This might be proprietary software.
|2016-10-03||CVE-2016-5180||Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.||C\-Ares, C\-Ares, Ubuntu_linux, Debian_linux, Node\.js||9.8|
|2017-07-07||CVE-2017-1000381||The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.||C\-Ares, C\-Ares, Node\.js||7.5|
|2021-05-13||CVE-2020-14354||A possible use-after-free and double-free in c-ares lib version 1.16.0 if ares_destroy() is called prior to ares_getaddrinfo() completing. This flaw possibly allows an attacker to crash the service that uses c-ares lib. The highest threat from this vulnerability is to this service availability.||C\-Ares, Fedora||3.3|
|2023-08-22||CVE-2020-22217||Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.||C\-Ares||9.8|