Search for packages
| purl | pkg:conan/c-ares@1.0.0 |
| Tags | Ghost |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1xdz-dku3-qqc4
Aliases: CVE-2021-3672 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T12:49:06.225671+00:00 | GitLab Importer | Affected by | VCID-1xdz-dku3-qqc4 | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/conan/c-ares/CVE-2021-3672.yml | 38.0.0 |