Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

c-ares — Vulnerabilities & Security Advisories 7

Browse all 7 CVE security advisories affecting c-ares. AI-powered Chinese analysis, POCs, and references for each vulnerability.

c-ares is a C library for asynchronous DNS requests, widely used in applications requiring non-blocking DNS resolution. Historically, vulnerabilities have included remote code execution, buffer overflows, and denial-of-service flaws, often stemming from improper input validation or memory handling. Security characteristics show a pattern of issues in parsing DNS responses and handling crafted packets. While no major public incidents have been documented, the 7 CVEs highlight ongoing risks in memory management and parsing logic. Developers should ensure proper input sanitization and keep implementations updated to mitigate potential exploitation through malformed DNS responses or network attacks.

Top products by c-ares: c-ares

This page lists every published CVE security advisory associated with c-ares. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.