-11 |
2026-01-06 |
| CVE-2020-36277 |
Leptonica before 1.80.0 allows a denial of service (application crash) via an incorrect left shift in pixConvert2To8 in pixconv.c. |
Important |
leptonica |
否 |
完成修复 |
2021-03-11 |
2026-01-06 |
| CVE-2020-13936 |
An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2. |
Important |
velocity |
否 |
完成修复 |
2021-03-10 |
2025-12-30 |
| CVE-2021-21179 |
Use after free in Network Internals in Google Chrome on Linux prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
Important |
kernel |
否 |
完成修复 |
2021-03-09 |
2025-12-04 |
| CVE-2021-28041 |
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host. |
Moderate |
openssh |
否 |
完成修复 |
2021-03-05 |
2026-01-25 |
| CVE-2021-25289 |
An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.\nA flaw was found in python-pillow. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. The previous fix for CVE-2020-35654 was insufficient due to incorrect error checking in TiffDecode.c. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Important |
python-pillow |
否 |
完成修复 |
2021-02-28 |
2026-01-04 |
| CVE-2021-23979 |
Mozilla developers reported memory safety bugs present in Firefox 85. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 86. |
Moderate |
kernel |
否 |
完成修复 |
2021-02-26 |
2026-01-22 |
| CVE-2021-21309 |
Redis is an open-source, in-memory database that persists on disk. In affected versions of Redis an integer overflow bug in 32-bit Redis version 4.0 or newer could be exploited to corrupt the heap and potentially result with remote code execution. Redis 4.0 or newer uses a configurable limit for the maximum supported bulk input size. By default, it is 512MB which is a safe value for all platforms. If the limit is significantly increased, receiving a large request from a client may trigger several integer overflow scenarios, which would result with buffer overflow and heap corruption. We believe this could in certain conditions be exploited for remote code execution. By default, authenticated Redis users have access to all configuration parameters and can therefore use the “CONFIG SET proto-max-bulk-len” to change the safe default, making the system vulnerable. **This problem only affects 32-bit Redis (on a 32-bit system, or as a 32-bit executable running on a 64-bit system).** The problem is fixed in version 6.2, and the fix is back ported to 6.0.11 and 5.0.11. Make sure you use one of these versions if you are running 32-bit Redis. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent clients from directly executing `CONFIG SET`: Using Redis 6.0 or newer, ACL configuration can be used to block the command. Using older versions, the `rename-command` configuration directive can be used to rename the command to a random string unknown to users, rendering it inaccessible. Please note that this workaround may have an additional impact on users or operational systems that expect `CONFIG SET` to behave in certain ways. |
Important |
redis, redis:6, redis:5 |
否 |
完成修复 |
2021-02-26 |
2026-01-04 |
| CVE-2020-8032 |
A Insecure Temporary File vulnerability in the packaging of cyrus-sasl of openSUSE Factory allows local attackers to escalate to root. This issue affects: openSUSE Factory cyrus-sasl version 2.1.27-4.2 and prior versions. |
Important |
cyrus-sasl |
否 |
完成修复 |
2021-02-25 |
2026-01-06 |
| CVE-2021-21974 |
OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution. |
Important |
openslp |
否 |
完成修复 |
2021-02-24 |
2026-01-05 |
| CVE-2021-27378 |
An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because read_u32_into and read_u64_into mishandle certain buffer-length checks, a random number generator may be seeded with too little data. |
Critical |
rust |
否 |
完成修复 |
2021-02-18 |
2025-12-17 |
| CVE-2021-20446 |
IBM Maximo for Civil Infrastructure 7.6.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 196622. |
Moderate |
kernel |
否 |
完成修复 |
2021-02-18 |
2025-12-23 |
| CVE-2021-20444 |
IBM Maximo for Civil Infrastructure 7.6.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 196620. |
Moderate |
kernel |
否 |
完成修复 |
2021-02-18 |
2025-12-23 |
| CVE-2021-20354 |
IBM WebSphere Application Server 8.0, 8.5, and 9.0 could allow a remote attacker to traverse directories. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 194883. |
Moderate |
kernel |
否 |
完成修复 |
2021-02-18 |
2025-12-23 |
| CVE-2020-4933 |
IBM Jazz Reporting Service 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 191751. |
Moderate |
kernel |
否 |
完成修复 |
2021-02-18 |
2025-12-23 |
| CVE-2021-27367 |
Controller/Backend/FileEditController.php and Controller/Backend/FilemanagerController.php in Bolt before 4.1.13 allow Directory Traversal. |
Important |
bolt |
否 |
完成修复 |
2021-02-17 |
2026-01-05 |
| CVE-2020-12368 |
Integer overflow in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable an escalation of privilege via local access. |
Important |
linux-firmware |
否 |
完成修复 |
2021-02-17 |
2026-01-05 |
| CVE-2021-23840 |
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x). |
Important |
openssl098e, nodejs, edk2, openssl, compat-openssl10, ovmf |
否 |
完成修复 |
2021-02-16 |
2026-01-09 |
| CVE-2021-43616 |
The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. |
Important |
nodejs:14, nodejs:16, nodejs, nodejs:12 |
否 |
完成修复 |
2021-02-15 |
2026-01-05 |
| CVE-2020-35512 |
A use-after-free flaw was found in D-Bus Development branch <= 1.13.16, dbus-1.12.x stable branch <= 1.12.18, and dbus-1.10.x and older branches <= 1.10.30 when a system has multiple usernames sharing the same UID. When a set of policy rules references these usernames, D-Bus may free some memory in the heap, which is still used by data structures necessary for the other usernames sharing the UID, possibly leading to a crash or other undefined behaviors |
Important |
dbusmenu-qt, dbus-python |
否 |
完成修复 |
2021-02-15 |
2026-01-04 |
| CVE-2021-20411 |
IBM Security Verify Information Queue 1.0.6 and 1.0.7 could allow a user to impersonate another user on the system due to incorrectly updating the session identifier. IBM X-Force ID: 198191. |
Important |
kernel |
否 |
完成修复 |
2021-02-12 |
2025-12-04 |
| CVE-2021-20408 |
IBM Security Verify Information Queue 1.0.6 and 1.0.7 could disclose highly sensitive information to a local user due to inproper storage of a plaintext cryptographic key. IBM X-Force ID: 198187. |
Important |
kernel |
否 |
完成修复 |
2021-02-12 |
2025-12-04 |
| CVE-2021-26719 |
A directory traversal issue was discovered in Gradle gradle-enterprise-test-distribution-agent before 1.3.2, test-distribution-gradle-plugin before 1.3.2, and gradle-enterprise-maven-extension before 1.8.2. A malicious actor (with certain credentials) can perform a registration step such that crafted TAR archives lead to extraction of files into arbitrary filesystem locations. |
Moderate |
maven |
否 |
完成修复 |
2021-02-09 |
2026-01-25 |
| CVE-2020-36241 |
autoar-extractor.c in GNOME gnome-autoar through 0.2.4, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location. |
Low |
webkit2gtk3 |
否 |
完成修复 |
2021-02-05 |
2026-01-04 |
| CVE-2020-28403 |
A Cross-Site Request Forgery (CSRF) vulnerability exists in Star Practice Management Web version 2019.2.0.6, allowing an attacker to change the privileges of any user of the application. This can be used to grant himself administrative role or remove the administrative account of the application. |
Important |
star |
否 |
完成修复 |
2021-01-29 |
2026-01-08 |
| CVE-2020-35517 |
A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Important |
qemu-kvm |
否 |
完成修复 |
2021-01-28 |
2025-12-09 |
| CVE-2021-3326 |
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service. |
Moderate |
glibc |
否 |
完成修复 |
2021-01-27 |
2025-12-11 |
| CVE-2021-3115 |
Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the "go get" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download). |
Moderate |
golang-dbus, golang |
是 |
完成修复 |
2021-01-26 |
2025-12-10 |
| CVE-2021-25900 |
An issue was discovered in the smallvec crate before 0.6.14 and 1.x before 1.6.1 for Rust. There is a heap-based buffer overflow in SmallVec::insert_many. |
Important |
librsvg2 |
否 |
完成修复 |
2021-01-26 |
2026-01-05 |
| CVE-2020-36204 |
An issue was discovered in the im crate through 2020-11-09 for Rust. Because TreeFocus does not have bounds on its Send trait or Sync trait, a data race can occur. |
Moderate |
rust |
否 |
完成修复 |
2021-01-26 |
2025-12-17 |
| CVE-2020-29443 |
ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated. |
Moderate |
libvirt |
否 |
完成修复 |
2021-01-26 |
2025-12-18 |
| CVE-2020-4921 |
IBM Security Guardium 10.6 and 11.2 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 191398. |
Important |
kernel |
否 |
完成修复 |
2021-01-20 |
2025-12-04 |
| CVE-2020-27221 |
In Eclipse OpenJ9 up to and including version 0.23, there is potential for a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding. |
Critical |
java-11-openjdk, eclipse |
否 |
完成修复 |
2021-01-20 |
2025-12-05 |
| CVE-2021-21237 |
Git LFS is a command line extension for managing large files with Git. On Windows, if Git LFS operates on a malicious repository with a git.bat or git.exe file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. This is the result of an incomplete fix for CVE-2020-27955. This issue occurs because on Windows, Go includes (and prefers) the current directory when the name of a command run does not contain a directory separator. Other than avoiding untrusted repositories or using a different operating system, there is no workaround. This is fixed in v2.13.2. |
Important |
git |
否 |
完成修复 |
2021-01-15 |
2026-01-06 |
| CVE-2021-21009 |
Adobe Campaign Classic Gold Standard 10 (and earlier), 20.3.1 (and earlier), 20.2.3 (and earlier), 20.1.3 (and earlier), 19.2.3 (and earlier) and 19.1.7 (and earlier) are affected by a server-side request forgery (SSRF) vulnerability. Successful exploitation could allow an attacker to use the Campaign instance to issue unauthorized requests to internal or external resources. |
Important |
kernel |
否 |
完成修复 |
2021-01-13 |
2025-12-04 |
| CVE-2020-4597 |
IBM Security Guardium Insights 2.0.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 184822. |
Moderate |
kernel |
否 |
完成修复 |
2021-01-13 |
2025-12-23 |
| CVE-2021-3121 |
An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue. |
Important |
protobuf |
否 |
完成修复 |
2021-01-11 |
2026-01-04 |
| CVE-2021-23240 |
selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable. |
Important |
sudo |
否 |
完成修复 |
2021-01-11 |
2026-01-08 |
| CVE-2021-23239 |
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path. |
Low |
sudo |
否 |
完成修复 |
2021-01-11 |
2026-01-25 |
| CVE-2021-1060 |
NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and vGPU plugin, in which an input index is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3). |
Important |
kernel |
否 |
完成修复 |
2021-01-08 |
2025-12-04 |
| CVE-2021-1056 |
NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidia.ko) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure. |
Important |
libnvidia-container |
否 |
完成修复 |
2021-01-08 |
2026-01-05 |
| CVE-2021-1052 |
NVIDIA GPU Display Driver for Windows and Linux, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape or IOCTL in which user-mode clients can access legacy privileged APIs, which may lead to denial of service, escalation of privileges, and information disclosure. |
Important |
libnvidia-container |
否 |
完成修复 |
2021-01-08 |
2026-01-05 |
| CVE-2020-5022 |
IBM Spectrum Protect Plus 10.1.0 through 10.1.6 may allow unauthenticated and unauthorized access to VDAP proxy which can result in an attacker obtaining information they are not authorized to access. IBM X-Force ID: 193658. |
Moderate |
kernel |
否 |
完成修复 |
2021-01-08 |
2025-12-09 |
| CVE-2020-5019 |
IBM Spectrum Protect Plus 10.1.0 through 10.1.6 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. By sending a specially crafted HTTP request, a remote attacker could exploit this vulnerability to inject HTTP HOST header, which will allow the attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 193655. |
Moderate |
kernel |
否 |
完成修复 |
2021-01-08 |
2025-12-23 |
| CVE-2020-5018 |
IBM Spectrum Protect Plus 10.1.0 through 10.1.6 may include sensitive information in its URLs increasing the risk of such information being caputured by an attacker. IBM X-Force ID: 193654. |
Low |
kernel |
是 |
完成修复 |
2021-01-08 |
2026-01-23 |
| CVE-2020-5017 |
IBM Spectrum Protect Plus 10.1.0 through 10.1.6 may allow a local user to obtain access to information beyond their intended role and permissions. IBM X-Force ID: 193653. |
Low |
kernel |
是 |
完成修复 |
2021-01-08 |
2026-01-23 |
| CVE-2020-26972 |
The lifecycle of IPC Actors allows managed actors to outlive their manager actors; and the former must ensure that they are not attempting to use a dead actor they have a reference to. Such a check was omitted in WebGL, resulting in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox < 84. |
Important |
firefox |
否 |
完成修复 |
2021-01-07 |
2026-01-04 |